Analysis

  • max time kernel
    151s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 15:33

General

  • Target

    e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1.exe

  • Size

    3.9MB

  • MD5

    7185dd04ba69eac4b0c2b269843cfae3

  • SHA1

    47427c2fb4e1a097304f801a9dc6815b84fa1519

  • SHA256

    e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1

  • SHA512

    150a4450de27b0338628a88d66dc595dac942bd2e8dd5aab4c6bd5f340bfaeddc08f38bcc4b1991d67fa29178779718fc19676b65031b992f3db030eba281ce5

Malware Config

Extracted

Family

orcus

C2

dontreachme.ddns.net:3600

dontreachme2.ddns.net:3600

Mutex

637bdf863f424e26ae6741c39d47588d

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %appdata%\Windows Updater\Dupper.exe

  • reconnect_delay

    10000

  • registry_keyname

    WindowsUpdater

  • taskscheduler_taskname

    WindowUpdater

  • watchdog_path

    Temp\Updater.exe

Signatures

  • Contains code to disable Windows Defender 8 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus Main Payload 7 IoCs
  • Orcurs Rat Executable 25 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 50 IoCs
  • Loads dropped DLL 51 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks for any installed AV software in registry 1 TTPs 32 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 17 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1.exe
    "C:\Users\Admin\AppData\Local\Temp\e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\tmp87A.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp87A.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Windows security modification
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1760
    • C:\Users\Admin\AppData\Local\Temp\e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1.exe
      "C:\Users\Admin\AppData\Local\Temp\e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Users\Admin\AppData\Local\Temp\e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1.exe
        "C:\Users\Admin\AppData\Local\Temp\e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1.exe"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1500
        • C:\Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe
          "C:\Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1172
          • C:\Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe
            "C:\Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe"
            5⤵
            • Executes dropped EXE
            PID:892
          • C:\Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe
            "C:\Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            PID:364
            • C:\Users\Admin\AppData\Local\Temp\tmp32C5.tmp.exe
              "C:\Users\Admin\AppData\Local\Temp\tmp32C5.tmp.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              PID:428
              • C:\Windows\Temp\asw.49fa17ce2df433de\avast_free_antivirus_setup_online_x64.exe
                "C:\Windows\Temp\asw.49fa17ce2df433de\avast_free_antivirus_setup_online_x64.exe" /ga_clientid:18991329-5b89-4148-b429-7ff3183b5578 /edat_dir:C:\Windows\Temp\asw.49fa17ce2df433de
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks for any installed AV software in registry
                • Writes to the Master Boot Record (MBR)
                • Checks processor information in registry
                • Modifies registry class
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1964
                • C:\Windows\Temp\asw.ef4cafe26cd9ee89\instup.exe
                  "C:\Windows\Temp\asw.ef4cafe26cd9ee89\instup.exe" /sfx:lite /sfxstorage:C:\Windows\Temp\asw.ef4cafe26cd9ee89 /edition:1 /prod:ais /cookie:mmm_cbd_dlp_000_119_b /guid:ab2dfd89-ca4a-43a1-8927-9bceee41109b /ga_clientid:18991329-5b89-4148-b429-7ff3183b5578 /ga_clientid:18991329-5b89-4148-b429-7ff3183b5578 /edat_dir:C:\Windows\Temp\asw.49fa17ce2df433de
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Checks for any installed AV software in registry
                  • Writes to the Master Boot Record (MBR)
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:1796
                  • C:\Windows\Temp\asw.ef4cafe26cd9ee89\New_15020997\instup.exe
                    "C:\Windows\Temp\asw.ef4cafe26cd9ee89\New_15020997\instup.exe" /sfx /sfxstorage:C:\Windows\Temp\asw.ef4cafe26cd9ee89 /edition:1 /prod:ais /cookie:mmm_cbd_dlp_000_119_b /guid:ab2dfd89-ca4a-43a1-8927-9bceee41109b /ga_clientid:18991329-5b89-4148-b429-7ff3183b5578 /edat_dir:C:\Windows\Temp\asw.49fa17ce2df433de /online_installer
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Checks for any installed AV software in registry
                    • Writes to the Master Boot Record (MBR)
                    • Checks processor information in registry
                    • Modifies registry class
                    • Modifies system certificate store
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:2576
                    • C:\Windows\Temp\asw.ef4cafe26cd9ee89\New_15020997\aswOfferTool.exe
                      "C:\Windows\Temp\asw.ef4cafe26cd9ee89\New_15020997\aswOfferTool.exe" -checkGToolbar -elevated
                      10⤵
                      • Executes dropped EXE
                      PID:2776
                    • C:\Windows\Temp\asw.ef4cafe26cd9ee89\New_15020997\aswOfferTool.exe
                      "C:\Windows\Temp\asw.ef4cafe26cd9ee89\New_15020997\aswOfferTool.exe" /check_secure_browser
                      10⤵
                      • Executes dropped EXE
                      PID:2792
                    • C:\Windows\Temp\asw.ef4cafe26cd9ee89\New_15020997\aswOfferTool.exe
                      "C:\Windows\Temp\asw.ef4cafe26cd9ee89\New_15020997\aswOfferTool.exe" -checkChrome -elevated
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:2808
                    • C:\Windows\Temp\asw.ef4cafe26cd9ee89\New_15020997\aswOfferTool.exe
                      "C:\Windows\Temp\asw.ef4cafe26cd9ee89\New_15020997\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AVFA
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2824
                      • C:\Users\Public\Documents\aswOfferTool.exe
                        "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AVFA
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:2892
                    • C:\Windows\Temp\asw.ef4cafe26cd9ee89\New_15020997\aswOfferTool.exe
                      "C:\Windows\Temp\asw.ef4cafe26cd9ee89\New_15020997\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AVFA
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2904
                      • C:\Users\Public\Documents\aswOfferTool.exe
                        "C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AVFA
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:2924
                    • C:\Windows\Temp\asw.ef4cafe26cd9ee89\New_15020997\aswOfferTool.exe
                      "C:\Windows\Temp\asw.ef4cafe26cd9ee89\New_15020997\aswOfferTool.exe" -checkChrome -elevated
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:2936
            • C:\Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe
              "C:\Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Drops file in Program Files directory
              PID:1084
              • C:\Windows\SysWOW64\WinInput.exe
                "C:\Windows\SysWOW64\WinInput.exe" --install
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                PID:1004
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 1004 -s 700
                  8⤵
                  • Program crash
                  PID:524
              • C:\Program Files (x86)\Windows Updater\Updater.exe
                "C:\Program Files (x86)\Windows Updater\Updater.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1108
                • C:\Program Files (x86)\Windows Updater\Updater.exe
                  "C:\Program Files (x86)\Windows Updater\Updater.exe"
                  8⤵
                  • Executes dropped EXE
                  PID:1900
                • C:\Program Files (x86)\Windows Updater\Updater.exe
                  "C:\Program Files (x86)\Windows Updater\Updater.exe"
                  8⤵
                  • Executes dropped EXE
                  PID:1508
                • C:\Program Files (x86)\Windows Updater\Updater.exe
                  "C:\Program Files (x86)\Windows Updater\Updater.exe"
                  8⤵
                  • Executes dropped EXE
                  PID:1672
                • C:\Program Files (x86)\Windows Updater\Updater.exe
                  "C:\Program Files (x86)\Windows Updater\Updater.exe"
                  8⤵
                  • Executes dropped EXE
                  PID:996
                • C:\Program Files (x86)\Windows Updater\Updater.exe
                  "C:\Program Files (x86)\Windows Updater\Updater.exe"
                  8⤵
                  • Executes dropped EXE
                  PID:1084
          • C:\Users\Admin\AppData\Local\Temp\tmp2953.tmp.exe
            "C:\Users\Admin\AppData\Local\Temp\tmp2953.tmp.exe"
            5⤵
            • Executes dropped EXE
            • Windows security modification
            • Suspicious use of WriteProcessMemory
            PID:1224
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" Get-MpPreference -verbose
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1092
        • C:\Users\Admin\AppData\Local\Temp\e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1.exe
          C:\Users\Admin\AppData\Local\Temp\e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1.exe
          4⤵
          • Loads dropped DLL
          PID:2016
          • C:\Users\Admin\AppData\Roaming\Update\New.exe
            "C:\Users\Admin\AppData\Roaming\Update\New.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1580
            • C:\Users\Admin\AppData\Roaming\Update\New.exe
              "C:\Users\Admin\AppData\Roaming\Update\New.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1960
              • C:\Users\Admin\AppData\Roaming\Update\New.exe
                "C:\Users\Admin\AppData\Roaming\Update\New.exe"
                7⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:1944
                • C:\Users\Admin\AppData\Roaming\Update\New.exe
                  C:\Users\Admin\AppData\Roaming\Update\New.exe
                  8⤵
                  • Executes dropped EXE
                  • Modifies system certificate store
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1172
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn FirefoxUpdate /tr C:\Users\Admin\AppData\Roaming\Update\New.exe /F
                  8⤵
                    PID:1780
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn FirefoxUpdate /tr C:\Users\Admin\AppData\Roaming\Update\New.exe /F
                      9⤵
                      • Creates scheduled task(s)
                      PID:1372
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn FirefoxUpdate /tr C:\Users\Admin\AppData\Local\Temp\e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1.exe /F
            4⤵
              PID:1396
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /sc minute /mo 1 /tn FirefoxUpdate /tr C:\Users\Admin\AppData\Local\Temp\e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1.exe /F
                5⤵
                • Creates scheduled task(s)
                PID:568
          • C:\Users\Admin\AppData\Local\Temp\tmp1536.tmp.exe
            "C:\Users\Admin\AppData\Local\Temp\tmp1536.tmp.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            PID:1476
            • C:\Windows\SysWOW64\WindowsInput.exe
              "C:\Windows\SysWOW64\WindowsInput.exe" --install
              4⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              PID:936
            • C:\Users\Admin\AppData\Roaming\Windows Updater\Dupper.exe
              "C:\Users\Admin\AppData\Roaming\Windows Updater\Dupper.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1496
              • C:\Users\Admin\AppData\Local\Temp\Updater.exe
                "C:\Users\Admin\AppData\Local\Temp\Updater.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\Windows Updater\Dupper.exe" 1496 /protectFile
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:564
                • C:\Users\Admin\AppData\Local\Temp\Updater.exe
                  "C:\Users\Admin\AppData\Local\Temp\Updater.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\Windows Updater\Dupper.exe" 1496 "/protectFile"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2040
      • C:\Users\Admin\AppData\Roaming\Update\New.exe
        "C:\Users\Admin\AppData\Roaming\Update\New.exe"
        1⤵
        • Executes dropped EXE
        PID:768
      • C:\Windows\SysWOW64\WindowsInput.exe
        "C:\Windows\SysWOW64\WindowsInput.exe"
        1⤵
        • Executes dropped EXE
        PID:1836
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {AE9118F6-7EFF-47BD-ACFF-53E09A3BC7E4} S-1-5-21-1819626980-2277161760-1023733287-1000:TBHNEBSE\Admin:Interactive:[1]
        1⤵
          PID:1072
          • C:\Users\Admin\AppData\Roaming\Update\New.exe
            C:\Users\Admin\AppData\Roaming\Update\New.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:1392
            • C:\Users\Admin\AppData\Roaming\Update\New.exe
              "C:\Users\Admin\AppData\Roaming\Update\New.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1108
              • C:\Users\Admin\AppData\Roaming\Update\New.exe
                "C:\Users\Admin\AppData\Roaming\Update\New.exe"
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:1952
                • C:\Users\Admin\AppData\Roaming\Update\New.exe
                  C:\Users\Admin\AppData\Roaming\Update\New.exe
                  5⤵
                  • Executes dropped EXE
                  PID:1476
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn FirefoxUpdate /tr C:\Users\Admin\AppData\Roaming\Update\New.exe /F
                  5⤵
                    PID:852
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn FirefoxUpdate /tr C:\Users\Admin\AppData\Roaming\Update\New.exe /F
                      6⤵
                      • Creates scheduled task(s)
                      PID:2108
            • C:\Users\Admin\AppData\Roaming\Windows Updater\Dupper.exe
              "C:\Users\Admin\AppData\Roaming\Windows Updater\Dupper.exe"
              2⤵
              • Executes dropped EXE
              PID:1924
            • C:\Users\Admin\AppData\Roaming\Update\New.exe
              C:\Users\Admin\AppData\Roaming\Update\New.exe
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:280
              • C:\Users\Admin\AppData\Roaming\Update\New.exe
                "C:\Users\Admin\AppData\Roaming\Update\New.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:2144
                • C:\Users\Admin\AppData\Roaming\Update\New.exe
                  "C:\Users\Admin\AppData\Roaming\Update\New.exe"
                  4⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of SetThreadContext
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2240
                  • C:\Users\Admin\AppData\Roaming\Update\New.exe
                    C:\Users\Admin\AppData\Roaming\Update\New.exe
                    5⤵
                    • Executes dropped EXE
                    PID:2344
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn FirefoxUpdate /tr C:\Users\Admin\AppData\Roaming\Update\New.exe /F
                    5⤵
                      PID:2392
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /sc minute /mo 1 /tn FirefoxUpdate /tr C:\Users\Admin\AppData\Roaming\Update\New.exe /F
                        6⤵
                        • Creates scheduled task(s)
                        PID:2448
              • C:\Users\Admin\AppData\Roaming\Update\New.exe
                C:\Users\Admin\AppData\Roaming\Update\New.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:3012
                • C:\Users\Admin\AppData\Roaming\Update\New.exe
                  "C:\Users\Admin\AppData\Roaming\Update\New.exe"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3040
                  • C:\Users\Admin\AppData\Roaming\Update\New.exe
                    "C:\Users\Admin\AppData\Roaming\Update\New.exe"
                    4⤵
                    • Executes dropped EXE
                    PID:1712
                  • C:\Users\Admin\AppData\Roaming\Update\New.exe
                    "C:\Users\Admin\AppData\Roaming\Update\New.exe"
                    4⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2104
                    • C:\Users\Admin\AppData\Roaming\Update\New.exe
                      C:\Users\Admin\AppData\Roaming\Update\New.exe
                      5⤵
                      • Executes dropped EXE
                      PID:2224
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn FirefoxUpdate /tr C:\Users\Admin\AppData\Roaming\Update\New.exe /F
                      5⤵
                        PID:2252
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /create /sc minute /mo 1 /tn FirefoxUpdate /tr C:\Users\Admin\AppData\Roaming\Update\New.exe /F
                          6⤵
                          • Creates scheduled task(s)
                          PID:2212

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\Updater.exe
                Filesize

                9KB

                MD5

                913967b216326e36a08010fb70f9dba3

                SHA1

                7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

                SHA256

                8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

                SHA512

                c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

              • C:\Users\Admin\AppData\Local\Temp\Updater.exe
                Filesize

                9KB

                MD5

                913967b216326e36a08010fb70f9dba3

                SHA1

                7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

                SHA256

                8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

                SHA512

                c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

              • C:\Users\Admin\AppData\Local\Temp\Updater.exe
                Filesize

                9KB

                MD5

                913967b216326e36a08010fb70f9dba3

                SHA1

                7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

                SHA256

                8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

                SHA512

                c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

              • C:\Users\Admin\AppData\Local\Temp\Updater.exe.config
                Filesize

                357B

                MD5

                a2b76cea3a59fa9af5ea21ff68139c98

                SHA1

                35d76475e6a54c168f536e30206578babff58274

                SHA256

                f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

                SHA512

                b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

              • C:\Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe
                Filesize

                5.6MB

                MD5

                b1f83a48685c830a9eefe83ff114e86d

                SHA1

                7a27f05059673762a4759e75915aa3dacdfea62d

                SHA256

                cce0cc648ab563887b0fb4bf5087554da0386255c38041edd17dbb6d5d628018

                SHA512

                d00d1a8b69665d04791cd8986c829c4d4a247a9ff8ae28434d929f96428efa037f0027ddcd1367e716685dcf16543f883c4850c6825de355e9d404579604088c

              • C:\Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe
                Filesize

                5.6MB

                MD5

                b1f83a48685c830a9eefe83ff114e86d

                SHA1

                7a27f05059673762a4759e75915aa3dacdfea62d

                SHA256

                cce0cc648ab563887b0fb4bf5087554da0386255c38041edd17dbb6d5d628018

                SHA512

                d00d1a8b69665d04791cd8986c829c4d4a247a9ff8ae28434d929f96428efa037f0027ddcd1367e716685dcf16543f883c4850c6825de355e9d404579604088c

              • C:\Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe
                Filesize

                5.6MB

                MD5

                b1f83a48685c830a9eefe83ff114e86d

                SHA1

                7a27f05059673762a4759e75915aa3dacdfea62d

                SHA256

                cce0cc648ab563887b0fb4bf5087554da0386255c38041edd17dbb6d5d628018

                SHA512

                d00d1a8b69665d04791cd8986c829c4d4a247a9ff8ae28434d929f96428efa037f0027ddcd1367e716685dcf16543f883c4850c6825de355e9d404579604088c

              • C:\Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe
                Filesize

                5.6MB

                MD5

                b1f83a48685c830a9eefe83ff114e86d

                SHA1

                7a27f05059673762a4759e75915aa3dacdfea62d

                SHA256

                cce0cc648ab563887b0fb4bf5087554da0386255c38041edd17dbb6d5d628018

                SHA512

                d00d1a8b69665d04791cd8986c829c4d4a247a9ff8ae28434d929f96428efa037f0027ddcd1367e716685dcf16543f883c4850c6825de355e9d404579604088c

              • C:\Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe
                Filesize

                5.6MB

                MD5

                b1f83a48685c830a9eefe83ff114e86d

                SHA1

                7a27f05059673762a4759e75915aa3dacdfea62d

                SHA256

                cce0cc648ab563887b0fb4bf5087554da0386255c38041edd17dbb6d5d628018

                SHA512

                d00d1a8b69665d04791cd8986c829c4d4a247a9ff8ae28434d929f96428efa037f0027ddcd1367e716685dcf16543f883c4850c6825de355e9d404579604088c

              • C:\Users\Admin\AppData\Local\Temp\tmp1536.tmp.exe
                Filesize

                919KB

                MD5

                534c91207fbf2d8704e59f89635f641f

                SHA1

                baf2394a7fb795dd7f27f7c03615a03aa589a728

                SHA256

                7180f4b208166abe96390387eb8172426f6087329955a32f84f4d62c7f2ffd27

                SHA512

                9f16e2b43455da00a9028d8485c66b67ef9395a2ee43d20706736699984af2f380375fa5ccd35b99c789ead48df79ca2ed93b10724d21333e40ec97a2c520518

              • C:\Users\Admin\AppData\Local\Temp\tmp1536.tmp.exe
                Filesize

                919KB

                MD5

                534c91207fbf2d8704e59f89635f641f

                SHA1

                baf2394a7fb795dd7f27f7c03615a03aa589a728

                SHA256

                7180f4b208166abe96390387eb8172426f6087329955a32f84f4d62c7f2ffd27

                SHA512

                9f16e2b43455da00a9028d8485c66b67ef9395a2ee43d20706736699984af2f380375fa5ccd35b99c789ead48df79ca2ed93b10724d21333e40ec97a2c520518

              • C:\Users\Admin\AppData\Local\Temp\tmp2953.tmp.exe
                Filesize

                12KB

                MD5

                38c172779d4e1e0f068ca12d3cc6e2be

                SHA1

                81d61a9bf67a540b091c6f783f00864e905da0c5

                SHA256

                4c9476ece1e4f648cc820d1d8b66b99fc8d64d24ebb97a0db6c4845ac22bb480

                SHA512

                c774a1e266379f10633ddd16ad2402367b6a5372c5aaf92bea9e4b471cd3982cc0b2d6a0b1082eb210943ff8d8f15d58d28421bb484bf54f5d4c81eecfefd5e2

              • C:\Users\Admin\AppData\Local\Temp\tmp2953.tmp.exe
                Filesize

                12KB

                MD5

                38c172779d4e1e0f068ca12d3cc6e2be

                SHA1

                81d61a9bf67a540b091c6f783f00864e905da0c5

                SHA256

                4c9476ece1e4f648cc820d1d8b66b99fc8d64d24ebb97a0db6c4845ac22bb480

                SHA512

                c774a1e266379f10633ddd16ad2402367b6a5372c5aaf92bea9e4b471cd3982cc0b2d6a0b1082eb210943ff8d8f15d58d28421bb484bf54f5d4c81eecfefd5e2

              • C:\Users\Admin\AppData\Local\Temp\tmp32C5.tmp.exe
                Filesize

                207KB

                MD5

                c5796a194b83d7d9be78ebae3c932adb

                SHA1

                907fc6a848be5eecc3c358808872f72af824b532

                SHA256

                ea2a2ba9b9c28b9accc11c1621a69c4b741ea3a9e2d468db6a67ebc54fec4952

                SHA512

                3c9ed9099ad33985f44e6c841b6102b9b1a584ccd3d6f91312ef24b578e501df3066b5251aa01ac6ed0460b4bf07a7c36ad6cc3d50c0bc4018041563b15949d6

              • C:\Users\Admin\AppData\Local\Temp\tmp87A.tmp.exe
                Filesize

                12KB

                MD5

                38c172779d4e1e0f068ca12d3cc6e2be

                SHA1

                81d61a9bf67a540b091c6f783f00864e905da0c5

                SHA256

                4c9476ece1e4f648cc820d1d8b66b99fc8d64d24ebb97a0db6c4845ac22bb480

                SHA512

                c774a1e266379f10633ddd16ad2402367b6a5372c5aaf92bea9e4b471cd3982cc0b2d6a0b1082eb210943ff8d8f15d58d28421bb484bf54f5d4c81eecfefd5e2

              • C:\Users\Admin\AppData\Local\Temp\tmp87A.tmp.exe
                Filesize

                12KB

                MD5

                38c172779d4e1e0f068ca12d3cc6e2be

                SHA1

                81d61a9bf67a540b091c6f783f00864e905da0c5

                SHA256

                4c9476ece1e4f648cc820d1d8b66b99fc8d64d24ebb97a0db6c4845ac22bb480

                SHA512

                c774a1e266379f10633ddd16ad2402367b6a5372c5aaf92bea9e4b471cd3982cc0b2d6a0b1082eb210943ff8d8f15d58d28421bb484bf54f5d4c81eecfefd5e2

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
                Filesize

                7KB

                MD5

                0f845f4cea15f304b0f8030e619885cd

                SHA1

                6159eb2046b311a28de2379c54f0922b095c8d0b

                SHA256

                d2ca75eea9d741fbd0566bddfe6ccd9077b15fc383d08123dd067b8206d93a82

                SHA512

                23bd963afdd5a0c28d57ea573a133c289af281add7d13a1544ad9b53c564b86d5843fbf922470642054a012d0ceaf68ffd96903d6e07a096f1169c83546df38a

              • C:\Users\Admin\AppData\Roaming\Update\New.exe
                Filesize

                3.9MB

                MD5

                7185dd04ba69eac4b0c2b269843cfae3

                SHA1

                47427c2fb4e1a097304f801a9dc6815b84fa1519

                SHA256

                e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1

                SHA512

                150a4450de27b0338628a88d66dc595dac942bd2e8dd5aab4c6bd5f340bfaeddc08f38bcc4b1991d67fa29178779718fc19676b65031b992f3db030eba281ce5

              • C:\Users\Admin\AppData\Roaming\Update\New.exe
                Filesize

                3.9MB

                MD5

                7185dd04ba69eac4b0c2b269843cfae3

                SHA1

                47427c2fb4e1a097304f801a9dc6815b84fa1519

                SHA256

                e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1

                SHA512

                150a4450de27b0338628a88d66dc595dac942bd2e8dd5aab4c6bd5f340bfaeddc08f38bcc4b1991d67fa29178779718fc19676b65031b992f3db030eba281ce5

              • C:\Users\Admin\AppData\Roaming\Update\New.exe
                Filesize

                3.9MB

                MD5

                7185dd04ba69eac4b0c2b269843cfae3

                SHA1

                47427c2fb4e1a097304f801a9dc6815b84fa1519

                SHA256

                e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1

                SHA512

                150a4450de27b0338628a88d66dc595dac942bd2e8dd5aab4c6bd5f340bfaeddc08f38bcc4b1991d67fa29178779718fc19676b65031b992f3db030eba281ce5

              • C:\Users\Admin\AppData\Roaming\Update\New.exe
                Filesize

                3.9MB

                MD5

                7185dd04ba69eac4b0c2b269843cfae3

                SHA1

                47427c2fb4e1a097304f801a9dc6815b84fa1519

                SHA256

                e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1

                SHA512

                150a4450de27b0338628a88d66dc595dac942bd2e8dd5aab4c6bd5f340bfaeddc08f38bcc4b1991d67fa29178779718fc19676b65031b992f3db030eba281ce5

              • C:\Users\Admin\AppData\Roaming\Update\New.exe
                Filesize

                3.9MB

                MD5

                7185dd04ba69eac4b0c2b269843cfae3

                SHA1

                47427c2fb4e1a097304f801a9dc6815b84fa1519

                SHA256

                e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1

                SHA512

                150a4450de27b0338628a88d66dc595dac942bd2e8dd5aab4c6bd5f340bfaeddc08f38bcc4b1991d67fa29178779718fc19676b65031b992f3db030eba281ce5

              • C:\Users\Admin\AppData\Roaming\Update\New.exe
                Filesize

                3.9MB

                MD5

                7185dd04ba69eac4b0c2b269843cfae3

                SHA1

                47427c2fb4e1a097304f801a9dc6815b84fa1519

                SHA256

                e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1

                SHA512

                150a4450de27b0338628a88d66dc595dac942bd2e8dd5aab4c6bd5f340bfaeddc08f38bcc4b1991d67fa29178779718fc19676b65031b992f3db030eba281ce5

              • C:\Users\Admin\AppData\Roaming\Update\New.exe
                Filesize

                3.9MB

                MD5

                7185dd04ba69eac4b0c2b269843cfae3

                SHA1

                47427c2fb4e1a097304f801a9dc6815b84fa1519

                SHA256

                e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1

                SHA512

                150a4450de27b0338628a88d66dc595dac942bd2e8dd5aab4c6bd5f340bfaeddc08f38bcc4b1991d67fa29178779718fc19676b65031b992f3db030eba281ce5

              • C:\Users\Admin\AppData\Roaming\Update\New.exe
                Filesize

                3.9MB

                MD5

                7185dd04ba69eac4b0c2b269843cfae3

                SHA1

                47427c2fb4e1a097304f801a9dc6815b84fa1519

                SHA256

                e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1

                SHA512

                150a4450de27b0338628a88d66dc595dac942bd2e8dd5aab4c6bd5f340bfaeddc08f38bcc4b1991d67fa29178779718fc19676b65031b992f3db030eba281ce5

              • C:\Users\Admin\AppData\Roaming\Update\New.exe
                Filesize

                3.9MB

                MD5

                7185dd04ba69eac4b0c2b269843cfae3

                SHA1

                47427c2fb4e1a097304f801a9dc6815b84fa1519

                SHA256

                e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1

                SHA512

                150a4450de27b0338628a88d66dc595dac942bd2e8dd5aab4c6bd5f340bfaeddc08f38bcc4b1991d67fa29178779718fc19676b65031b992f3db030eba281ce5

              • C:\Users\Admin\AppData\Roaming\Update\New.exe
                Filesize

                3.9MB

                MD5

                7185dd04ba69eac4b0c2b269843cfae3

                SHA1

                47427c2fb4e1a097304f801a9dc6815b84fa1519

                SHA256

                e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1

                SHA512

                150a4450de27b0338628a88d66dc595dac942bd2e8dd5aab4c6bd5f340bfaeddc08f38bcc4b1991d67fa29178779718fc19676b65031b992f3db030eba281ce5

              • C:\Users\Admin\AppData\Roaming\Update\New.exe.config
                Filesize

                357B

                MD5

                a2b76cea3a59fa9af5ea21ff68139c98

                SHA1

                35d76475e6a54c168f536e30206578babff58274

                SHA256

                f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

                SHA512

                b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

              • C:\Users\Admin\AppData\Roaming\Windows Updater\Dupper.exe
                Filesize

                919KB

                MD5

                534c91207fbf2d8704e59f89635f641f

                SHA1

                baf2394a7fb795dd7f27f7c03615a03aa589a728

                SHA256

                7180f4b208166abe96390387eb8172426f6087329955a32f84f4d62c7f2ffd27

                SHA512

                9f16e2b43455da00a9028d8485c66b67ef9395a2ee43d20706736699984af2f380375fa5ccd35b99c789ead48df79ca2ed93b10724d21333e40ec97a2c520518

              • C:\Users\Admin\AppData\Roaming\Windows Updater\Dupper.exe
                Filesize

                919KB

                MD5

                534c91207fbf2d8704e59f89635f641f

                SHA1

                baf2394a7fb795dd7f27f7c03615a03aa589a728

                SHA256

                7180f4b208166abe96390387eb8172426f6087329955a32f84f4d62c7f2ffd27

                SHA512

                9f16e2b43455da00a9028d8485c66b67ef9395a2ee43d20706736699984af2f380375fa5ccd35b99c789ead48df79ca2ed93b10724d21333e40ec97a2c520518

              • C:\Users\Admin\AppData\Roaming\Windows Updater\Dupper.exe
                Filesize

                919KB

                MD5

                534c91207fbf2d8704e59f89635f641f

                SHA1

                baf2394a7fb795dd7f27f7c03615a03aa589a728

                SHA256

                7180f4b208166abe96390387eb8172426f6087329955a32f84f4d62c7f2ffd27

                SHA512

                9f16e2b43455da00a9028d8485c66b67ef9395a2ee43d20706736699984af2f380375fa5ccd35b99c789ead48df79ca2ed93b10724d21333e40ec97a2c520518

              • C:\Users\Admin\AppData\Roaming\Windows Updater\Dupper.exe.config
                Filesize

                357B

                MD5

                a2b76cea3a59fa9af5ea21ff68139c98

                SHA1

                35d76475e6a54c168f536e30206578babff58274

                SHA256

                f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

                SHA512

                b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

              • C:\Windows\SysWOW64\WinInput.exe
                Filesize

                21KB

                MD5

                e6fcf516d8ed8d0d4427f86e08d0d435

                SHA1

                c7691731583ab7890086635cb7f3e4c22ca5e409

                SHA256

                8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

                SHA512

                c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

              • C:\Windows\SysWOW64\WinInput.exe
                Filesize

                21KB

                MD5

                e6fcf516d8ed8d0d4427f86e08d0d435

                SHA1

                c7691731583ab7890086635cb7f3e4c22ca5e409

                SHA256

                8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

                SHA512

                c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

              • C:\Windows\SysWOW64\WinInput.exe.config
                Filesize

                357B

                MD5

                a2b76cea3a59fa9af5ea21ff68139c98

                SHA1

                35d76475e6a54c168f536e30206578babff58274

                SHA256

                f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

                SHA512

                b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

              • C:\Windows\SysWOW64\WindowsInput.exe
                Filesize

                21KB

                MD5

                e6fcf516d8ed8d0d4427f86e08d0d435

                SHA1

                c7691731583ab7890086635cb7f3e4c22ca5e409

                SHA256

                8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

                SHA512

                c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

              • C:\Windows\SysWOW64\WindowsInput.exe
                Filesize

                21KB

                MD5

                e6fcf516d8ed8d0d4427f86e08d0d435

                SHA1

                c7691731583ab7890086635cb7f3e4c22ca5e409

                SHA256

                8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

                SHA512

                c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

              • C:\Windows\SysWOW64\WindowsInput.exe
                Filesize

                21KB

                MD5

                e6fcf516d8ed8d0d4427f86e08d0d435

                SHA1

                c7691731583ab7890086635cb7f3e4c22ca5e409

                SHA256

                8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

                SHA512

                c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

              • C:\Windows\SysWOW64\WindowsInput.exe.config
                Filesize

                357B

                MD5

                a2b76cea3a59fa9af5ea21ff68139c98

                SHA1

                35d76475e6a54c168f536e30206578babff58274

                SHA256

                f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

                SHA512

                b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

              • C:\Windows\Temp\asw.49fa17ce2df433de\avast_free_antivirus_setup_online_x64.exe
                Filesize

                9.0MB

                MD5

                813ce294cde985d23e702feb83583398

                SHA1

                12c37bd0af867cc782a755a0978a782c411ab470

                SHA256

                ea9f4109c72336ed73dd4e7ad7dd788a9c639bda5bd462b3fc85a09c0caa3fc9

                SHA512

                8a8352919c19c3549b1e86fabb6644d1cb27c66f5bab95f9a379e6883802c28b526fd5d7a2f9e0d35c0f5a5665aace7695f8875d99bc66c745083072beaf1e62

              • C:\Windows\Temp\asw.49fa17ce2df433de\avast_free_antivirus_setup_online_x64.exe
                Filesize

                9.0MB

                MD5

                813ce294cde985d23e702feb83583398

                SHA1

                12c37bd0af867cc782a755a0978a782c411ab470

                SHA256

                ea9f4109c72336ed73dd4e7ad7dd788a9c639bda5bd462b3fc85a09c0caa3fc9

                SHA512

                8a8352919c19c3549b1e86fabb6644d1cb27c66f5bab95f9a379e6883802c28b526fd5d7a2f9e0d35c0f5a5665aace7695f8875d99bc66c745083072beaf1e62

              • C:\Windows\Temp\asw.49fa17ce2df433de\ecoo.edat
                Filesize

                21B

                MD5

                771e513ebce674f41884e0a15a5a1ade

                SHA1

                6ae2a0172b8c4de66e9835c837a749a922fa8961

                SHA256

                1b2eb0068936a5d999352cb6772f7372f2bdd5e0d26b8cff3fc52a2661dbd827

                SHA512

                f44497052d9dd55e6e4e530e79486080817dd513f3ce7f6f94a92512e220f71625da9294629110d40ce3d9397278b860f6fbbd8d470927c93cbf4abe0cebe744

              • \Users\Admin\AppData\Local\Temp\Updater.exe
                Filesize

                9KB

                MD5

                913967b216326e36a08010fb70f9dba3

                SHA1

                7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

                SHA256

                8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

                SHA512

                c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

              • \Users\Admin\AppData\Local\Temp\Updater.exe
                Filesize

                9KB

                MD5

                913967b216326e36a08010fb70f9dba3

                SHA1

                7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

                SHA256

                8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

                SHA512

                c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

              • \Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe
                Filesize

                5.6MB

                MD5

                b1f83a48685c830a9eefe83ff114e86d

                SHA1

                7a27f05059673762a4759e75915aa3dacdfea62d

                SHA256

                cce0cc648ab563887b0fb4bf5087554da0386255c38041edd17dbb6d5d628018

                SHA512

                d00d1a8b69665d04791cd8986c829c4d4a247a9ff8ae28434d929f96428efa037f0027ddcd1367e716685dcf16543f883c4850c6825de355e9d404579604088c

              • \Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe
                Filesize

                5.6MB

                MD5

                b1f83a48685c830a9eefe83ff114e86d

                SHA1

                7a27f05059673762a4759e75915aa3dacdfea62d

                SHA256

                cce0cc648ab563887b0fb4bf5087554da0386255c38041edd17dbb6d5d628018

                SHA512

                d00d1a8b69665d04791cd8986c829c4d4a247a9ff8ae28434d929f96428efa037f0027ddcd1367e716685dcf16543f883c4850c6825de355e9d404579604088c

              • \Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe
                Filesize

                5.6MB

                MD5

                b1f83a48685c830a9eefe83ff114e86d

                SHA1

                7a27f05059673762a4759e75915aa3dacdfea62d

                SHA256

                cce0cc648ab563887b0fb4bf5087554da0386255c38041edd17dbb6d5d628018

                SHA512

                d00d1a8b69665d04791cd8986c829c4d4a247a9ff8ae28434d929f96428efa037f0027ddcd1367e716685dcf16543f883c4850c6825de355e9d404579604088c

              • \Users\Admin\AppData\Local\Temp\c1u3rvt0t2e.exe
                Filesize

                5.6MB

                MD5

                b1f83a48685c830a9eefe83ff114e86d

                SHA1

                7a27f05059673762a4759e75915aa3dacdfea62d

                SHA256

                cce0cc648ab563887b0fb4bf5087554da0386255c38041edd17dbb6d5d628018

                SHA512

                d00d1a8b69665d04791cd8986c829c4d4a247a9ff8ae28434d929f96428efa037f0027ddcd1367e716685dcf16543f883c4850c6825de355e9d404579604088c

              • \Users\Admin\AppData\Local\Temp\tmp1536.tmp.exe
                Filesize

                919KB

                MD5

                534c91207fbf2d8704e59f89635f641f

                SHA1

                baf2394a7fb795dd7f27f7c03615a03aa589a728

                SHA256

                7180f4b208166abe96390387eb8172426f6087329955a32f84f4d62c7f2ffd27

                SHA512

                9f16e2b43455da00a9028d8485c66b67ef9395a2ee43d20706736699984af2f380375fa5ccd35b99c789ead48df79ca2ed93b10724d21333e40ec97a2c520518

              • \Users\Admin\AppData\Local\Temp\tmp2953.tmp.exe
                Filesize

                12KB

                MD5

                38c172779d4e1e0f068ca12d3cc6e2be

                SHA1

                81d61a9bf67a540b091c6f783f00864e905da0c5

                SHA256

                4c9476ece1e4f648cc820d1d8b66b99fc8d64d24ebb97a0db6c4845ac22bb480

                SHA512

                c774a1e266379f10633ddd16ad2402367b6a5372c5aaf92bea9e4b471cd3982cc0b2d6a0b1082eb210943ff8d8f15d58d28421bb484bf54f5d4c81eecfefd5e2

              • \Users\Admin\AppData\Local\Temp\tmp32C5.tmp.exe
                Filesize

                207KB

                MD5

                c5796a194b83d7d9be78ebae3c932adb

                SHA1

                907fc6a848be5eecc3c358808872f72af824b532

                SHA256

                ea2a2ba9b9c28b9accc11c1621a69c4b741ea3a9e2d468db6a67ebc54fec4952

                SHA512

                3c9ed9099ad33985f44e6c841b6102b9b1a584ccd3d6f91312ef24b578e501df3066b5251aa01ac6ed0460b4bf07a7c36ad6cc3d50c0bc4018041563b15949d6

              • \Users\Admin\AppData\Local\Temp\tmp87A.tmp.exe
                Filesize

                12KB

                MD5

                38c172779d4e1e0f068ca12d3cc6e2be

                SHA1

                81d61a9bf67a540b091c6f783f00864e905da0c5

                SHA256

                4c9476ece1e4f648cc820d1d8b66b99fc8d64d24ebb97a0db6c4845ac22bb480

                SHA512

                c774a1e266379f10633ddd16ad2402367b6a5372c5aaf92bea9e4b471cd3982cc0b2d6a0b1082eb210943ff8d8f15d58d28421bb484bf54f5d4c81eecfefd5e2

              • \Users\Admin\AppData\Roaming\Update\New.exe
                Filesize

                3.9MB

                MD5

                7185dd04ba69eac4b0c2b269843cfae3

                SHA1

                47427c2fb4e1a097304f801a9dc6815b84fa1519

                SHA256

                e65f0af765d6f45dca86b41090d47d66b9a1cef14e516e75504d8222277df8b1

                SHA512

                150a4450de27b0338628a88d66dc595dac942bd2e8dd5aab4c6bd5f340bfaeddc08f38bcc4b1991d67fa29178779718fc19676b65031b992f3db030eba281ce5

              • \Users\Admin\AppData\Roaming\Windows Updater\Dupper.exe
                Filesize

                919KB

                MD5

                534c91207fbf2d8704e59f89635f641f

                SHA1

                baf2394a7fb795dd7f27f7c03615a03aa589a728

                SHA256

                7180f4b208166abe96390387eb8172426f6087329955a32f84f4d62c7f2ffd27

                SHA512

                9f16e2b43455da00a9028d8485c66b67ef9395a2ee43d20706736699984af2f380375fa5ccd35b99c789ead48df79ca2ed93b10724d21333e40ec97a2c520518

              • \Windows\SysWOW64\WinInput.exe
                Filesize

                21KB

                MD5

                e6fcf516d8ed8d0d4427f86e08d0d435

                SHA1

                c7691731583ab7890086635cb7f3e4c22ca5e409

                SHA256

                8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

                SHA512

                c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

              • \Windows\SysWOW64\WindowsInput.exe
                Filesize

                21KB

                MD5

                e6fcf516d8ed8d0d4427f86e08d0d435

                SHA1

                c7691731583ab7890086635cb7f3e4c22ca5e409

                SHA256

                8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

                SHA512

                c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

              • \Windows\Temp\asw.49fa17ce2df433de\avast_free_antivirus_setup_online_x64.exe
                Filesize

                9.0MB

                MD5

                813ce294cde985d23e702feb83583398

                SHA1

                12c37bd0af867cc782a755a0978a782c411ab470

                SHA256

                ea9f4109c72336ed73dd4e7ad7dd788a9c639bda5bd462b3fc85a09c0caa3fc9

                SHA512

                8a8352919c19c3549b1e86fabb6644d1cb27c66f5bab95f9a379e6883802c28b526fd5d7a2f9e0d35c0f5a5665aace7695f8875d99bc66c745083072beaf1e62

              • \Windows\Temp\asw.49fa17ce2df433de\avast_free_antivirus_setup_online_x64.exe
                Filesize

                9.0MB

                MD5

                813ce294cde985d23e702feb83583398

                SHA1

                12c37bd0af867cc782a755a0978a782c411ab470

                SHA256

                ea9f4109c72336ed73dd4e7ad7dd788a9c639bda5bd462b3fc85a09c0caa3fc9

                SHA512

                8a8352919c19c3549b1e86fabb6644d1cb27c66f5bab95f9a379e6883802c28b526fd5d7a2f9e0d35c0f5a5665aace7695f8875d99bc66c745083072beaf1e62

              • \Windows\Temp\asw.49fa17ce2df433de\avast_free_antivirus_setup_online_x64.exe
                Filesize

                9.0MB

                MD5

                813ce294cde985d23e702feb83583398

                SHA1

                12c37bd0af867cc782a755a0978a782c411ab470

                SHA256

                ea9f4109c72336ed73dd4e7ad7dd788a9c639bda5bd462b3fc85a09c0caa3fc9

                SHA512

                8a8352919c19c3549b1e86fabb6644d1cb27c66f5bab95f9a379e6883802c28b526fd5d7a2f9e0d35c0f5a5665aace7695f8875d99bc66c745083072beaf1e62

              • \Windows\Temp\asw.49fa17ce2df433de\avast_free_antivirus_setup_online_x64.exe
                Filesize

                9.0MB

                MD5

                813ce294cde985d23e702feb83583398

                SHA1

                12c37bd0af867cc782a755a0978a782c411ab470

                SHA256

                ea9f4109c72336ed73dd4e7ad7dd788a9c639bda5bd462b3fc85a09c0caa3fc9

                SHA512

                8a8352919c19c3549b1e86fabb6644d1cb27c66f5bab95f9a379e6883802c28b526fd5d7a2f9e0d35c0f5a5665aace7695f8875d99bc66c745083072beaf1e62

              • \Windows\Temp\asw.49fa17ce2df433de\avast_free_antivirus_setup_online_x64.exe
                Filesize

                9.0MB

                MD5

                813ce294cde985d23e702feb83583398

                SHA1

                12c37bd0af867cc782a755a0978a782c411ab470

                SHA256

                ea9f4109c72336ed73dd4e7ad7dd788a9c639bda5bd462b3fc85a09c0caa3fc9

                SHA512

                8a8352919c19c3549b1e86fabb6644d1cb27c66f5bab95f9a379e6883802c28b526fd5d7a2f9e0d35c0f5a5665aace7695f8875d99bc66c745083072beaf1e62

              • \Windows\Temp\asw.49fa17ce2df433de\avast_free_antivirus_setup_online_x64.exe
                Filesize

                9.0MB

                MD5

                813ce294cde985d23e702feb83583398

                SHA1

                12c37bd0af867cc782a755a0978a782c411ab470

                SHA256

                ea9f4109c72336ed73dd4e7ad7dd788a9c639bda5bd462b3fc85a09c0caa3fc9

                SHA512

                8a8352919c19c3549b1e86fabb6644d1cb27c66f5bab95f9a379e6883802c28b526fd5d7a2f9e0d35c0f5a5665aace7695f8875d99bc66c745083072beaf1e62

              • \Windows\Temp\asw.49fa17ce2df433de\avast_free_antivirus_setup_online_x64.exe
                Filesize

                9.0MB

                MD5

                813ce294cde985d23e702feb83583398

                SHA1

                12c37bd0af867cc782a755a0978a782c411ab470

                SHA256

                ea9f4109c72336ed73dd4e7ad7dd788a9c639bda5bd462b3fc85a09c0caa3fc9

                SHA512

                8a8352919c19c3549b1e86fabb6644d1cb27c66f5bab95f9a379e6883802c28b526fd5d7a2f9e0d35c0f5a5665aace7695f8875d99bc66c745083072beaf1e62

              • \Windows\Temp\asw.ef4cafe26cd9ee89\Instup.exe
                Filesize

                3.3MB

                MD5

                aab5a2908dec13e7fdccec04917719b7

                SHA1

                2a1c4364b82c8a077d7d408cd08714d6d043a247

                SHA256

                c4c47ad7fe4f45fb2cb5aeeaafdfbfb2ce29c2a588e7554987d4d25dff6357ba

                SHA512

                632411fef54f04d7eae2fe34a357993b473a75f16c137780745858c922d2fd3b3ee134ce314a4db4033a3ea1f7cc9454bd9f60bd4bbf070bc27f9ca7e795ef3f

              • memory/280-295-0x0000000000000000-mapping.dmp
              • memory/364-123-0x0000000000520BCE-mapping.dmp
              • memory/364-128-0x0000000000400000-0x000000000052A000-memory.dmp
                Filesize

                1.2MB

              • memory/364-109-0x0000000000400000-0x000000000052A000-memory.dmp
                Filesize

                1.2MB

              • memory/364-110-0x0000000000400000-0x000000000052A000-memory.dmp
                Filesize

                1.2MB

              • memory/364-114-0x0000000000400000-0x000000000052A000-memory.dmp
                Filesize

                1.2MB

              • memory/364-132-0x0000000000400000-0x000000000052A000-memory.dmp
                Filesize

                1.2MB

              • memory/364-121-0x0000000000400000-0x000000000052A000-memory.dmp
                Filesize

                1.2MB

              • memory/364-122-0x0000000000400000-0x000000000052A000-memory.dmp
                Filesize

                1.2MB

              • memory/428-155-0x0000000000000000-mapping.dmp
              • memory/524-238-0x0000000000000000-mapping.dmp
              • memory/564-283-0x0000000000EA0000-0x0000000000EA8000-memory.dmp
                Filesize

                32KB

              • memory/564-277-0x0000000000000000-mapping.dmp
              • memory/568-165-0x0000000000000000-mapping.dmp
              • memory/852-313-0x0000000000000000-mapping.dmp
              • memory/936-175-0x0000000000D90000-0x0000000000D9C000-memory.dmp
                Filesize

                48KB

              • memory/936-171-0x0000000000000000-mapping.dmp
              • memory/1004-187-0x0000000000020000-0x000000000002C000-memory.dmp
                Filesize

                48KB

              • memory/1004-177-0x0000000000000000-mapping.dmp
              • memory/1084-162-0x0000000000400000-0x00000000004EC000-memory.dmp
                Filesize

                944KB

              • memory/1084-151-0x0000000000400000-0x00000000004EC000-memory.dmp
                Filesize

                944KB

              • memory/1084-157-0x00000000004E6BFE-mapping.dmp
              • memory/1084-149-0x0000000000400000-0x00000000004EC000-memory.dmp
                Filesize

                944KB

              • memory/1084-167-0x0000000000400000-0x00000000004EC000-memory.dmp
                Filesize

                944KB

              • memory/1084-145-0x0000000000400000-0x00000000004EC000-memory.dmp
                Filesize

                944KB

              • memory/1084-152-0x0000000000400000-0x00000000004EC000-memory.dmp
                Filesize

                944KB

              • memory/1084-141-0x0000000000400000-0x00000000004EC000-memory.dmp
                Filesize

                944KB

              • memory/1092-143-0x000007FEED930000-0x000007FEEE48D000-memory.dmp
                Filesize

                11.4MB

              • memory/1092-120-0x0000000000000000-mapping.dmp
              • memory/1092-137-0x000007FEEE490000-0x000007FEEEEB3000-memory.dmp
                Filesize

                10.1MB

              • memory/1092-156-0x0000000002370000-0x00000000023F0000-memory.dmp
                Filesize

                512KB

              • memory/1092-203-0x0000000002370000-0x00000000023F0000-memory.dmp
                Filesize

                512KB

              • memory/1108-258-0x00000000007CD54E-mapping.dmp
              • memory/1108-300-0x0000000000000000-mapping.dmp
              • memory/1108-306-0x00000000000C0000-0x00000000001F6000-memory.dmp
                Filesize

                1.2MB

              • memory/1172-226-0x00000000004E38CE-mapping.dmp
              • memory/1172-101-0x0000000000000000-mapping.dmp
              • memory/1172-104-0x0000000000E50000-0x0000000000F86000-memory.dmp
                Filesize

                1.2MB

              • memory/1172-240-0x00000000046B0000-0x00000000046C0000-memory.dmp
                Filesize

                64KB

              • memory/1172-239-0x0000000004670000-0x0000000004688000-memory.dmp
                Filesize

                96KB

              • memory/1172-235-0x00000000024A0000-0x00000000024EE000-memory.dmp
                Filesize

                312KB

              • memory/1224-113-0x0000000000000000-mapping.dmp
              • memory/1224-117-0x0000000001340000-0x0000000001348000-memory.dmp
                Filesize

                32KB

              • memory/1372-234-0x0000000000000000-mapping.dmp
              • memory/1392-241-0x0000000000000000-mapping.dmp
              • memory/1396-153-0x0000000000000000-mapping.dmp
              • memory/1476-95-0x0000000000410000-0x000000000046C000-memory.dmp
                Filesize

                368KB

              • memory/1476-166-0x00000000004E0000-0x00000000004F2000-memory.dmp
                Filesize

                72KB

              • memory/1476-94-0x0000000000200000-0x000000000020E000-memory.dmp
                Filesize

                56KB

              • memory/1476-82-0x0000000000000000-mapping.dmp
              • memory/1476-90-0x00000000011D0000-0x00000000012BC000-memory.dmp
                Filesize

                944KB

              • memory/1476-308-0x00000000004E38CE-mapping.dmp
              • memory/1496-250-0x0000000000740000-0x0000000000752000-memory.dmp
                Filesize

                72KB

              • memory/1496-248-0x0000000000030000-0x000000000011C000-memory.dmp
                Filesize

                944KB

              • memory/1496-244-0x0000000000000000-mapping.dmp
              • memory/1500-84-0x0000000000400000-0x00000000006E4000-memory.dmp
                Filesize

                2.9MB

              • memory/1500-119-0x0000000000860000-0x0000000000868000-memory.dmp
                Filesize

                32KB

              • memory/1500-79-0x0000000000400000-0x00000000006E4000-memory.dmp
                Filesize

                2.9MB

              • memory/1500-88-0x00000000006DE43E-mapping.dmp
              • memory/1500-93-0x0000000000400000-0x00000000006E4000-memory.dmp
                Filesize

                2.9MB

              • memory/1500-91-0x0000000000400000-0x00000000006E4000-memory.dmp
                Filesize

                2.9MB

              • memory/1500-83-0x0000000000400000-0x00000000006E4000-memory.dmp
                Filesize

                2.9MB

              • memory/1500-87-0x0000000000400000-0x00000000006E4000-memory.dmp
                Filesize

                2.9MB

              • memory/1500-78-0x0000000000400000-0x00000000006E4000-memory.dmp
                Filesize

                2.9MB

              • memory/1580-179-0x0000000000000000-mapping.dmp
              • memory/1580-186-0x0000000000B00000-0x0000000000EE8000-memory.dmp
                Filesize

                3.9MB

              • memory/1744-61-0x00000000013E0000-0x00000000013E8000-memory.dmp
                Filesize

                32KB

              • memory/1744-58-0x0000000000000000-mapping.dmp
              • memory/1760-97-0x000007FEED930000-0x000007FEEE48D000-memory.dmp
                Filesize

                11.4MB

              • memory/1760-75-0x000007FEFBFE1000-0x000007FEFBFE3000-memory.dmp
                Filesize

                8KB

              • memory/1760-74-0x0000000000000000-mapping.dmp
              • memory/1760-98-0x0000000002744000-0x0000000002747000-memory.dmp
                Filesize

                12KB

              • memory/1760-202-0x000000000274B000-0x000000000276A000-memory.dmp
                Filesize

                124KB

              • memory/1760-77-0x000007FEEE490000-0x000007FEEEEB3000-memory.dmp
                Filesize

                10.1MB

              • memory/1780-229-0x0000000000000000-mapping.dmp
              • memory/1796-298-0x0000000000000000-mapping.dmp
              • memory/1924-264-0x0000000000000000-mapping.dmp
              • memory/1944-56-0x00000000004E0000-0x00000000004EA000-memory.dmp
                Filesize

                40KB

              • memory/1944-55-0x00000000753C1000-0x00000000753C3000-memory.dmp
                Filesize

                8KB

              • memory/1944-210-0x00000000006DE43E-mapping.dmp
              • memory/1944-54-0x0000000000AE0000-0x0000000000EC8000-memory.dmp
                Filesize

                3.9MB

              • memory/1952-273-0x00000000006DE43E-mapping.dmp
              • memory/1960-196-0x00000000007CD54E-mapping.dmp
              • memory/1964-218-0x0000000000000000-mapping.dmp
              • memory/2000-67-0x0000000000400000-0x00000000007D6000-memory.dmp
                Filesize

                3.8MB

              • memory/2000-62-0x0000000000400000-0x00000000007D6000-memory.dmp
                Filesize

                3.8MB

              • memory/2000-68-0x0000000000400000-0x00000000007D6000-memory.dmp
                Filesize

                3.8MB

              • memory/2000-63-0x0000000000400000-0x00000000007D6000-memory.dmp
                Filesize

                3.8MB

              • memory/2000-69-0x00000000007CD54E-mapping.dmp
              • memory/2000-71-0x0000000000400000-0x00000000007D6000-memory.dmp
                Filesize

                3.8MB

              • memory/2000-73-0x0000000000400000-0x00000000007D6000-memory.dmp
                Filesize

                3.8MB

              • memory/2000-65-0x0000000000400000-0x00000000007D6000-memory.dmp
                Filesize

                3.8MB

              • memory/2016-140-0x00000000004E38CE-mapping.dmp
              • memory/2016-136-0x0000000000400000-0x00000000004E8000-memory.dmp
                Filesize

                928KB

              • memory/2016-146-0x0000000000400000-0x00000000004E8000-memory.dmp
                Filesize

                928KB

              • memory/2016-138-0x0000000000400000-0x00000000004E8000-memory.dmp
                Filesize

                928KB

              • memory/2016-134-0x0000000000400000-0x00000000004E8000-memory.dmp
                Filesize

                928KB

              • memory/2016-130-0x0000000000400000-0x00000000004E8000-memory.dmp
                Filesize

                928KB

              • memory/2016-150-0x0000000000400000-0x00000000004E8000-memory.dmp
                Filesize

                928KB

              • memory/2016-127-0x0000000000400000-0x00000000004E8000-memory.dmp
                Filesize

                928KB

              • memory/2040-286-0x0000000000000000-mapping.dmp
              • memory/2104-388-0x00000000006DE43E-mapping.dmp
              • memory/2108-315-0x0000000000000000-mapping.dmp
              • memory/2144-323-0x00000000007CD54E-mapping.dmp
              • memory/2212-405-0x0000000000000000-mapping.dmp
              • memory/2224-399-0x00000000004E38CE-mapping.dmp
              • memory/2240-334-0x00000000006DE43E-mapping.dmp
              • memory/2252-400-0x0000000000000000-mapping.dmp
              • memory/2344-345-0x00000000004E38CE-mapping.dmp
              • memory/2392-350-0x0000000000000000-mapping.dmp
              • memory/2448-351-0x0000000000000000-mapping.dmp
              • memory/2576-353-0x0000000000000000-mapping.dmp
              • memory/2776-355-0x0000000000000000-mapping.dmp
              • memory/2792-357-0x0000000000000000-mapping.dmp
              • memory/2808-359-0x0000000000000000-mapping.dmp
              • memory/2824-361-0x0000000000000000-mapping.dmp
              • memory/2904-364-0x0000000000000000-mapping.dmp
              • memory/2936-367-0x0000000000000000-mapping.dmp
              • memory/3012-369-0x0000000000000000-mapping.dmp
              • memory/3040-377-0x00000000007CD54E-mapping.dmp