Analysis

  • max time kernel
    143s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-06-2022 13:17

General

  • Target

    ppx.ps1

  • Size

    1.0MB

  • MD5

    e579b1afc9c6bf6f25f461fc8f96c349

  • SHA1

    c6b10e55440832e2b9877c05e77b2c93585f507d

  • SHA256

    249fa3bc0b500df45b167912505c5edffeac8681e3d4708e92e97340f155da67

  • SHA512

    683804fdbda25be2763726d49ee0186959c7e2d3b855c53ff74d42c6601c18cde7e1b8db547d11accbd34f3c326bcc8b43ebe71284cd5f681b855932bf34d12a

Malware Config

Extracted

Family

recordbreaker

C2

http://136.244.65.99/

http://140.82.52.55/

Extracted

Family

arkei

Botnet

Default

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • RecordBreaker

    RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

  • suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4

    suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4

  • suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil

    suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil

  • Downloads MZ/PE file
  • Executes dropped EXE 19 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 25 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ppx.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Public\ushk.exe
      "C:\Users\Public\ushk.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Users\Public\ushk.exe
        "C:\Users\Public\ushk.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe
          "C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe" 0
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1760
          • C:\Users\Admin\AppData\Roaming\fcvtee.exe
            "C:\Users\Admin\AppData\Roaming\fcvtee.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1068
            • C:\Users\Admin\AppData\Roaming\fcvtee.exe
              "C:\Users\Admin\AppData\Roaming\fcvtee.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks processor information in registry
              • Suspicious use of WriteProcessMemory
              PID:2040
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Roaming\fcvtee.exe" & exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1556
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 5
                  8⤵
                  • Delays execution with timeout.exe
                  PID:1604
          • C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe
            "C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe"
            5⤵
            • Executes dropped EXE
            PID:1652
        • C:\Users\Admin\AppData\Local\Temp\bvdeasfsds.exe
          "C:\Users\Admin\AppData\Local\Temp\bvdeasfsds.exe" 0
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1036
        • C:\Users\Admin\AppData\Local\Temp\vnbdfgfsds.exe
          "C:\Users\Admin\AppData\Local\Temp\vnbdfgfsds.exe" 0
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:564
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1780
          • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe
            "C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe"
            5⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1760
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1712
            • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe
              C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks processor information in registry
              PID:1072
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe" & exit
                7⤵
                  PID:804
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 5
                    8⤵
                    • Delays execution with timeout.exe
                    PID:1824
            • C:\Users\Admin\AppData\Local\Temp\vnbdfgfsds.exe
              C:\Users\Admin\AppData\Local\Temp\vnbdfgfsds.exe
              5⤵
              • Executes dropped EXE
              PID:1668
          • C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe
            "C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe" 0
            4⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:280
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1380
            • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe
              "C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe"
              5⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1716
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1752
              • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe
                C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks processor information in registry
                PID:536
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe" & exit
                  7⤵
                    PID:1388
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /t 5
                      8⤵
                      • Delays execution with timeout.exe
                      PID:972
              • C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe
                C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe
                5⤵
                • Executes dropped EXE
                PID:1084
              • C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe
                C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe
                5⤵
                • Executes dropped EXE
                PID:1040
              • C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe
                C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe
                5⤵
                • Executes dropped EXE
                PID:1892
              • C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe
                C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe
                5⤵
                • Executes dropped EXE
                PID:568
              • C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe
                C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe
                5⤵
                • Executes dropped EXE
                PID:960

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe

        Filesize

        21KB

        MD5

        f35a031075f711d05262e547d028ae86

        SHA1

        9c9e3bdf907fcfa959910cd9c752e297765ccf80

        SHA256

        3c0c5786499c54c8f99e689f7e1bfc129e4d10c3de58c7917fc73044e12346b9

        SHA512

        ff5235e388cc82f45e2dda4e93b66f752789b6cda1b6a4076af0171ab88ea422e8309a0f85abfa2d2e8ed5a760c3d83c4ec13fea9b566c0dd470a5c64c1a8a30

      • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe

        Filesize

        21KB

        MD5

        f35a031075f711d05262e547d028ae86

        SHA1

        9c9e3bdf907fcfa959910cd9c752e297765ccf80

        SHA256

        3c0c5786499c54c8f99e689f7e1bfc129e4d10c3de58c7917fc73044e12346b9

        SHA512

        ff5235e388cc82f45e2dda4e93b66f752789b6cda1b6a4076af0171ab88ea422e8309a0f85abfa2d2e8ed5a760c3d83c4ec13fea9b566c0dd470a5c64c1a8a30

      • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe

        Filesize

        21KB

        MD5

        f35a031075f711d05262e547d028ae86

        SHA1

        9c9e3bdf907fcfa959910cd9c752e297765ccf80

        SHA256

        3c0c5786499c54c8f99e689f7e1bfc129e4d10c3de58c7917fc73044e12346b9

        SHA512

        ff5235e388cc82f45e2dda4e93b66f752789b6cda1b6a4076af0171ab88ea422e8309a0f85abfa2d2e8ed5a760c3d83c4ec13fea9b566c0dd470a5c64c1a8a30

      • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe

        Filesize

        21KB

        MD5

        f35a031075f711d05262e547d028ae86

        SHA1

        9c9e3bdf907fcfa959910cd9c752e297765ccf80

        SHA256

        3c0c5786499c54c8f99e689f7e1bfc129e4d10c3de58c7917fc73044e12346b9

        SHA512

        ff5235e388cc82f45e2dda4e93b66f752789b6cda1b6a4076af0171ab88ea422e8309a0f85abfa2d2e8ed5a760c3d83c4ec13fea9b566c0dd470a5c64c1a8a30

      • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe

        Filesize

        21KB

        MD5

        f35a031075f711d05262e547d028ae86

        SHA1

        9c9e3bdf907fcfa959910cd9c752e297765ccf80

        SHA256

        3c0c5786499c54c8f99e689f7e1bfc129e4d10c3de58c7917fc73044e12346b9

        SHA512

        ff5235e388cc82f45e2dda4e93b66f752789b6cda1b6a4076af0171ab88ea422e8309a0f85abfa2d2e8ed5a760c3d83c4ec13fea9b566c0dd470a5c64c1a8a30

      • C:\Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe

        Filesize

        21KB

        MD5

        f35a031075f711d05262e547d028ae86

        SHA1

        9c9e3bdf907fcfa959910cd9c752e297765ccf80

        SHA256

        3c0c5786499c54c8f99e689f7e1bfc129e4d10c3de58c7917fc73044e12346b9

        SHA512

        ff5235e388cc82f45e2dda4e93b66f752789b6cda1b6a4076af0171ab88ea422e8309a0f85abfa2d2e8ed5a760c3d83c4ec13fea9b566c0dd470a5c64c1a8a30

      • C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe

        Filesize

        772KB

        MD5

        d946c183fd128b4acf88d83ee89d79d3

        SHA1

        6f35da72f339c7101e93a7adada27d24902db598

        SHA256

        529586cbbd8586d7f33a3ea9bdd517b7ead617b4e12165106e81e4bfad859474

        SHA512

        793727b08b92df108144308a7ac798e55ba35742308db18466cce6caa564b6c1cb5b0fece2850511450f69e497df1dba49a9cb3a0ff17b4f9cc27e05ef2fcd62

      • C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe

        Filesize

        772KB

        MD5

        d946c183fd128b4acf88d83ee89d79d3

        SHA1

        6f35da72f339c7101e93a7adada27d24902db598

        SHA256

        529586cbbd8586d7f33a3ea9bdd517b7ead617b4e12165106e81e4bfad859474

        SHA512

        793727b08b92df108144308a7ac798e55ba35742308db18466cce6caa564b6c1cb5b0fece2850511450f69e497df1dba49a9cb3a0ff17b4f9cc27e05ef2fcd62

      • C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe

        Filesize

        772KB

        MD5

        d946c183fd128b4acf88d83ee89d79d3

        SHA1

        6f35da72f339c7101e93a7adada27d24902db598

        SHA256

        529586cbbd8586d7f33a3ea9bdd517b7ead617b4e12165106e81e4bfad859474

        SHA512

        793727b08b92df108144308a7ac798e55ba35742308db18466cce6caa564b6c1cb5b0fece2850511450f69e497df1dba49a9cb3a0ff17b4f9cc27e05ef2fcd62

      • C:\Users\Admin\AppData\Local\Temp\bvdeasfsds.exe

        Filesize

        772KB

        MD5

        d946c183fd128b4acf88d83ee89d79d3

        SHA1

        6f35da72f339c7101e93a7adada27d24902db598

        SHA256

        529586cbbd8586d7f33a3ea9bdd517b7ead617b4e12165106e81e4bfad859474

        SHA512

        793727b08b92df108144308a7ac798e55ba35742308db18466cce6caa564b6c1cb5b0fece2850511450f69e497df1dba49a9cb3a0ff17b4f9cc27e05ef2fcd62

      • C:\Users\Admin\AppData\Local\Temp\vnbdfgfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • C:\Users\Admin\AppData\Local\Temp\vnbdfgfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • C:\Users\Admin\AppData\Local\Temp\vnbdfgfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        a3a2c45c99f2a915b557b1fd7896fd02

        SHA1

        cf470117444e68335932395d434ff8f1511ecdf3

        SHA256

        871b4ec664814141af5843af57984255918e77cd0f725ccf6c0766c814a1e245

        SHA512

        887a88af439eeb5c259497cb036e68d5ef99b51a0d8f66ccfaa56c88afd826f06ee8546868b7b9b9206d7772c8c2113c05acabdf75fe4f15d2a0ea0474380753

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        a3a2c45c99f2a915b557b1fd7896fd02

        SHA1

        cf470117444e68335932395d434ff8f1511ecdf3

        SHA256

        871b4ec664814141af5843af57984255918e77cd0f725ccf6c0766c814a1e245

        SHA512

        887a88af439eeb5c259497cb036e68d5ef99b51a0d8f66ccfaa56c88afd826f06ee8546868b7b9b9206d7772c8c2113c05acabdf75fe4f15d2a0ea0474380753

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        a3a2c45c99f2a915b557b1fd7896fd02

        SHA1

        cf470117444e68335932395d434ff8f1511ecdf3

        SHA256

        871b4ec664814141af5843af57984255918e77cd0f725ccf6c0766c814a1e245

        SHA512

        887a88af439eeb5c259497cb036e68d5ef99b51a0d8f66ccfaa56c88afd826f06ee8546868b7b9b9206d7772c8c2113c05acabdf75fe4f15d2a0ea0474380753

      • C:\Users\Admin\AppData\Roaming\fcvtee.exe

        Filesize

        392KB

        MD5

        32ab5685131d8bcfa172bf165adf9338

        SHA1

        5e3b167bc66a15c246a8f29f7b634cbe52731319

        SHA256

        2a0dc11c02495205fadbbb4a5a5304a9e77fd079dcab58daa04804a59e4cc87e

        SHA512

        c6a48a49427a260510f08e8fd93a626445e69659c6e60364308163c92866ed43f163fee3e3f44951466457331eb0804d6e97ba623cfab20b7ef52e74c5c3e437

      • C:\Users\Admin\AppData\Roaming\fcvtee.exe

        Filesize

        392KB

        MD5

        32ab5685131d8bcfa172bf165adf9338

        SHA1

        5e3b167bc66a15c246a8f29f7b634cbe52731319

        SHA256

        2a0dc11c02495205fadbbb4a5a5304a9e77fd079dcab58daa04804a59e4cc87e

        SHA512

        c6a48a49427a260510f08e8fd93a626445e69659c6e60364308163c92866ed43f163fee3e3f44951466457331eb0804d6e97ba623cfab20b7ef52e74c5c3e437

      • C:\Users\Admin\AppData\Roaming\fcvtee.exe

        Filesize

        392KB

        MD5

        32ab5685131d8bcfa172bf165adf9338

        SHA1

        5e3b167bc66a15c246a8f29f7b634cbe52731319

        SHA256

        2a0dc11c02495205fadbbb4a5a5304a9e77fd079dcab58daa04804a59e4cc87e

        SHA512

        c6a48a49427a260510f08e8fd93a626445e69659c6e60364308163c92866ed43f163fee3e3f44951466457331eb0804d6e97ba623cfab20b7ef52e74c5c3e437

      • C:\Users\Public\ushk.exe

        Filesize

        760KB

        MD5

        52931d9a01445d7ea4b1897cfb72ddf5

        SHA1

        f983656de545f8b69eda2857e3ae118a920c973b

        SHA256

        75b12bc702c0e0411aa2bff87708e8aac03b299a11e46fc893dd214f6b00ca57

        SHA512

        154aff7ffca5a6636b0248f7fedeeba8d55ed49ccd8c253e9be724d77c5b36317aefa076fac4f63aa30485e64129dd9a959dfdbf10f8067a3c5854f7645f6feb

      • C:\Users\Public\ushk.exe

        Filesize

        760KB

        MD5

        52931d9a01445d7ea4b1897cfb72ddf5

        SHA1

        f983656de545f8b69eda2857e3ae118a920c973b

        SHA256

        75b12bc702c0e0411aa2bff87708e8aac03b299a11e46fc893dd214f6b00ca57

        SHA512

        154aff7ffca5a6636b0248f7fedeeba8d55ed49ccd8c253e9be724d77c5b36317aefa076fac4f63aa30485e64129dd9a959dfdbf10f8067a3c5854f7645f6feb

      • C:\Users\Public\ushk.exe

        Filesize

        760KB

        MD5

        52931d9a01445d7ea4b1897cfb72ddf5

        SHA1

        f983656de545f8b69eda2857e3ae118a920c973b

        SHA256

        75b12bc702c0e0411aa2bff87708e8aac03b299a11e46fc893dd214f6b00ca57

        SHA512

        154aff7ffca5a6636b0248f7fedeeba8d55ed49ccd8c253e9be724d77c5b36317aefa076fac4f63aa30485e64129dd9a959dfdbf10f8067a3c5854f7645f6feb

      • \??\PIPE\lsarpc

        MD5

        d41d8cd98f00b204e9800998ecf8427e

        SHA1

        da39a3ee5e6b4b0d3255bfef95601890afd80709

        SHA256

        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

        SHA512

        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

      • \??\PIPE\srvsvc

        MD5

        d41d8cd98f00b204e9800998ecf8427e

        SHA1

        da39a3ee5e6b4b0d3255bfef95601890afd80709

        SHA256

        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

        SHA512

        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

      • \ProgramData\mozglue.dll

        Filesize

        133KB

        MD5

        8f73c08a9660691143661bf7332c3c27

        SHA1

        37fa65dd737c50fda710fdbde89e51374d0c204a

        SHA256

        3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

        SHA512

        0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

      • \ProgramData\mozglue.dll

        Filesize

        133KB

        MD5

        8f73c08a9660691143661bf7332c3c27

        SHA1

        37fa65dd737c50fda710fdbde89e51374d0c204a

        SHA256

        3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

        SHA512

        0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

      • \ProgramData\mozglue.dll

        Filesize

        133KB

        MD5

        8f73c08a9660691143661bf7332c3c27

        SHA1

        37fa65dd737c50fda710fdbde89e51374d0c204a

        SHA256

        3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

        SHA512

        0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

      • \ProgramData\nss3.dll

        Filesize

        1.2MB

        MD5

        bfac4e3c5908856ba17d41edcd455a51

        SHA1

        8eec7e888767aa9e4cca8ff246eb2aacb9170428

        SHA256

        e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

        SHA512

        2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

      • \ProgramData\nss3.dll

        Filesize

        1.2MB

        MD5

        bfac4e3c5908856ba17d41edcd455a51

        SHA1

        8eec7e888767aa9e4cca8ff246eb2aacb9170428

        SHA256

        e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

        SHA512

        2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

      • \ProgramData\nss3.dll

        Filesize

        1.2MB

        MD5

        bfac4e3c5908856ba17d41edcd455a51

        SHA1

        8eec7e888767aa9e4cca8ff246eb2aacb9170428

        SHA256

        e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

        SHA512

        2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

      • \Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe

        Filesize

        21KB

        MD5

        f35a031075f711d05262e547d028ae86

        SHA1

        9c9e3bdf907fcfa959910cd9c752e297765ccf80

        SHA256

        3c0c5786499c54c8f99e689f7e1bfc129e4d10c3de58c7917fc73044e12346b9

        SHA512

        ff5235e388cc82f45e2dda4e93b66f752789b6cda1b6a4076af0171ab88ea422e8309a0f85abfa2d2e8ed5a760c3d83c4ec13fea9b566c0dd470a5c64c1a8a30

      • \Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe

        Filesize

        21KB

        MD5

        f35a031075f711d05262e547d028ae86

        SHA1

        9c9e3bdf907fcfa959910cd9c752e297765ccf80

        SHA256

        3c0c5786499c54c8f99e689f7e1bfc129e4d10c3de58c7917fc73044e12346b9

        SHA512

        ff5235e388cc82f45e2dda4e93b66f752789b6cda1b6a4076af0171ab88ea422e8309a0f85abfa2d2e8ed5a760c3d83c4ec13fea9b566c0dd470a5c64c1a8a30

      • \Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe

        Filesize

        21KB

        MD5

        f35a031075f711d05262e547d028ae86

        SHA1

        9c9e3bdf907fcfa959910cd9c752e297765ccf80

        SHA256

        3c0c5786499c54c8f99e689f7e1bfc129e4d10c3de58c7917fc73044e12346b9

        SHA512

        ff5235e388cc82f45e2dda4e93b66f752789b6cda1b6a4076af0171ab88ea422e8309a0f85abfa2d2e8ed5a760c3d83c4ec13fea9b566c0dd470a5c64c1a8a30

      • \Users\Admin\AppData\Local\Temp\Fvmidruhvvwkpvmfzdjkqkyhgrn.exe

        Filesize

        21KB

        MD5

        f35a031075f711d05262e547d028ae86

        SHA1

        9c9e3bdf907fcfa959910cd9c752e297765ccf80

        SHA256

        3c0c5786499c54c8f99e689f7e1bfc129e4d10c3de58c7917fc73044e12346b9

        SHA512

        ff5235e388cc82f45e2dda4e93b66f752789b6cda1b6a4076af0171ab88ea422e8309a0f85abfa2d2e8ed5a760c3d83c4ec13fea9b566c0dd470a5c64c1a8a30

      • \Users\Admin\AppData\Local\Temp\bvcfsds.exe

        Filesize

        772KB

        MD5

        d946c183fd128b4acf88d83ee89d79d3

        SHA1

        6f35da72f339c7101e93a7adada27d24902db598

        SHA256

        529586cbbd8586d7f33a3ea9bdd517b7ead617b4e12165106e81e4bfad859474

        SHA512

        793727b08b92df108144308a7ac798e55ba35742308db18466cce6caa564b6c1cb5b0fece2850511450f69e497df1dba49a9cb3a0ff17b4f9cc27e05ef2fcd62

      • \Users\Admin\AppData\Local\Temp\bvcfsds.exe

        Filesize

        772KB

        MD5

        d946c183fd128b4acf88d83ee89d79d3

        SHA1

        6f35da72f339c7101e93a7adada27d24902db598

        SHA256

        529586cbbd8586d7f33a3ea9bdd517b7ead617b4e12165106e81e4bfad859474

        SHA512

        793727b08b92df108144308a7ac798e55ba35742308db18466cce6caa564b6c1cb5b0fece2850511450f69e497df1dba49a9cb3a0ff17b4f9cc27e05ef2fcd62

      • \Users\Admin\AppData\Local\Temp\bvcfsds.exe

        Filesize

        772KB

        MD5

        d946c183fd128b4acf88d83ee89d79d3

        SHA1

        6f35da72f339c7101e93a7adada27d24902db598

        SHA256

        529586cbbd8586d7f33a3ea9bdd517b7ead617b4e12165106e81e4bfad859474

        SHA512

        793727b08b92df108144308a7ac798e55ba35742308db18466cce6caa564b6c1cb5b0fece2850511450f69e497df1dba49a9cb3a0ff17b4f9cc27e05ef2fcd62

      • \Users\Admin\AppData\Local\Temp\bvdeasfsds.exe

        Filesize

        772KB

        MD5

        d946c183fd128b4acf88d83ee89d79d3

        SHA1

        6f35da72f339c7101e93a7adada27d24902db598

        SHA256

        529586cbbd8586d7f33a3ea9bdd517b7ead617b4e12165106e81e4bfad859474

        SHA512

        793727b08b92df108144308a7ac798e55ba35742308db18466cce6caa564b6c1cb5b0fece2850511450f69e497df1dba49a9cb3a0ff17b4f9cc27e05ef2fcd62

      • \Users\Admin\AppData\Local\Temp\bvdeasfsds.exe

        Filesize

        772KB

        MD5

        d946c183fd128b4acf88d83ee89d79d3

        SHA1

        6f35da72f339c7101e93a7adada27d24902db598

        SHA256

        529586cbbd8586d7f33a3ea9bdd517b7ead617b4e12165106e81e4bfad859474

        SHA512

        793727b08b92df108144308a7ac798e55ba35742308db18466cce6caa564b6c1cb5b0fece2850511450f69e497df1dba49a9cb3a0ff17b4f9cc27e05ef2fcd62

      • \Users\Admin\AppData\Local\Temp\vnbdfgfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • \Users\Admin\AppData\Local\Temp\vnbdfgfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • \Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • \Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • \Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • \Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • \Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • \Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe

        Filesize

        768KB

        MD5

        63645a9e1f5e77ba3c75366f3a14ab87

        SHA1

        ed1497c47dc283118bbc57d49cd9f354785cf73d

        SHA256

        2ced9b36b931b73b1d325bececd01f0e4fa6bd0fff98f8b76f2f45b473311cd0

        SHA512

        4efce16194322c1288603ccd4ab6507fa5905debb137ce9b200e7a76e2c041c2d2aa720061b0679f2dfb5c21a668e12fe5eeb5fe99542f5a88d4bcdf103296f0

      • \Users\Admin\AppData\Roaming\fcvtee.exe

        Filesize

        392KB

        MD5

        32ab5685131d8bcfa172bf165adf9338

        SHA1

        5e3b167bc66a15c246a8f29f7b634cbe52731319

        SHA256

        2a0dc11c02495205fadbbb4a5a5304a9e77fd079dcab58daa04804a59e4cc87e

        SHA512

        c6a48a49427a260510f08e8fd93a626445e69659c6e60364308163c92866ed43f163fee3e3f44951466457331eb0804d6e97ba623cfab20b7ef52e74c5c3e437

      • \Users\Admin\AppData\Roaming\fcvtee.exe

        Filesize

        392KB

        MD5

        32ab5685131d8bcfa172bf165adf9338

        SHA1

        5e3b167bc66a15c246a8f29f7b634cbe52731319

        SHA256

        2a0dc11c02495205fadbbb4a5a5304a9e77fd079dcab58daa04804a59e4cc87e

        SHA512

        c6a48a49427a260510f08e8fd93a626445e69659c6e60364308163c92866ed43f163fee3e3f44951466457331eb0804d6e97ba623cfab20b7ef52e74c5c3e437

      • memory/280-116-0x0000000000020000-0x00000000000E6000-memory.dmp

        Filesize

        792KB

      • memory/280-111-0x0000000000000000-mapping.dmp

      • memory/536-245-0x000000000043C0B2-mapping.dmp

      • memory/536-301-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/536-249-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/564-123-0x0000000004AD0000-0x0000000004B1C000-memory.dmp

        Filesize

        304KB

      • memory/564-121-0x0000000004C70000-0x0000000004D32000-memory.dmp

        Filesize

        776KB

      • memory/564-115-0x0000000000A10000-0x0000000000AD6000-memory.dmp

        Filesize

        792KB

      • memory/564-107-0x0000000000000000-mapping.dmp

      • memory/568-206-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/568-201-0x0000000000407486-mapping.dmp

      • memory/568-207-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/804-275-0x0000000000000000-mapping.dmp

      • memory/972-302-0x0000000000000000-mapping.dmp

      • memory/1036-96-0x0000000000000000-mapping.dmp

      • memory/1068-84-0x0000000000000000-mapping.dmp

      • memory/1068-105-0x0000000000250000-0x0000000000256000-memory.dmp

        Filesize

        24KB

      • memory/1072-250-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/1072-222-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/1072-220-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/1072-219-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/1072-276-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/1072-224-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/1072-274-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/1072-229-0x000000000043C0B2-mapping.dmp

      • memory/1224-58-0x000000001B7A0000-0x000000001BA9F000-memory.dmp

        Filesize

        3.0MB

      • memory/1224-57-0x0000000002644000-0x0000000002647000-memory.dmp

        Filesize

        12KB

      • memory/1224-63-0x000000000264B000-0x000000000266A000-memory.dmp

        Filesize

        124KB

      • memory/1224-55-0x000007FEF4580000-0x000007FEF4FA3000-memory.dmp

        Filesize

        10.1MB

      • memory/1224-56-0x000007FEF3A20000-0x000007FEF457D000-memory.dmp

        Filesize

        11.4MB

      • memory/1224-59-0x000000000264B000-0x000000000266A000-memory.dmp

        Filesize

        124KB

      • memory/1224-62-0x0000000002644000-0x0000000002647000-memory.dmp

        Filesize

        12KB

      • memory/1224-54-0x000007FEFBFB1000-0x000007FEFBFB3000-memory.dmp

        Filesize

        8KB

      • memory/1380-143-0x0000000000000000-mapping.dmp

      • memory/1380-153-0x000000006F610000-0x000000006FBBB000-memory.dmp

        Filesize

        5.7MB

      • memory/1380-155-0x000000006F610000-0x000000006FBBB000-memory.dmp

        Filesize

        5.7MB

      • memory/1388-300-0x0000000000000000-mapping.dmp

      • memory/1532-74-0x0000000000400000-0x0000000000405000-memory.dmp

        Filesize

        20KB

      • memory/1532-113-0x0000000000400000-0x0000000000405000-memory.dmp

        Filesize

        20KB

      • memory/1532-68-0x000000000040106C-mapping.dmp

      • memory/1556-150-0x0000000000000000-mapping.dmp

      • memory/1604-152-0x0000000000000000-mapping.dmp

      • memory/1620-66-0x0000000076531000-0x0000000076533000-memory.dmp

        Filesize

        8KB

      • memory/1620-60-0x0000000000000000-mapping.dmp

      • memory/1620-70-0x00000000001D0000-0x00000000001D5000-memory.dmp

        Filesize

        20KB

      • memory/1652-117-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/1652-87-0x0000000000407486-mapping.dmp

      • memory/1668-171-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/1668-168-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/1668-169-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/1668-173-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/1668-174-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/1668-176-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/1668-177-0x0000000000407486-mapping.dmp

      • memory/1668-180-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/1668-182-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/1668-183-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/1712-209-0x0000000000000000-mapping.dmp

      • memory/1712-212-0x000000006FE90000-0x000000007043B000-memory.dmp

        Filesize

        5.7MB

      • memory/1712-217-0x000000006FE90000-0x000000007043B000-memory.dmp

        Filesize

        5.7MB

      • memory/1716-162-0x0000000000000000-mapping.dmp

      • memory/1752-216-0x000000006FE90000-0x000000007043B000-memory.dmp

        Filesize

        5.7MB

      • memory/1752-233-0x000000006FE90000-0x000000007043B000-memory.dmp

        Filesize

        5.7MB

      • memory/1752-213-0x0000000000000000-mapping.dmp

      • memory/1760-161-0x0000000000000000-mapping.dmp

      • memory/1760-77-0x0000000000000000-mapping.dmp

      • memory/1760-208-0x00000000057C0000-0x0000000005894000-memory.dmp

        Filesize

        848KB

      • memory/1760-89-0x0000000001D50000-0x0000000001D58000-memory.dmp

        Filesize

        32KB

      • memory/1760-165-0x0000000000370000-0x000000000037A000-memory.dmp

        Filesize

        40KB

      • memory/1780-154-0x000000006F610000-0x000000006FBBB000-memory.dmp

        Filesize

        5.7MB

      • memory/1780-142-0x0000000000000000-mapping.dmp

      • memory/1780-156-0x000000006F610000-0x000000006FBBB000-memory.dmp

        Filesize

        5.7MB

      • memory/1824-277-0x0000000000000000-mapping.dmp

      • memory/2040-102-0x000000000043C0B2-mapping.dmp

      • memory/2040-151-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/2040-120-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/2040-122-0x0000000060900000-0x0000000060992000-memory.dmp

        Filesize

        584KB

      • memory/2040-118-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB