Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-11-2022 00:58
Static task
static1
Behavioral task
behavioral1
Sample
Service.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Service.exe
Resource
win10v2004-20220901-en
General
-
Target
Service.exe
-
Size
4.8MB
-
MD5
854d5dfe2d5193aa4150765c123df8ad
-
SHA1
1b21d80c4beb90b03d795cf11145619aeb3a4f37
-
SHA256
85b73b7b3c9acc6648beb77ce878ebeea26a2a949bf17c3184f2bd4544d12b45
-
SHA512
48ed604ea966a35cc16631ce5da692bb236badafdb6d3d01ef3a27ab5a9c1ea6a19d6e8209c894ab292614cfbd355c2ca96401fd4dbb9a3abbfd886cddae77cc
-
SSDEEP
98304:GiIOIQKetb5uDv/tFAOoLKSIc5EP61wNYZiu7JfQmEM9:rIbCEA1EP614g9fQm59
Malware Config
Extracted
privateloader
208.67.104.60
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
-
payload_url
https://cdn.discordapp.com/attachments/910842184708792331/931507465563045909/dingo_20220114120058.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://193.56.146.76/Proxytest.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://privacy-tools-for-you-780.com/downloads/toolspab3.exe
http://luminati-china.xyz/aman/casper2.exe
https://innovicservice.net/assets/vendor/counterup/RobCleanerInstlr95038215.exe
http://tg8.cllgxx.com/hp8/g1/yrpp1047.exe
https://cdn.discordapp.com/attachments/910842184708792331/930849718240698368/Roll.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930850766787330068/real1201.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930882959131693096/Installer.bmp
http://185.215.113.208/ferrari.exe
https://cdn.discordapp.com/attachments/910842184708792331/931233371110141962/LingeringsAntiphon.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931285223709225071/russ.bmp
https://cdn.discordapp.com/attachments/910842184708792331/932720393201016842/filinnn.bmp
https://cdn.discordapp.com/attachments/910842184708792331/933436611427979305/build20k.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://mnbuiy.pw/adsli/note8876.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://luminati-china.xyz/aman/casper2.exe
https://suprimax.vet.br/css/fonts/OneCleanerInst942914.exe
http://tg8.cllgxx.com/hp8/g1/ssaa1047.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_64_bit_4.3.0_Setup.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_32_bit_4.3.0_Setup.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516400005296219/anyname.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516894660530226/PBsecond.exe
https://cdn.discordapp.com/attachments/910842184708792331/914047763304550410/Xpadder.bmp
Extracted
redline
37.139.128.203:10925
-
auth_value
d37697fc398092da22f2d13a99bd24cb
Signatures
-
Detects LgoogLoader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1512-193-0x0000000000160000-0x000000000016D000-memory.dmp family_lgoogloader -
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1560-157-0x0000000000220000-0x0000000000229000-memory.dmp family_smokeloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\Pictures\Minor Policy\xU0XKXvBPWeVzUjplGtTLu3h.exe family_redline C:\Users\Admin\Pictures\Minor Policy\xU0XKXvBPWeVzUjplGtTLu3h.exe family_redline C:\Users\Admin\Pictures\Minor Policy\xU0XKXvBPWeVzUjplGtTLu3h.exe family_redline behavioral1/memory/544-150-0x0000000000CC0000-0x0000000000CE8000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
Service.exesVuBWlvsfC0EYkbUWI8Ucw96.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Service.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sVuBWlvsfC0EYkbUWI8Ucw96.exe -
Downloads MZ/PE file
-
Executes dropped EXE 16 IoCs
Processes:
sVuBWlvsfC0EYkbUWI8Ucw96.exeRH8yf14C6zX_SmhKlZjEqQ7G.exeschtasks.exenppGHVB7K6gq0yKI2iFNoh_7.exebmsLTqXLZD8DDwyfmKPQf4dt.exeTqOF1SMLwPC0n2RNkviWV3gy.exeWfS2RbKmS3OJQsTXUOWmsU4A.exet7lc6VTqj8MziNskl6KfxHaI.exeCxt78PI4160hqABVZjKNjwVR.exeBP359ASkZh1rlOO7PcO__CRB.exeVWLfC8yxGNh_axcJChxSqBcx.exesGwuHjeKm9vubkX96hwLfRti.exeki2Zwp96il1plWg7evzqwAFI.exexU0XKXvBPWeVzUjplGtTLu3h.exeCxt78PI4160hqABVZjKNjwVR.tmpMetal.exe.pifpid process 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 380 RH8yf14C6zX_SmhKlZjEqQ7G.exe 632 schtasks.exe 956 nppGHVB7K6gq0yKI2iFNoh_7.exe 1560 bmsLTqXLZD8DDwyfmKPQf4dt.exe 888 TqOF1SMLwPC0n2RNkviWV3gy.exe 948 WfS2RbKmS3OJQsTXUOWmsU4A.exe 1764 t7lc6VTqj8MziNskl6KfxHaI.exe 992 Cxt78PI4160hqABVZjKNjwVR.exe 764 BP359ASkZh1rlOO7PcO__CRB.exe 1784 VWLfC8yxGNh_axcJChxSqBcx.exe 1592 sGwuHjeKm9vubkX96hwLfRti.exe 1884 ki2Zwp96il1plWg7evzqwAFI.exe 544 xU0XKXvBPWeVzUjplGtTLu3h.exe 1876 Cxt78PI4160hqABVZjKNjwVR.tmp 1564 Metal.exe.pif -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Service.exesVuBWlvsfC0EYkbUWI8Ucw96.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Service.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Service.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sVuBWlvsfC0EYkbUWI8Ucw96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sVuBWlvsfC0EYkbUWI8Ucw96.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
sVuBWlvsfC0EYkbUWI8Ucw96.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\International\Geo\Nation sVuBWlvsfC0EYkbUWI8Ucw96.exe -
Loads dropped DLL 21 IoCs
Processes:
Service.exesVuBWlvsfC0EYkbUWI8Ucw96.exeCxt78PI4160hqABVZjKNjwVR.execmd.exeWfS2RbKmS3OJQsTXUOWmsU4A.exepid process 1504 Service.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 992 Cxt78PI4160hqABVZjKNjwVR.exe 112 cmd.exe 948 WfS2RbKmS3OJQsTXUOWmsU4A.exe 948 WfS2RbKmS3OJQsTXUOWmsU4A.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
sGwuHjeKm9vubkX96hwLfRti.exeVWLfC8yxGNh_axcJChxSqBcx.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\LOLPA4DESK = "\"C:\\Program Files (x86)\\ClipManagerP0\\ClipManager_Svc.exe\"" sGwuHjeKm9vubkX96hwLfRti.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce VWLfC8yxGNh_axcJChxSqBcx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" VWLfC8yxGNh_axcJChxSqBcx.exe -
Processes:
Service.exesVuBWlvsfC0EYkbUWI8Ucw96.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Service.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sVuBWlvsfC0EYkbUWI8Ucw96.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 ipinfo.io 16 ipinfo.io 21 ipinfo.io 22 ipinfo.io -
Drops file in System32 directory 4 IoCs
Processes:
sVuBWlvsfC0EYkbUWI8Ucw96.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy sVuBWlvsfC0EYkbUWI8Ucw96.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini sVuBWlvsfC0EYkbUWI8Ucw96.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol sVuBWlvsfC0EYkbUWI8Ucw96.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI sVuBWlvsfC0EYkbUWI8Ucw96.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
Service.exesVuBWlvsfC0EYkbUWI8Ucw96.exepid process 1504 Service.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
BP359ASkZh1rlOO7PcO__CRB.exedescription pid process target process PID 764 set thread context of 1512 764 BP359ASkZh1rlOO7PcO__CRB.exe InstallUtil.exe -
Drops file in Program Files directory 4 IoCs
Processes:
Service.exesGwuHjeKm9vubkX96hwLfRti.exedescription ioc process File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Service.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Service.exe File created C:\Program Files (x86)\ClipManagerP0\ClipManager_Svc.exe sGwuHjeKm9vubkX96hwLfRti.exe File opened for modification C:\Program Files (x86)\ClipManagerP0\ClipManager_Svc.exe sGwuHjeKm9vubkX96hwLfRti.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
bmsLTqXLZD8DDwyfmKPQf4dt.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bmsLTqXLZD8DDwyfmKPQf4dt.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bmsLTqXLZD8DDwyfmKPQf4dt.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bmsLTqXLZD8DDwyfmKPQf4dt.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 380 schtasks.exe 776 schtasks.exe 632 schtasks.exe 1860 schtasks.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 1472 tasklist.exe 1676 tasklist.exe -
Processes:
sVuBWlvsfC0EYkbUWI8Ucw96.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 sVuBWlvsfC0EYkbUWI8Ucw96.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 sVuBWlvsfC0EYkbUWI8Ucw96.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 sVuBWlvsfC0EYkbUWI8Ucw96.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 sVuBWlvsfC0EYkbUWI8Ucw96.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 sVuBWlvsfC0EYkbUWI8Ucw96.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 sVuBWlvsfC0EYkbUWI8Ucw96.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 sVuBWlvsfC0EYkbUWI8Ucw96.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 sVuBWlvsfC0EYkbUWI8Ucw96.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 sVuBWlvsfC0EYkbUWI8Ucw96.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 sVuBWlvsfC0EYkbUWI8Ucw96.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Service.exesVuBWlvsfC0EYkbUWI8Ucw96.exebmsLTqXLZD8DDwyfmKPQf4dt.exeBP359ASkZh1rlOO7PcO__CRB.exet7lc6VTqj8MziNskl6KfxHaI.exeMetal.exe.pifpid process 1504 Service.exe 1504 Service.exe 1504 Service.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe 1560 bmsLTqXLZD8DDwyfmKPQf4dt.exe 1560 bmsLTqXLZD8DDwyfmKPQf4dt.exe 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 764 BP359ASkZh1rlOO7PcO__CRB.exe 764 BP359ASkZh1rlOO7PcO__CRB.exe 764 BP359ASkZh1rlOO7PcO__CRB.exe 764 BP359ASkZh1rlOO7PcO__CRB.exe 764 BP359ASkZh1rlOO7PcO__CRB.exe 1396 1396 1396 1396 1396 1396 1396 1396 1764 t7lc6VTqj8MziNskl6KfxHaI.exe 1396 1764 t7lc6VTqj8MziNskl6KfxHaI.exe 1764 t7lc6VTqj8MziNskl6KfxHaI.exe 1764 t7lc6VTqj8MziNskl6KfxHaI.exe 1764 t7lc6VTqj8MziNskl6KfxHaI.exe 1396 1396 1396 1396 1396 1396 1396 1564 Metal.exe.pif 1396 1396 1396 1396 1564 Metal.exe.pif 1396 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
bmsLTqXLZD8DDwyfmKPQf4dt.exepid process 1560 bmsLTqXLZD8DDwyfmKPQf4dt.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
tasklist.exetasklist.exedescription pid process Token: SeShutdownPrivilege 1396 Token: SeDebugPrivilege 1472 tasklist.exe Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeDebugPrivilege 1676 tasklist.exe Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 Token: SeShutdownPrivilege 1396 -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
Metal.exe.pifpid process 1564 Metal.exe.pif 1396 1396 1396 1396 1564 Metal.exe.pif 1564 Metal.exe.pif 1396 1396 -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Metal.exe.pifpid process 1564 Metal.exe.pif 1564 Metal.exe.pif 1564 Metal.exe.pif -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Service.exesVuBWlvsfC0EYkbUWI8Ucw96.exedescription pid process target process PID 1504 wrote to memory of 672 1504 Service.exe sVuBWlvsfC0EYkbUWI8Ucw96.exe PID 1504 wrote to memory of 672 1504 Service.exe sVuBWlvsfC0EYkbUWI8Ucw96.exe PID 1504 wrote to memory of 672 1504 Service.exe sVuBWlvsfC0EYkbUWI8Ucw96.exe PID 1504 wrote to memory of 672 1504 Service.exe sVuBWlvsfC0EYkbUWI8Ucw96.exe PID 1504 wrote to memory of 380 1504 Service.exe schtasks.exe PID 1504 wrote to memory of 380 1504 Service.exe schtasks.exe PID 1504 wrote to memory of 380 1504 Service.exe schtasks.exe PID 1504 wrote to memory of 380 1504 Service.exe schtasks.exe PID 1504 wrote to memory of 776 1504 Service.exe schtasks.exe PID 1504 wrote to memory of 776 1504 Service.exe schtasks.exe PID 1504 wrote to memory of 776 1504 Service.exe schtasks.exe PID 1504 wrote to memory of 776 1504 Service.exe schtasks.exe PID 672 wrote to memory of 956 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe nppGHVB7K6gq0yKI2iFNoh_7.exe PID 672 wrote to memory of 956 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe nppGHVB7K6gq0yKI2iFNoh_7.exe PID 672 wrote to memory of 956 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe nppGHVB7K6gq0yKI2iFNoh_7.exe PID 672 wrote to memory of 956 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe nppGHVB7K6gq0yKI2iFNoh_7.exe PID 672 wrote to memory of 764 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe BP359ASkZh1rlOO7PcO__CRB.exe PID 672 wrote to memory of 764 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe BP359ASkZh1rlOO7PcO__CRB.exe PID 672 wrote to memory of 764 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe BP359ASkZh1rlOO7PcO__CRB.exe PID 672 wrote to memory of 764 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe BP359ASkZh1rlOO7PcO__CRB.exe PID 672 wrote to memory of 380 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe RH8yf14C6zX_SmhKlZjEqQ7G.exe PID 672 wrote to memory of 380 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe RH8yf14C6zX_SmhKlZjEqQ7G.exe PID 672 wrote to memory of 380 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe RH8yf14C6zX_SmhKlZjEqQ7G.exe PID 672 wrote to memory of 380 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe RH8yf14C6zX_SmhKlZjEqQ7G.exe PID 672 wrote to memory of 1560 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe bmsLTqXLZD8DDwyfmKPQf4dt.exe PID 672 wrote to memory of 1560 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe bmsLTqXLZD8DDwyfmKPQf4dt.exe PID 672 wrote to memory of 1560 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe bmsLTqXLZD8DDwyfmKPQf4dt.exe PID 672 wrote to memory of 1560 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe bmsLTqXLZD8DDwyfmKPQf4dt.exe PID 672 wrote to memory of 888 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe TqOF1SMLwPC0n2RNkviWV3gy.exe PID 672 wrote to memory of 888 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe TqOF1SMLwPC0n2RNkviWV3gy.exe PID 672 wrote to memory of 888 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe TqOF1SMLwPC0n2RNkviWV3gy.exe PID 672 wrote to memory of 888 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe TqOF1SMLwPC0n2RNkviWV3gy.exe PID 672 wrote to memory of 888 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe TqOF1SMLwPC0n2RNkviWV3gy.exe PID 672 wrote to memory of 888 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe TqOF1SMLwPC0n2RNkviWV3gy.exe PID 672 wrote to memory of 888 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe TqOF1SMLwPC0n2RNkviWV3gy.exe PID 672 wrote to memory of 992 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe Cxt78PI4160hqABVZjKNjwVR.exe PID 672 wrote to memory of 992 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe Cxt78PI4160hqABVZjKNjwVR.exe PID 672 wrote to memory of 992 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe Cxt78PI4160hqABVZjKNjwVR.exe PID 672 wrote to memory of 992 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe Cxt78PI4160hqABVZjKNjwVR.exe PID 672 wrote to memory of 992 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe Cxt78PI4160hqABVZjKNjwVR.exe PID 672 wrote to memory of 992 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe Cxt78PI4160hqABVZjKNjwVR.exe PID 672 wrote to memory of 992 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe Cxt78PI4160hqABVZjKNjwVR.exe PID 672 wrote to memory of 1764 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe t7lc6VTqj8MziNskl6KfxHaI.exe PID 672 wrote to memory of 1764 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe t7lc6VTqj8MziNskl6KfxHaI.exe PID 672 wrote to memory of 1764 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe t7lc6VTqj8MziNskl6KfxHaI.exe PID 672 wrote to memory of 1764 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe t7lc6VTqj8MziNskl6KfxHaI.exe PID 672 wrote to memory of 948 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe WfS2RbKmS3OJQsTXUOWmsU4A.exe PID 672 wrote to memory of 948 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe WfS2RbKmS3OJQsTXUOWmsU4A.exe PID 672 wrote to memory of 948 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe WfS2RbKmS3OJQsTXUOWmsU4A.exe PID 672 wrote to memory of 948 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe WfS2RbKmS3OJQsTXUOWmsU4A.exe PID 672 wrote to memory of 948 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe WfS2RbKmS3OJQsTXUOWmsU4A.exe PID 672 wrote to memory of 948 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe WfS2RbKmS3OJQsTXUOWmsU4A.exe PID 672 wrote to memory of 948 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe WfS2RbKmS3OJQsTXUOWmsU4A.exe PID 672 wrote to memory of 1784 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe VWLfC8yxGNh_axcJChxSqBcx.exe PID 672 wrote to memory of 1784 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe VWLfC8yxGNh_axcJChxSqBcx.exe PID 672 wrote to memory of 1784 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe VWLfC8yxGNh_axcJChxSqBcx.exe PID 672 wrote to memory of 1784 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe VWLfC8yxGNh_axcJChxSqBcx.exe PID 672 wrote to memory of 1592 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe sGwuHjeKm9vubkX96hwLfRti.exe PID 672 wrote to memory of 1592 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe sGwuHjeKm9vubkX96hwLfRti.exe PID 672 wrote to memory of 1592 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe sGwuHjeKm9vubkX96hwLfRti.exe PID 672 wrote to memory of 1592 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe sGwuHjeKm9vubkX96hwLfRti.exe PID 672 wrote to memory of 1884 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe ki2Zwp96il1plWg7evzqwAFI.exe PID 672 wrote to memory of 1884 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe ki2Zwp96il1plWg7evzqwAFI.exe PID 672 wrote to memory of 1884 672 sVuBWlvsfC0EYkbUWI8Ucw96.exe ki2Zwp96il1plWg7evzqwAFI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Service.exe"C:\Users\Admin\AppData\Local\Temp\Service.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\sVuBWlvsfC0EYkbUWI8Ucw96.exe"C:\Users\Admin\Documents\sVuBWlvsfC0EYkbUWI8Ucw96.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Minor Policy\BP359ASkZh1rlOO7PcO__CRB.exe"C:\Users\Admin\Pictures\Minor Policy\BP359ASkZh1rlOO7PcO__CRB.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵
-
C:\Users\Admin\Pictures\Minor Policy\bmsLTqXLZD8DDwyfmKPQf4dt.exe"C:\Users\Admin\Pictures\Minor Policy\bmsLTqXLZD8DDwyfmKPQf4dt.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Minor Policy\t7lc6VTqj8MziNskl6KfxHaI.exe"C:\Users\Admin\Pictures\Minor Policy\t7lc6VTqj8MziNskl6KfxHaI.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Pictures\Minor Policy\Cxt78PI4160hqABVZjKNjwVR.exe"C:\Users\Admin\Pictures\Minor Policy\Cxt78PI4160hqABVZjKNjwVR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-0L70Q.tmp\Cxt78PI4160hqABVZjKNjwVR.tmp"C:\Users\Admin\AppData\Local\Temp\is-0L70Q.tmp\Cxt78PI4160hqABVZjKNjwVR.tmp" /SL5="$A011C,140559,56832,C:\Users\Admin\Pictures\Minor Policy\Cxt78PI4160hqABVZjKNjwVR.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Minor Policy\WfS2RbKmS3OJQsTXUOWmsU4A.exe"C:\Users\Admin\Pictures\Minor Policy\WfS2RbKmS3OJQsTXUOWmsU4A.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\Pictures\Minor Policy\3b6SmCvYTZSnJDqd1027rKmi.exe"C:\Users\Admin\Pictures\Minor Policy\3b6SmCvYTZSnJDqd1027rKmi.exe"3⤵
-
C:\Users\Admin\Pictures\Minor Policy\TqOF1SMLwPC0n2RNkviWV3gy.exe"C:\Users\Admin\Pictures\Minor Policy\TqOF1SMLwPC0n2RNkviWV3gy.exe" /SP-/VERYSILENT /SUPPRESSMSGBOXES /INSTALLERSHOWNELSEWHERE /pid=7473⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Minor Policy\RH8yf14C6zX_SmhKlZjEqQ7G.exe"C:\Users\Admin\Pictures\Minor Policy\RH8yf14C6zX_SmhKlZjEqQ7G.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Minor Policy\nppGHVB7K6gq0yKI2iFNoh_7.exe"C:\Users\Admin\Pictures\Minor Policy\nppGHVB7K6gq0yKI2iFNoh_7.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Minor Policy\sGwuHjeKm9vubkX96hwLfRti.exe"C:\Users\Admin\Pictures\Minor Policy\sGwuHjeKm9vubkX96hwLfRti.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr ""C:\Program Files (x86)\ClipManagerP0\ClipManager_Svc.exe"" /tn "LOLPA4DESK HR" /sc HOURLY /rl HIGHEST4⤵
- Executes dropped EXE
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr ""C:\Program Files (x86)\ClipManagerP0\ClipManager_Svc.exe"" /tn "LOLPA4DESK LG" /sc ONLOGON /rl HIGHEST4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Minor Policy\VWLfC8yxGNh_axcJChxSqBcx.exe"C:\Users\Admin\Pictures\Minor Policy\VWLfC8yxGNh_axcJChxSqBcx.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\tapiunattend.exetapiunattend.exe4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Mirrors.mpeg & ping -n 5 localhost4⤵
-
C:\Windows\SysWOW64\cmd.execmd5⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AvastUI.exe"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\find.exefind /I /N "avastui.exe"6⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AVGUI.exe"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\find.exefind /I /N "avgui.exe"6⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^292552347903647624226686138999204215314705673139493112772742455981043241153$" Button.mpeg6⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Metal.exe.pifMetal.exe.pif Z6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 56⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost5⤵
- Runs ping.exe
-
C:\Users\Admin\Pictures\Minor Policy\xU0XKXvBPWeVzUjplGtTLu3h.exe"C:\Users\Admin\Pictures\Minor Policy\xU0XKXvBPWeVzUjplGtTLu3h.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Minor Policy\ki2Zwp96il1plWg7evzqwAFI.exe"C:\Users\Admin\Pictures\Minor Policy\ki2Zwp96il1plWg7evzqwAFI.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Defense Evasion
Virtualization/Sandbox Evasion
1Modify Registry
2Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Button.mpegFilesize
925KB
MD595a538d299c6a912257dd268fb37626b
SHA1d4209b2598401d2c300ad53e09160a19367aac4f
SHA2561f436a50aad7caa327e6d03841916842edd49464ce2afbd91905df1bf782a4b7
SHA5125e92f7703811576cd59d0d30f58825aeabf74cea6d9e2e915b8e897ef6582d3263351a22d2a3a7f0adfac325ae33912b3288150a615f77a32678c1aa94935f8d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Metal.exe.pifFilesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Metal.exe.pifFilesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mirrors.mpegFilesize
11KB
MD59e4a302950b0518e58716f0c6ff5ba65
SHA169c9566dce9284ec76397c76833c8b98f3817ff0
SHA25668b123eb23bfbdff1dbe1952a87f06787c35b188c6ae0015b90a45a3104c206d
SHA51227a82d7160c45ab5b9afd4daa0cd375fbe83902aec06f0832b3078c6d4a52e71e79bb9a3944d33fb46ba8b4ce9ac9323801157c52f5364a6b988f9f87e797b96
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Writers.mpegFilesize
929KB
MD5305cf0bb6ce69287a3c3b6f87018b92f
SHA12f64caba05c46fb1c5672969a0572c7369b3095c
SHA256038e5504c7570d68f8e7656bde9ccef26132f0b73379fe80492f7f8837c5ca60
SHA512b405f69cbaffdbba590ab6a7ea1fc22f2825a32ae84f3ff80ed923440f67fc592ba3ec0e4ca51fce1a57aeb72e0785ee1f3d67a7825e3d55bba2bf050b569d02
-
C:\Users\Admin\AppData\Local\Temp\is-0L70Q.tmp\Cxt78PI4160hqABVZjKNjwVR.tmpFilesize
694KB
MD5ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
C:\Users\Admin\Documents\sVuBWlvsfC0EYkbUWI8Ucw96.exeFilesize
5.5MB
MD591f6f48383c2d43120c14b74bf894575
SHA1c49da1e376ae346d420e1486b7b865ee0d6e1485
SHA2566ac2f4b8df5f40ab38af32a7538e2fb12eb243002822b1d17ffa1b7ec1010933
SHA512a93ef32d57ff0991f1a2711371db24063bcf1c5cf4ebf2c24a0ac856b08df046fb760801dce3dca3a4c4f3eaaf18d4c1f0fe2befc5d5df9d5fefadd57f1bc69f
-
C:\Users\Admin\Documents\sVuBWlvsfC0EYkbUWI8Ucw96.exeFilesize
5.5MB
MD591f6f48383c2d43120c14b74bf894575
SHA1c49da1e376ae346d420e1486b7b865ee0d6e1485
SHA2566ac2f4b8df5f40ab38af32a7538e2fb12eb243002822b1d17ffa1b7ec1010933
SHA512a93ef32d57ff0991f1a2711371db24063bcf1c5cf4ebf2c24a0ac856b08df046fb760801dce3dca3a4c4f3eaaf18d4c1f0fe2befc5d5df9d5fefadd57f1bc69f
-
C:\Users\Admin\Pictures\Minor Policy\3b6SmCvYTZSnJDqd1027rKmi.exeFilesize
447KB
MD5bd1a649edf360806c072a9159f55f252
SHA1b7a317b9a267bd7d075a08f64768ba35a8625eef
SHA256cd9e01041452a569bc7886a2b669ef9387e6d6a8f56b124c0c2e10f3525cb51c
SHA512a8c7fbace8c8e51498811f14800664fbfa0ab957e2df29c344dc3f327a8a36f42a4f3c274d240096bd296f1bdfb39907cf4f0961e08002f25f34131114adf0d8
-
C:\Users\Admin\Pictures\Minor Policy\BP359ASkZh1rlOO7PcO__CRB.exeFilesize
1.9MB
MD5ed6dbdf2398812d018cfe6e0def16206
SHA16ef72c792948700574ba89283e2340e7ff01cfbc
SHA256e1c911c9ca01ebd5d0293caf5662277d251276dfaf1dcdb3dc581718ad319330
SHA5122385d183c1dec94ba6036b86976db1373d49c39c6ff9be58aae9bc23e457063447f071a46c10e70b6c3006c2067c7b5e840f1d927a7fd0cffddde56803f66865
-
C:\Users\Admin\Pictures\Minor Policy\Cxt78PI4160hqABVZjKNjwVR.exeFilesize
380KB
MD50c51d5838eaa310b8d009ab265c1846e
SHA168f93c9587ddbe7b015c8c78f5fbe6cda4bf2348
SHA2561449e7a3111fdfb697c631367fcbc08eb0ab911bc280fd0c3d132cc3918d1da6
SHA512bcb0d24d5ffc0d037a84480b163e81902f493e91e20e07c58cc9a10e2796e6440732cb453966f675f36ec16890d5106219e38221a94372cd29c4907a35568d68
-
C:\Users\Admin\Pictures\Minor Policy\Cxt78PI4160hqABVZjKNjwVR.exeFilesize
380KB
MD50c51d5838eaa310b8d009ab265c1846e
SHA168f93c9587ddbe7b015c8c78f5fbe6cda4bf2348
SHA2561449e7a3111fdfb697c631367fcbc08eb0ab911bc280fd0c3d132cc3918d1da6
SHA512bcb0d24d5ffc0d037a84480b163e81902f493e91e20e07c58cc9a10e2796e6440732cb453966f675f36ec16890d5106219e38221a94372cd29c4907a35568d68
-
C:\Users\Admin\Pictures\Minor Policy\RH8yf14C6zX_SmhKlZjEqQ7G.exeFilesize
2.9MB
MD547e313255fb341f9e7f247effd41691e
SHA152fc0c785fa56128e42eb5646cb0246e6e0f3daa
SHA2565385aea904ff1392b6948175b74472f385a5a8328c3e6b672e82342bf269cd8e
SHA512bf8e602abca65a7115a58a06296f22e994e41912a0dbe610aa7726906f4831f192ee6169e56325ea9f8c4e611eb4922ba5cf01b41caa5813448e03c4799ec641
-
C:\Users\Admin\Pictures\Minor Policy\TqOF1SMLwPC0n2RNkviWV3gy.exeFilesize
12.1MB
MD519b20fc498d366730c470bacab083fe7
SHA19d63950c73423991e2884392bc9682d836f9e031
SHA2568a227b80714a2ee25f04541f20c7bcee3063d96541dde42e9c99523e2cd74341
SHA5120c03e865381fab1e06b2c42f70a3183bd96b06eaa6524f9d254ff708859b89c92a5f7c7186c84888bd543ad1cbf3d45ca4125acdaec059751e9ba2097f90dedb
-
C:\Users\Admin\Pictures\Minor Policy\VWLfC8yxGNh_axcJChxSqBcx.exeFilesize
1.1MB
MD54478b512a38a3da2a7a5bb6543fb427b
SHA18349387d5fe34c73df2fbf36838170ad58fdc67b
SHA2569cfb0711eb4f20c8532fac7a6556692ddc96066698bef6099dffe664f751a914
SHA5127574ad51f72ec946895a77bd6f81033d9c058ecd66eaaadf61b0eae263586a91c0cccba0bc16e928df949a3bf5a11405f53fb8969c676dd9bdbdccbadb8b2607
-
C:\Users\Admin\Pictures\Minor Policy\WfS2RbKmS3OJQsTXUOWmsU4A.exeFilesize
7.3MB
MD54778f232ad8881b94e240b1e987cc44e
SHA1d9468e286eb049fdddff06c9fc4a8ef607d46902
SHA2567253047c4fd48aff60ae6e932858c27865ddb8429266770339615157cfc2d487
SHA51256611bc94ba7c7a34737f88aea2fb24f66c7ca331da0b037d88133598b4cb04c01679b8538913ef090c204c68fc962f951128e8079eee1ddbb6f99fb6ef60ebc
-
C:\Users\Admin\Pictures\Minor Policy\WfS2RbKmS3OJQsTXUOWmsU4A.exeFilesize
7.3MB
MD54778f232ad8881b94e240b1e987cc44e
SHA1d9468e286eb049fdddff06c9fc4a8ef607d46902
SHA2567253047c4fd48aff60ae6e932858c27865ddb8429266770339615157cfc2d487
SHA51256611bc94ba7c7a34737f88aea2fb24f66c7ca331da0b037d88133598b4cb04c01679b8538913ef090c204c68fc962f951128e8079eee1ddbb6f99fb6ef60ebc
-
C:\Users\Admin\Pictures\Minor Policy\bmsLTqXLZD8DDwyfmKPQf4dt.exeFilesize
371KB
MD52ece9c26548f57b7bbf291014f14686c
SHA11eed58d45b808a94500d4e04f0d40eb34f67ae9a
SHA2562da18481e0cd85d60ffd6a5c30ad59dc33fb3147a347610618318b6c0840c5b5
SHA512bc113e707d14a113619e3db7d5c188451e1bb391f7b68dbd56aaad22c19e8eb775ca0c868bf5fefb8d7683fc78ecce631e014f75dc6dd40dfdb2c26c0a62acb2
-
C:\Users\Admin\Pictures\Minor Policy\ki2Zwp96il1plWg7evzqwAFI.exeFilesize
271KB
MD536c51c0d146dbe9024e34b251421a72e
SHA154e5325e012106703cd432d7568f974bd115a337
SHA2560ce402cf92619e1d76d785c01928ec54abcb73933bde93ef33bec31c6ec825f8
SHA5121d0d9f18510d32367dbb929ab2d8db74bd50fe0a07c19b3d860475f1e83ed8d3e2c0d3f925044243271f7b01b0fc1dcd2a49865ce6786ff8127df3c67b0c1687
-
C:\Users\Admin\Pictures\Minor Policy\ki2Zwp96il1plWg7evzqwAFI.exeFilesize
271KB
MD536c51c0d146dbe9024e34b251421a72e
SHA154e5325e012106703cd432d7568f974bd115a337
SHA2560ce402cf92619e1d76d785c01928ec54abcb73933bde93ef33bec31c6ec825f8
SHA5121d0d9f18510d32367dbb929ab2d8db74bd50fe0a07c19b3d860475f1e83ed8d3e2c0d3f925044243271f7b01b0fc1dcd2a49865ce6786ff8127df3c67b0c1687
-
C:\Users\Admin\Pictures\Minor Policy\nppGHVB7K6gq0yKI2iFNoh_7.exeFilesize
1.1MB
MD518d2bf88863de2ef12ae51e75fb43118
SHA1a3cd760d5c006a4c49f0b9b21533c2b5a74e9bf6
SHA2561bd24a5e2892cbd6b409ce1d51c97e0f52fac29bcddca67e53deabb51091f16e
SHA512678508881e77c09b6cfd1b62314d3bce7bcf2e1ef8931032e572a5683be49c6a9b5db4e1addab582af34d5a81f4c88b87d0088cb95b93b8ea75478ccf9ef78eb
-
C:\Users\Admin\Pictures\Minor Policy\nppGHVB7K6gq0yKI2iFNoh_7.exeFilesize
1.1MB
MD518d2bf88863de2ef12ae51e75fb43118
SHA1a3cd760d5c006a4c49f0b9b21533c2b5a74e9bf6
SHA2561bd24a5e2892cbd6b409ce1d51c97e0f52fac29bcddca67e53deabb51091f16e
SHA512678508881e77c09b6cfd1b62314d3bce7bcf2e1ef8931032e572a5683be49c6a9b5db4e1addab582af34d5a81f4c88b87d0088cb95b93b8ea75478ccf9ef78eb
-
C:\Users\Admin\Pictures\Minor Policy\sGwuHjeKm9vubkX96hwLfRti.exeFilesize
153KB
MD5a9ac092f289b11e881a4676bf03b8ec9
SHA11c7930297c8e87ae7f2496e6aa98d762824ab102
SHA256bcaabd004b3ff5135feaeb965ee3391030865f6f24ac1bf2d94154f918b97a55
SHA512c2f72c70c4a27fa5db377a9140deabb9b11ed2e83431eebc93aebbfe188a105ce1f209f4a781f9255c6191436acf24885d1c18d4872dd006759601690a0f8572
-
C:\Users\Admin\Pictures\Minor Policy\sGwuHjeKm9vubkX96hwLfRti.exeFilesize
153KB
MD5a9ac092f289b11e881a4676bf03b8ec9
SHA11c7930297c8e87ae7f2496e6aa98d762824ab102
SHA256bcaabd004b3ff5135feaeb965ee3391030865f6f24ac1bf2d94154f918b97a55
SHA512c2f72c70c4a27fa5db377a9140deabb9b11ed2e83431eebc93aebbfe188a105ce1f209f4a781f9255c6191436acf24885d1c18d4872dd006759601690a0f8572
-
C:\Users\Admin\Pictures\Minor Policy\t7lc6VTqj8MziNskl6KfxHaI.exeFilesize
1.9MB
MD5a7bfdce2dc701de7cc9ee15e43e50eb8
SHA1edc73c5dc90b72a91371bce3520626544520d377
SHA2567b9c1aa81aef60c0b403ff3859fc4c6be0b48fb56e1a4456f42ed0da84941993
SHA5122c5ed3a85c8cedf23ce4a47ae1b4ddaae42c86bd7bc6e4110322bc1f0353e0bc9a0632f755381aa6ebb25bee2b234ed9d0e84f28f505132970cd503fc5e3ff6e
-
C:\Users\Admin\Pictures\Minor Policy\xU0XKXvBPWeVzUjplGtTLu3h.exeFilesize
137KB
MD57a3933ca65a7d53136e4aa8cfc4c58ea
SHA11ea49e776ec1d43a6ad45a8abce571b5100f8c3a
SHA256cdeec158f870f8e61be68062c8a73a5004b163dccc80b722792132a0ee83bea8
SHA512a68c42ef4e5eb8fe3139e5580745ac5e0364addfd222f52dbc593cf7015184468a8516206804df2e4dd4cc4548ee819097b6cbbb65ab51321704fc009b82e94d
-
C:\Users\Admin\Pictures\Minor Policy\xU0XKXvBPWeVzUjplGtTLu3h.exeFilesize
137KB
MD57a3933ca65a7d53136e4aa8cfc4c58ea
SHA11ea49e776ec1d43a6ad45a8abce571b5100f8c3a
SHA256cdeec158f870f8e61be68062c8a73a5004b163dccc80b722792132a0ee83bea8
SHA512a68c42ef4e5eb8fe3139e5580745ac5e0364addfd222f52dbc593cf7015184468a8516206804df2e4dd4cc4548ee819097b6cbbb65ab51321704fc009b82e94d
-
\??\c:\users\admin\pictures\minor policy\bp359askzh1rloo7pco__crb.exeFilesize
1.9MB
MD5ed6dbdf2398812d018cfe6e0def16206
SHA16ef72c792948700574ba89283e2340e7ff01cfbc
SHA256e1c911c9ca01ebd5d0293caf5662277d251276dfaf1dcdb3dc581718ad319330
SHA5122385d183c1dec94ba6036b86976db1373d49c39c6ff9be58aae9bc23e457063447f071a46c10e70b6c3006c2067c7b5e840f1d927a7fd0cffddde56803f66865
-
\??\c:\users\admin\pictures\minor policy\t7lc6vtqj8mzinskl6kfxhai.exeFilesize
1.9MB
MD5a7bfdce2dc701de7cc9ee15e43e50eb8
SHA1edc73c5dc90b72a91371bce3520626544520d377
SHA2567b9c1aa81aef60c0b403ff3859fc4c6be0b48fb56e1a4456f42ed0da84941993
SHA5122c5ed3a85c8cedf23ce4a47ae1b4ddaae42c86bd7bc6e4110322bc1f0353e0bc9a0632f755381aa6ebb25bee2b234ed9d0e84f28f505132970cd503fc5e3ff6e
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\Metal.exe.pifFilesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
\Users\Admin\AppData\Local\Temp\is-0L70Q.tmp\Cxt78PI4160hqABVZjKNjwVR.tmpFilesize
694KB
MD5ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
\Users\Admin\Documents\sVuBWlvsfC0EYkbUWI8Ucw96.exeFilesize
5.5MB
MD591f6f48383c2d43120c14b74bf894575
SHA1c49da1e376ae346d420e1486b7b865ee0d6e1485
SHA2566ac2f4b8df5f40ab38af32a7538e2fb12eb243002822b1d17ffa1b7ec1010933
SHA512a93ef32d57ff0991f1a2711371db24063bcf1c5cf4ebf2c24a0ac856b08df046fb760801dce3dca3a4c4f3eaaf18d4c1f0fe2befc5d5df9d5fefadd57f1bc69f
-
\Users\Admin\Pictures\Minor Policy\BP359ASkZh1rlOO7PcO__CRB.exeFilesize
1.9MB
MD5ed6dbdf2398812d018cfe6e0def16206
SHA16ef72c792948700574ba89283e2340e7ff01cfbc
SHA256e1c911c9ca01ebd5d0293caf5662277d251276dfaf1dcdb3dc581718ad319330
SHA5122385d183c1dec94ba6036b86976db1373d49c39c6ff9be58aae9bc23e457063447f071a46c10e70b6c3006c2067c7b5e840f1d927a7fd0cffddde56803f66865
-
\Users\Admin\Pictures\Minor Policy\BP359ASkZh1rlOO7PcO__CRB.exeFilesize
1.9MB
MD5ed6dbdf2398812d018cfe6e0def16206
SHA16ef72c792948700574ba89283e2340e7ff01cfbc
SHA256e1c911c9ca01ebd5d0293caf5662277d251276dfaf1dcdb3dc581718ad319330
SHA5122385d183c1dec94ba6036b86976db1373d49c39c6ff9be58aae9bc23e457063447f071a46c10e70b6c3006c2067c7b5e840f1d927a7fd0cffddde56803f66865
-
\Users\Admin\Pictures\Minor Policy\Cxt78PI4160hqABVZjKNjwVR.exeFilesize
380KB
MD50c51d5838eaa310b8d009ab265c1846e
SHA168f93c9587ddbe7b015c8c78f5fbe6cda4bf2348
SHA2561449e7a3111fdfb697c631367fcbc08eb0ab911bc280fd0c3d132cc3918d1da6
SHA512bcb0d24d5ffc0d037a84480b163e81902f493e91e20e07c58cc9a10e2796e6440732cb453966f675f36ec16890d5106219e38221a94372cd29c4907a35568d68
-
\Users\Admin\Pictures\Minor Policy\RH8yf14C6zX_SmhKlZjEqQ7G.exeFilesize
2.9MB
MD547e313255fb341f9e7f247effd41691e
SHA152fc0c785fa56128e42eb5646cb0246e6e0f3daa
SHA2565385aea904ff1392b6948175b74472f385a5a8328c3e6b672e82342bf269cd8e
SHA512bf8e602abca65a7115a58a06296f22e994e41912a0dbe610aa7726906f4831f192ee6169e56325ea9f8c4e611eb4922ba5cf01b41caa5813448e03c4799ec641
-
\Users\Admin\Pictures\Minor Policy\TqOF1SMLwPC0n2RNkviWV3gy.exeFilesize
12.1MB
MD519b20fc498d366730c470bacab083fe7
SHA19d63950c73423991e2884392bc9682d836f9e031
SHA2568a227b80714a2ee25f04541f20c7bcee3063d96541dde42e9c99523e2cd74341
SHA5120c03e865381fab1e06b2c42f70a3183bd96b06eaa6524f9d254ff708859b89c92a5f7c7186c84888bd543ad1cbf3d45ca4125acdaec059751e9ba2097f90dedb
-
\Users\Admin\Pictures\Minor Policy\VWLfC8yxGNh_axcJChxSqBcx.exeFilesize
1.1MB
MD54478b512a38a3da2a7a5bb6543fb427b
SHA18349387d5fe34c73df2fbf36838170ad58fdc67b
SHA2569cfb0711eb4f20c8532fac7a6556692ddc96066698bef6099dffe664f751a914
SHA5127574ad51f72ec946895a77bd6f81033d9c058ecd66eaaadf61b0eae263586a91c0cccba0bc16e928df949a3bf5a11405f53fb8969c676dd9bdbdccbadb8b2607
-
\Users\Admin\Pictures\Minor Policy\VWLfC8yxGNh_axcJChxSqBcx.exeFilesize
1.1MB
MD54478b512a38a3da2a7a5bb6543fb427b
SHA18349387d5fe34c73df2fbf36838170ad58fdc67b
SHA2569cfb0711eb4f20c8532fac7a6556692ddc96066698bef6099dffe664f751a914
SHA5127574ad51f72ec946895a77bd6f81033d9c058ecd66eaaadf61b0eae263586a91c0cccba0bc16e928df949a3bf5a11405f53fb8969c676dd9bdbdccbadb8b2607
-
\Users\Admin\Pictures\Minor Policy\WfS2RbKmS3OJQsTXUOWmsU4A.exeFilesize
1.4MB
MD5c9deb119d2a568a0ca71371f41d8122a
SHA1c7f1a79568dc921854e20ebf4863260303d43a75
SHA25646c0361b8f63bfefd4883db10b78f1f5e2fa2e512ca4f1b56f5fd5fc47aea9f1
SHA512376587d92e534cc13039f4f5367e83f327ccccef523bf4ce2524ca15784c81a55afba0bad18ecea1e82f04e1b018b535976b9a219175c6b168fe45f7e66190a2
-
\Users\Admin\Pictures\Minor Policy\WfS2RbKmS3OJQsTXUOWmsU4A.exeFilesize
7.3MB
MD54778f232ad8881b94e240b1e987cc44e
SHA1d9468e286eb049fdddff06c9fc4a8ef607d46902
SHA2567253047c4fd48aff60ae6e932858c27865ddb8429266770339615157cfc2d487
SHA51256611bc94ba7c7a34737f88aea2fb24f66c7ca331da0b037d88133598b4cb04c01679b8538913ef090c204c68fc962f951128e8079eee1ddbb6f99fb6ef60ebc
-
\Users\Admin\Pictures\Minor Policy\bmsLTqXLZD8DDwyfmKPQf4dt.exeFilesize
371KB
MD52ece9c26548f57b7bbf291014f14686c
SHA11eed58d45b808a94500d4e04f0d40eb34f67ae9a
SHA2562da18481e0cd85d60ffd6a5c30ad59dc33fb3147a347610618318b6c0840c5b5
SHA512bc113e707d14a113619e3db7d5c188451e1bb391f7b68dbd56aaad22c19e8eb775ca0c868bf5fefb8d7683fc78ecce631e014f75dc6dd40dfdb2c26c0a62acb2
-
\Users\Admin\Pictures\Minor Policy\bmsLTqXLZD8DDwyfmKPQf4dt.exeFilesize
371KB
MD52ece9c26548f57b7bbf291014f14686c
SHA11eed58d45b808a94500d4e04f0d40eb34f67ae9a
SHA2562da18481e0cd85d60ffd6a5c30ad59dc33fb3147a347610618318b6c0840c5b5
SHA512bc113e707d14a113619e3db7d5c188451e1bb391f7b68dbd56aaad22c19e8eb775ca0c868bf5fefb8d7683fc78ecce631e014f75dc6dd40dfdb2c26c0a62acb2
-
\Users\Admin\Pictures\Minor Policy\ki2Zwp96il1plWg7evzqwAFI.exeFilesize
271KB
MD536c51c0d146dbe9024e34b251421a72e
SHA154e5325e012106703cd432d7568f974bd115a337
SHA2560ce402cf92619e1d76d785c01928ec54abcb73933bde93ef33bec31c6ec825f8
SHA5121d0d9f18510d32367dbb929ab2d8db74bd50fe0a07c19b3d860475f1e83ed8d3e2c0d3f925044243271f7b01b0fc1dcd2a49865ce6786ff8127df3c67b0c1687
-
\Users\Admin\Pictures\Minor Policy\nppGHVB7K6gq0yKI2iFNoh_7.exeFilesize
1.1MB
MD518d2bf88863de2ef12ae51e75fb43118
SHA1a3cd760d5c006a4c49f0b9b21533c2b5a74e9bf6
SHA2561bd24a5e2892cbd6b409ce1d51c97e0f52fac29bcddca67e53deabb51091f16e
SHA512678508881e77c09b6cfd1b62314d3bce7bcf2e1ef8931032e572a5683be49c6a9b5db4e1addab582af34d5a81f4c88b87d0088cb95b93b8ea75478ccf9ef78eb
-
\Users\Admin\Pictures\Minor Policy\sGwuHjeKm9vubkX96hwLfRti.exeFilesize
153KB
MD5a9ac092f289b11e881a4676bf03b8ec9
SHA11c7930297c8e87ae7f2496e6aa98d762824ab102
SHA256bcaabd004b3ff5135feaeb965ee3391030865f6f24ac1bf2d94154f918b97a55
SHA512c2f72c70c4a27fa5db377a9140deabb9b11ed2e83431eebc93aebbfe188a105ce1f209f4a781f9255c6191436acf24885d1c18d4872dd006759601690a0f8572
-
\Users\Admin\Pictures\Minor Policy\t7lc6VTqj8MziNskl6KfxHaI.exeFilesize
1.9MB
MD5a7bfdce2dc701de7cc9ee15e43e50eb8
SHA1edc73c5dc90b72a91371bce3520626544520d377
SHA2567b9c1aa81aef60c0b403ff3859fc4c6be0b48fb56e1a4456f42ed0da84941993
SHA5122c5ed3a85c8cedf23ce4a47ae1b4ddaae42c86bd7bc6e4110322bc1f0353e0bc9a0632f755381aa6ebb25bee2b234ed9d0e84f28f505132970cd503fc5e3ff6e
-
\Users\Admin\Pictures\Minor Policy\t7lc6VTqj8MziNskl6KfxHaI.exeFilesize
1.9MB
MD5a7bfdce2dc701de7cc9ee15e43e50eb8
SHA1edc73c5dc90b72a91371bce3520626544520d377
SHA2567b9c1aa81aef60c0b403ff3859fc4c6be0b48fb56e1a4456f42ed0da84941993
SHA5122c5ed3a85c8cedf23ce4a47ae1b4ddaae42c86bd7bc6e4110322bc1f0353e0bc9a0632f755381aa6ebb25bee2b234ed9d0e84f28f505132970cd503fc5e3ff6e
-
\Users\Admin\Pictures\Minor Policy\xU0XKXvBPWeVzUjplGtTLu3h.exeFilesize
137KB
MD57a3933ca65a7d53136e4aa8cfc4c58ea
SHA11ea49e776ec1d43a6ad45a8abce571b5100f8c3a
SHA256cdeec158f870f8e61be68062c8a73a5004b163dccc80b722792132a0ee83bea8
SHA512a68c42ef4e5eb8fe3139e5580745ac5e0364addfd222f52dbc593cf7015184468a8516206804df2e4dd4cc4548ee819097b6cbbb65ab51321704fc009b82e94d
-
memory/112-162-0x0000000000000000-mapping.dmp
-
memory/272-159-0x0000000000000000-mapping.dmp
-
memory/272-195-0x0000000000000000-mapping.dmp
-
memory/380-68-0x0000000000000000-mapping.dmp
-
memory/380-92-0x0000000000000000-mapping.dmp
-
memory/544-150-0x0000000000CC0000-0x0000000000CE8000-memory.dmpFilesize
160KB
-
memory/544-131-0x0000000000000000-mapping.dmp
-
memory/632-141-0x0000000000000000-mapping.dmp
-
memory/672-93-0x0000000003F00000-0x0000000003F27000-memory.dmpFilesize
156KB
-
memory/672-78-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/672-149-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/672-108-0x0000000077AA0000-0x0000000077C20000-memory.dmpFilesize
1.5MB
-
memory/672-75-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/672-70-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/672-65-0x0000000000000000-mapping.dmp
-
memory/672-76-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/672-77-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/672-74-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/672-79-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/672-81-0x0000000077AA0000-0x0000000077C20000-memory.dmpFilesize
1.5MB
-
memory/672-80-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/672-82-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/672-84-0x0000000000400000-0x0000000000EB9000-memory.dmpFilesize
10.7MB
-
memory/764-165-0x0000000000970000-0x0000000000B09000-memory.dmpFilesize
1.6MB
-
memory/764-133-0x0000000002310000-0x0000000002B27000-memory.dmpFilesize
8.1MB
-
memory/764-168-0x000000000F3B0000-0x000000000F6A6000-memory.dmpFilesize
3.0MB
-
memory/764-189-0x0000000000970000-0x0000000000B09000-memory.dmpFilesize
1.6MB
-
memory/764-91-0x0000000000000000-mapping.dmp
-
memory/776-69-0x0000000000000000-mapping.dmp
-
memory/888-103-0x0000000000000000-mapping.dmp
-
memory/948-107-0x0000000000000000-mapping.dmp
-
memory/956-145-0x000007FEF6C30000-0x000007FEF6CCC000-memory.dmpFilesize
624KB
-
memory/956-139-0x000007FEF6CD0000-0x000007FEF6D3F000-memory.dmpFilesize
444KB
-
memory/956-88-0x0000000000000000-mapping.dmp
-
memory/992-104-0x0000000000000000-mapping.dmp
-
memory/992-142-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1000-170-0x0000000000000000-mapping.dmp
-
memory/1464-173-0x0000000000000000-mapping.dmp
-
memory/1472-163-0x0000000000000000-mapping.dmp
-
memory/1504-63-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1504-54-0x00000000768A1000-0x00000000768A3000-memory.dmpFilesize
8KB
-
memory/1504-60-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1504-62-0x0000000077AA0000-0x0000000077C20000-memory.dmpFilesize
1.5MB
-
memory/1504-73-0x0000000077AA0000-0x0000000077C20000-memory.dmpFilesize
1.5MB
-
memory/1504-59-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1504-61-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1504-71-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1504-55-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1504-57-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1504-58-0x0000000000400000-0x0000000000CAD000-memory.dmpFilesize
8.7MB
-
memory/1512-187-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1512-192-0x0000000000140000-0x0000000000149000-memory.dmpFilesize
36KB
-
memory/1512-193-0x0000000000160000-0x000000000016D000-memory.dmpFilesize
52KB
-
memory/1512-191-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1512-185-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1560-151-0x000000000099E000-0x00000000009B4000-memory.dmpFilesize
88KB
-
memory/1560-102-0x0000000000000000-mapping.dmp
-
memory/1560-158-0x0000000000400000-0x000000000085F000-memory.dmpFilesize
4.4MB
-
memory/1560-157-0x0000000000220000-0x0000000000229000-memory.dmpFilesize
36KB
-
memory/1564-180-0x0000000000000000-mapping.dmp
-
memory/1592-125-0x0000000000000000-mapping.dmp
-
memory/1600-160-0x0000000000000000-mapping.dmp
-
memory/1668-164-0x0000000000000000-mapping.dmp
-
memory/1676-169-0x0000000000000000-mapping.dmp
-
memory/1764-175-0x000000000D340000-0x000000000D645000-memory.dmpFilesize
3.0MB
-
memory/1764-106-0x0000000000000000-mapping.dmp
-
memory/1764-121-0x00000000009C0000-0x00000000011F1000-memory.dmpFilesize
8.2MB
-
memory/1764-171-0x0000000001200000-0x00000000013A0000-memory.dmpFilesize
1.6MB
-
memory/1784-120-0x0000000000000000-mapping.dmp
-
memory/1860-154-0x0000000000000000-mapping.dmp
-
memory/1876-147-0x0000000000000000-mapping.dmp
-
memory/1884-130-0x0000000000000000-mapping.dmp
-
memory/1884-153-0x00000000008C0000-0x000000000090A000-memory.dmpFilesize
296KB
-
memory/1952-181-0x0000000000000000-mapping.dmp