Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2023, 08:40

General

  • Target

    2a2ecc42d3253522865e11adc9cd8ff0afd512dcb0ff8abbb5ac4d4d020878f4.exe

  • Size

    196KB

  • MD5

    6fb7a389e547be2eb3a1e3f8c3bd279f

  • SHA1

    1643453c7aec34debddc2aefe38a247c823b3d21

  • SHA256

    2a2ecc42d3253522865e11adc9cd8ff0afd512dcb0ff8abbb5ac4d4d020878f4

  • SHA512

    092f3977f78db5c926327e08336fb8a644bdc0ab97cacc3c02ad9380ac5d9379374a23c31e877954a3040ee99d6d0937efa77593c4356dc973579b657934e0ad

  • SSDEEP

    3072:6r3Tk68kLkXZ/eHLU50NQnnp8qn7JRpgAWsPdt1LzV7/g+gZ8xc9IN:gTk68kLk4H5NQnpVR2crH4+gqxW

Malware Config

Extracted

Family

djvu

C2

http://jiqaz.com/lancer/get.php

Attributes
  • extension

    .hhoo

  • offline_id

    dMMXkgwQTycP13C5xwPbHDSzhx1ZxiPgIMZXewt1

  • payload_url

    http://uaery.top/dl/build2.exe

    http://jiqaz.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-UQkYLBSiQ4 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0648JOsie

rsa_pubkey.plain

Extracted

Family

vidar

Version

2.5

Botnet

19

Attributes
  • profile_id

    19

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    ad75d4e2e9636ca662a337b6e798d36159f23acfc89bbe9400d0d451bd8d69fd

Signatures

  • Detect rhadamanthys stealer shellcode 2 IoCs
  • Detected Djvu ransomware 11 IoCs
  • Detects Smokeloader packer 3 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Modifies security service 2 TTPs 5 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 24 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Users\Admin\AppData\Local\Temp\2a2ecc42d3253522865e11adc9cd8ff0afd512dcb0ff8abbb5ac4d4d020878f4.exe
      "C:\Users\Admin\AppData\Local\Temp\2a2ecc42d3253522865e11adc9cd8ff0afd512dcb0ff8abbb5ac4d4d020878f4.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2636
    • C:\Users\Admin\AppData\Local\Temp\D14F.exe
      C:\Users\Admin\AppData\Local\Temp\D14F.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
        3⤵
        • Creates scheduled task(s)
        PID:1544
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 1136
        3⤵
        • Program crash
        PID:1364
    • C:\Users\Admin\AppData\Local\Temp\D518.exe
      C:\Users\Admin\AppData\Local\Temp\D518.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:5028
    • C:\Users\Admin\AppData\Local\Temp\D6A0.exe
      C:\Users\Admin\AppData\Local\Temp\D6A0.exe
      2⤵
      • Executes dropped EXE
      PID:3772
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3772 -s 448
        3⤵
        • Program crash
        PID:1444
    • C:\Users\Admin\AppData\Local\Temp\E576.exe
      C:\Users\Admin\AppData\Local\Temp\E576.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1872
      • C:\Users\Admin\AppData\Local\Temp\llpb1133a.exe
        "C:\Users\Admin\AppData\Local\Temp\llpb1133a.exe"
        3⤵
        • Executes dropped EXE
        PID:4268
      • C:\Users\Admin\AppData\Local\Temp\liyy.exe
        "C:\Users\Admin\AppData\Local\Temp\liyy.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:680
        • C:\Users\Admin\AppData\Local\Temp\liyy.exe
          "C:\Users\Admin\AppData\Local\Temp\liyy.exe" -h
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:668
      • C:\Users\Admin\AppData\Local\Temp\XandETC.exe
        "C:\Users\Admin\AppData\Local\Temp\XandETC.exe"
        3⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Executes dropped EXE
        • Drops file in Program Files directory
        PID:4552
    • C:\Users\Admin\AppData\Local\Temp\FC6A.exe
      C:\Users\Admin\AppData\Local\Temp\FC6A.exe
      2⤵
      • Executes dropped EXE
      PID:3972
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 812
        3⤵
        • Program crash
        PID:2200
    • C:\Users\Admin\AppData\Local\Temp\A1.exe
      C:\Users\Admin\AppData\Local\Temp\A1.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:4072
    • C:\Users\Admin\AppData\Local\Temp\2A6.exe
      C:\Users\Admin\AppData\Local\Temp\2A6.exe
      2⤵
      • Executes dropped EXE
      PID:2956
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 456
        3⤵
        • Program crash
        PID:3696
    • C:\Users\Admin\AppData\Local\Temp\40E.exe
      C:\Users\Admin\AppData\Local\Temp\40E.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\40E.exe
        C:\Users\Admin\AppData\Local\Temp\40E.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1096
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\b0669104-750d-4b7a-9f5a-f991dba747b4" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          4⤵
          • Modifies file permissions
          PID:2060
        • C:\Users\Admin\AppData\Local\Temp\40E.exe
          "C:\Users\Admin\AppData\Local\Temp\40E.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3832
          • C:\Users\Admin\AppData\Local\Temp\40E.exe
            "C:\Users\Admin\AppData\Local\Temp\40E.exe" --Admin IsNotAutoStart IsNotTask
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:4360
            • C:\Users\Admin\AppData\Local\05efc326-ccbd-418d-9dd3-b4fc492e45ae\build2.exe
              "C:\Users\Admin\AppData\Local\05efc326-ccbd-418d-9dd3-b4fc492e45ae\build2.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:2296
              • C:\Users\Admin\AppData\Local\05efc326-ccbd-418d-9dd3-b4fc492e45ae\build2.exe
                "C:\Users\Admin\AppData\Local\05efc326-ccbd-418d-9dd3-b4fc492e45ae\build2.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks processor information in registry
                PID:912
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\05efc326-ccbd-418d-9dd3-b4fc492e45ae\build2.exe" & exit
                  8⤵
                    PID:2556
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /t 6
                      9⤵
                      • Delays execution with timeout.exe
                      PID:856
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 912 -s 2144
                    8⤵
                    • Program crash
                    PID:2616
              • C:\Users\Admin\AppData\Local\05efc326-ccbd-418d-9dd3-b4fc492e45ae\build3.exe
                "C:\Users\Admin\AppData\Local\05efc326-ccbd-418d-9dd3-b4fc492e45ae\build3.exe"
                6⤵
                • Executes dropped EXE
                PID:4588
                • C:\Windows\SysWOW64\schtasks.exe
                  /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                  7⤵
                  • Creates scheduled task(s)
                  PID:4464
      • C:\Users\Admin\AppData\Local\Temp\548.exe
        C:\Users\Admin\AppData\Local\Temp\548.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        PID:2268
        • C:\Windows\system32\dllhost.exe
          "C:\Windows\system32\dllhost.exe"
          3⤵
          • Accesses Microsoft Outlook profiles
          • Checks processor information in registry
          • outlook_office_path
          • outlook_win_path
          PID:4324
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 704
          3⤵
          • Program crash
          PID:4472
      • C:\Users\Admin\AppData\Local\Temp\874A.exe
        C:\Users\Admin\AppData\Local\Temp\874A.exe
        2⤵
        • Executes dropped EXE
        PID:2520
      • C:\Users\Admin\AppData\Local\Temp\8D85.exe
        C:\Users\Admin\AppData\Local\Temp\8D85.exe
        2⤵
        • Executes dropped EXE
        PID:4180
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3408
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        2⤵
          PID:4956
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3440
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
          2⤵
            PID:3956
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-ac 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1260
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-dc 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3488
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-dc 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2008
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-ac 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4288
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
            2⤵
              PID:2896
              • C:\Windows\System32\sc.exe
                sc stop UsoSvc
                3⤵
                • Launches sc.exe
                PID:3580
              • C:\Windows\System32\sc.exe
                sc stop WaaSMedicSvc
                3⤵
                • Launches sc.exe
                PID:1420
              • C:\Windows\System32\sc.exe
                sc stop wuauserv
                3⤵
                • Launches sc.exe
                PID:3464
              • C:\Windows\System32\sc.exe
                sc stop bits
                3⤵
                • Launches sc.exe
                PID:5020
              • C:\Windows\System32\sc.exe
                sc stop dosvc
                3⤵
                • Launches sc.exe
                PID:1576
              • C:\Windows\System32\reg.exe
                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                3⤵
                  PID:2300
                • C:\Windows\System32\reg.exe
                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                  3⤵
                    PID:1132
                  • C:\Windows\System32\reg.exe
                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                    3⤵
                    • Modifies security service
                    PID:2484
                  • C:\Windows\System32\reg.exe
                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                    3⤵
                      PID:4200
                    • C:\Windows\System32\reg.exe
                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                      3⤵
                        PID:4824
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      2⤵
                        PID:1188
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        2⤵
                          PID:1856
                        • C:\Windows\explorer.exe
                          C:\Windows\explorer.exe
                          2⤵
                            PID:980
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#iqegjinl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "NoteUpdateTaskMachineQC" } Else { "C:\Program Files\Notepad\Chrome\updater.exe" }
                            2⤵
                              PID:4508
                              • C:\Windows\system32\schtasks.exe
                                "C:\Windows\system32\schtasks.exe" /run /tn NoteUpdateTaskMachineQC
                                3⤵
                                  PID:2828
                              • C:\Windows\SysWOW64\explorer.exe
                                C:\Windows\SysWOW64\explorer.exe
                                2⤵
                                  PID:3616
                                • C:\Windows\SysWOW64\explorer.exe
                                  C:\Windows\SysWOW64\explorer.exe
                                  2⤵
                                    PID:2188
                                  • C:\Windows\SysWOW64\explorer.exe
                                    C:\Windows\SysWOW64\explorer.exe
                                    2⤵
                                      PID:3888
                                    • C:\Windows\explorer.exe
                                      C:\Windows\explorer.exe
                                      2⤵
                                        PID:1652
                                      • C:\Windows\SysWOW64\explorer.exe
                                        C:\Windows\SysWOW64\explorer.exe
                                        2⤵
                                          PID:4152
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                          2⤵
                                          • Modifies data under HKEY_USERS
                                          PID:1552
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3772 -ip 3772
                                        1⤵
                                          PID:4824
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2376 -ip 2376
                                          1⤵
                                            PID:4516
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3972 -ip 3972
                                            1⤵
                                              PID:1092
                                            • C:\Windows\system32\rundll32.exe
                                              rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Suspicious use of WriteProcessMemory
                                              PID:4828
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open
                                                2⤵
                                                • Loads dropped DLL
                                                PID:4744
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 596
                                                  3⤵
                                                  • Program crash
                                                  PID:1996
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4744 -ip 4744
                                              1⤵
                                                PID:3024
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2956 -ip 2956
                                                1⤵
                                                  PID:1656
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 912 -ip 912
                                                  1⤵
                                                    PID:3888
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2268 -ip 2268
                                                    1⤵
                                                      PID:2276
                                                    • C:\Program Files\Notepad\Chrome\updater.exe
                                                      "C:\Program Files\Notepad\Chrome\updater.exe"
                                                      1⤵
                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                      • Executes dropped EXE
                                                      PID:4440
                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:4844
                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                                                        2⤵
                                                        • Creates scheduled task(s)
                                                        PID:1412
                                                    • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
                                                      C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:3312

                                                    Network

                                                    MITRE ATT&CK Enterprise v6

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Program Files\Notepad\Chrome\updater.exe

                                                      Filesize

                                                      3.7MB

                                                      MD5

                                                      3006b49f3a30a80bb85074c279acc7df

                                                      SHA1

                                                      728a7a867d13ad0034c29283939d94f0df6c19df

                                                      SHA256

                                                      f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                                                      SHA512

                                                      e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                                                    • C:\ProgramData\mozglue.dll

                                                      Filesize

                                                      593KB

                                                      MD5

                                                      c8fd9be83bc728cc04beffafc2907fe9

                                                      SHA1

                                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                      SHA256

                                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                      SHA512

                                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                    • C:\ProgramData\mozglue.dll

                                                      Filesize

                                                      593KB

                                                      MD5

                                                      c8fd9be83bc728cc04beffafc2907fe9

                                                      SHA1

                                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                      SHA256

                                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                      SHA512

                                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                    • C:\ProgramData\nss3.dll

                                                      Filesize

                                                      2.0MB

                                                      MD5

                                                      1cc453cdf74f31e4d913ff9c10acdde2

                                                      SHA1

                                                      6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                      SHA256

                                                      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                      SHA512

                                                      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                    • C:\ProgramData\nss3.dll

                                                      Filesize

                                                      2.0MB

                                                      MD5

                                                      1cc453cdf74f31e4d913ff9c10acdde2

                                                      SHA1

                                                      6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                      SHA256

                                                      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                      SHA512

                                                      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      9537870d15b0280e05e86e521aff4d50

                                                      SHA1

                                                      bbeb1b7a94d925fda0cb639e884bebaefd600dcc

                                                      SHA256

                                                      0d4d5955a7f5b3967f218a4be0ceddceafac2409f7fecc2f4e1af583f4a40dba

                                                      SHA512

                                                      1ea975472134e6b5c2a727a026d555f6f912c79d8a78119413a412eacfc7e35071c22bbcd4007fa501d5e553f9b1ed9f7f88c523a98af5a59905e9bb3d5c4e03

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      c4a25dfef00224e399cdff2b249b3ed9

                                                      SHA1

                                                      6d2f5e34668868607fa75fd506da5fdc33d75b32

                                                      SHA256

                                                      59e08914fdecf341021137601b765d45dbe07710a24ab1fce168ab2b113136e8

                                                      SHA512

                                                      d6c8698a0799456c1aec51e5625cd3e6400f64b93e82c2c92cb3fdfbcba91361854aa759272c3ac3353cfbbb5bb0155d8aa895079d69afea28b775228e123c26

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                                      Filesize

                                                      488B

                                                      MD5

                                                      9495c3cbcdd77ddf3629fa88a259eb3e

                                                      SHA1

                                                      c0284a199ec1aab7c07362ad47e5c6a4bb0cdc58

                                                      SHA256

                                                      f8b5e40081a43eaf565e8e40dd9efefc433378bb50754080ab28526ea0e99b3f

                                                      SHA512

                                                      836e8bcc904d2d55cf4f187ebc4e41bed702990961c592828b948624181ceae3fade88c7d62505153f4481267adff78268a2ee6dc87b1ed828fad51f0496ef05

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                                      Filesize

                                                      482B

                                                      MD5

                                                      cbddfa01141bc568ce8097958112ed09

                                                      SHA1

                                                      cf0b3c4e595d4de38d719aa60ecdf3154b9003a5

                                                      SHA256

                                                      4fb189e9912981c7f8959cfac5ab69b0fb95d85e879c93f6f3efe2c4d6dff93c

                                                      SHA512

                                                      c8116b1734c0b53fe5340cee469946ba9f82370a570a1c6caddf8a89c4d6e607b20c15d797a710b673ca5a928c8773779014d97a141b600ea723fee82e60c57d

                                                    • C:\Users\Admin\AppData\Local\05efc326-ccbd-418d-9dd3-b4fc492e45ae\build2.exe

                                                      Filesize

                                                      325KB

                                                      MD5

                                                      4c9fdfbf316f37dbcc7314e5641f9a9a

                                                      SHA1

                                                      7fa01df0e5420f9e5b69486550460e839fd0f3a3

                                                      SHA256

                                                      e661e53f429cd22e30ca6fb368f3e011e76264892f4e718c75cb3636f4f2e611

                                                      SHA512

                                                      b22c60d27ed5457677645a2b8669cd1958cc18a021e19dcf1d1a3a88ed63cd4eb749b1fe8798f651dcc5595d019ceb3cb38eae7a07ab73098eee502dbee5c32b

                                                    • C:\Users\Admin\AppData\Local\05efc326-ccbd-418d-9dd3-b4fc492e45ae\build2.exe

                                                      Filesize

                                                      325KB

                                                      MD5

                                                      4c9fdfbf316f37dbcc7314e5641f9a9a

                                                      SHA1

                                                      7fa01df0e5420f9e5b69486550460e839fd0f3a3

                                                      SHA256

                                                      e661e53f429cd22e30ca6fb368f3e011e76264892f4e718c75cb3636f4f2e611

                                                      SHA512

                                                      b22c60d27ed5457677645a2b8669cd1958cc18a021e19dcf1d1a3a88ed63cd4eb749b1fe8798f651dcc5595d019ceb3cb38eae7a07ab73098eee502dbee5c32b

                                                    • C:\Users\Admin\AppData\Local\05efc326-ccbd-418d-9dd3-b4fc492e45ae\build2.exe

                                                      Filesize

                                                      325KB

                                                      MD5

                                                      4c9fdfbf316f37dbcc7314e5641f9a9a

                                                      SHA1

                                                      7fa01df0e5420f9e5b69486550460e839fd0f3a3

                                                      SHA256

                                                      e661e53f429cd22e30ca6fb368f3e011e76264892f4e718c75cb3636f4f2e611

                                                      SHA512

                                                      b22c60d27ed5457677645a2b8669cd1958cc18a021e19dcf1d1a3a88ed63cd4eb749b1fe8798f651dcc5595d019ceb3cb38eae7a07ab73098eee502dbee5c32b

                                                    • C:\Users\Admin\AppData\Local\05efc326-ccbd-418d-9dd3-b4fc492e45ae\build3.exe

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      9ead10c08e72ae41921191f8db39bc16

                                                      SHA1

                                                      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                      SHA256

                                                      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                      SHA512

                                                      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                    • C:\Users\Admin\AppData\Local\05efc326-ccbd-418d-9dd3-b4fc492e45ae\build3.exe

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      9ead10c08e72ae41921191f8db39bc16

                                                      SHA1

                                                      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                      SHA256

                                                      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                      SHA512

                                                      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      d85ba6ff808d9e5444a4b369f5bc2730

                                                      SHA1

                                                      31aa9d96590fff6981b315e0b391b575e4c0804a

                                                      SHA256

                                                      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                      SHA512

                                                      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      22fbec4acba323d04079a263526cef3c

                                                      SHA1

                                                      eb8dd0042c6a3f20087a7d2391eaf48121f98740

                                                      SHA256

                                                      020e5d769893724f075e10b01c59bf2424214cefe6aafbab6f44bc700f525c40

                                                      SHA512

                                                      fb61d737de8cbed6b7d8b5a35911c46ef26a2927a52ed7add9d594cf19dcab1b9978b61912c6f3fe4f29228f4454fb022fb2e167788c727dc6503c1fcd42159e

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      5b9a7ee9a9286faef39bbe9cac042fd4

                                                      SHA1

                                                      cb3ef3c9e19781c45ffd9e2902e5b0ed38c0e2c3

                                                      SHA256

                                                      a6d5d07c333b6a68534ebc0ee23ea49e77a67f26597e4bd5bcc8dfd216e6a348

                                                      SHA512

                                                      ea14a4932134952864bd1b0ccdfd6ad45ed650a9bc52589f6d21fc4382a6237c6bbce1c016482b4a68cd609dadea234726927ba0f26e9443a6b970209281f450

                                                    • C:\Users\Admin\AppData\Local\Temp\2A6.exe

                                                      Filesize

                                                      229KB

                                                      MD5

                                                      c343b0f07ff816544a083ece56688a72

                                                      SHA1

                                                      ad2d9da050fe2e7dcf4377fe68528ff90c821047

                                                      SHA256

                                                      277deed4c63f49cfbbf4e1d290c47f54b038f8ea250676c5a4cbacf6db6bd25d

                                                      SHA512

                                                      a105a4c42d93ebbc19edd75d79cd890ca4c8d61961f35272a4bd02e967baed721fa32d7f8b3bf9d2be546e70df9e603c0807f1607ca12a849517af64427e0c8d

                                                    • C:\Users\Admin\AppData\Local\Temp\40E.exe

                                                      Filesize

                                                      728KB

                                                      MD5

                                                      d31f2adb699c91039cadd65a1858c32e

                                                      SHA1

                                                      3bc0f147f2965e412597b258237f39c5c0a27490

                                                      SHA256

                                                      dc29173fe5ef8012fa19496d83bbbe5684569733e7d04dacb8cad267b166149c

                                                      SHA512

                                                      497d6bd934009ce22c4b73a1f108db9feb27aa52d124cc2dad9cb0ffefd9805c118a50283661c39dbdab06fa276150e1fe9037f302aa4273348eb2e57fe188c8

                                                    • C:\Users\Admin\AppData\Local\Temp\40E.exe

                                                      Filesize

                                                      728KB

                                                      MD5

                                                      d31f2adb699c91039cadd65a1858c32e

                                                      SHA1

                                                      3bc0f147f2965e412597b258237f39c5c0a27490

                                                      SHA256

                                                      dc29173fe5ef8012fa19496d83bbbe5684569733e7d04dacb8cad267b166149c

                                                      SHA512

                                                      497d6bd934009ce22c4b73a1f108db9feb27aa52d124cc2dad9cb0ffefd9805c118a50283661c39dbdab06fa276150e1fe9037f302aa4273348eb2e57fe188c8

                                                    • C:\Users\Admin\AppData\Local\Temp\40E.exe

                                                      Filesize

                                                      728KB

                                                      MD5

                                                      d31f2adb699c91039cadd65a1858c32e

                                                      SHA1

                                                      3bc0f147f2965e412597b258237f39c5c0a27490

                                                      SHA256

                                                      dc29173fe5ef8012fa19496d83bbbe5684569733e7d04dacb8cad267b166149c

                                                      SHA512

                                                      497d6bd934009ce22c4b73a1f108db9feb27aa52d124cc2dad9cb0ffefd9805c118a50283661c39dbdab06fa276150e1fe9037f302aa4273348eb2e57fe188c8

                                                    • C:\Users\Admin\AppData\Local\Temp\40E.exe

                                                      Filesize

                                                      728KB

                                                      MD5

                                                      d31f2adb699c91039cadd65a1858c32e

                                                      SHA1

                                                      3bc0f147f2965e412597b258237f39c5c0a27490

                                                      SHA256

                                                      dc29173fe5ef8012fa19496d83bbbe5684569733e7d04dacb8cad267b166149c

                                                      SHA512

                                                      497d6bd934009ce22c4b73a1f108db9feb27aa52d124cc2dad9cb0ffefd9805c118a50283661c39dbdab06fa276150e1fe9037f302aa4273348eb2e57fe188c8

                                                    • C:\Users\Admin\AppData\Local\Temp\40E.exe

                                                      Filesize

                                                      728KB

                                                      MD5

                                                      d31f2adb699c91039cadd65a1858c32e

                                                      SHA1

                                                      3bc0f147f2965e412597b258237f39c5c0a27490

                                                      SHA256

                                                      dc29173fe5ef8012fa19496d83bbbe5684569733e7d04dacb8cad267b166149c

                                                      SHA512

                                                      497d6bd934009ce22c4b73a1f108db9feb27aa52d124cc2dad9cb0ffefd9805c118a50283661c39dbdab06fa276150e1fe9037f302aa4273348eb2e57fe188c8

                                                    • C:\Users\Admin\AppData\Local\Temp\548.exe

                                                      Filesize

                                                      288KB

                                                      MD5

                                                      55f00bf3a8efc6b6aa3b84362a8355e7

                                                      SHA1

                                                      87781f68fc80b23290e330755d65c9a52c8ad890

                                                      SHA256

                                                      df65e93cddf79b31b474f39477aa3038cb666965311676096d9e02a5b5cf7523

                                                      SHA512

                                                      e154d31d0ca81997e61b75b06a148b8fad1cce21287528b6d254d538a4e956364ee10810bc63d76ee91d3606763152e1e67d12a228e7ace0ee491667f1082988

                                                    • C:\Users\Admin\AppData\Local\Temp\548.exe

                                                      Filesize

                                                      288KB

                                                      MD5

                                                      55f00bf3a8efc6b6aa3b84362a8355e7

                                                      SHA1

                                                      87781f68fc80b23290e330755d65c9a52c8ad890

                                                      SHA256

                                                      df65e93cddf79b31b474f39477aa3038cb666965311676096d9e02a5b5cf7523

                                                      SHA512

                                                      e154d31d0ca81997e61b75b06a148b8fad1cce21287528b6d254d538a4e956364ee10810bc63d76ee91d3606763152e1e67d12a228e7ace0ee491667f1082988

                                                    • C:\Users\Admin\AppData\Local\Temp\874A.exe

                                                      Filesize

                                                      4KB

                                                      MD5

                                                      9748489855d9dd82ab09da5e3e55b19e

                                                      SHA1

                                                      6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                                                      SHA256

                                                      05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                                                      SHA512

                                                      7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                                                    • C:\Users\Admin\AppData\Local\Temp\874A.exe

                                                      Filesize

                                                      4KB

                                                      MD5

                                                      9748489855d9dd82ab09da5e3e55b19e

                                                      SHA1

                                                      6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                                                      SHA256

                                                      05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                                                      SHA512

                                                      7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                                                    • C:\Users\Admin\AppData\Local\Temp\8D85.exe

                                                      Filesize

                                                      4KB

                                                      MD5

                                                      9748489855d9dd82ab09da5e3e55b19e

                                                      SHA1

                                                      6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                                                      SHA256

                                                      05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                                                      SHA512

                                                      7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                                                    • C:\Users\Admin\AppData\Local\Temp\8D85.exe

                                                      Filesize

                                                      4KB

                                                      MD5

                                                      9748489855d9dd82ab09da5e3e55b19e

                                                      SHA1

                                                      6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                                                      SHA256

                                                      05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                                                      SHA512

                                                      7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                                                    • C:\Users\Admin\AppData\Local\Temp\A1.exe

                                                      Filesize

                                                      199KB

                                                      MD5

                                                      eab5a6cc11491b2b455143b7254cc805

                                                      SHA1

                                                      55f06c9e92db39266595cb75e711fa740741bcbe

                                                      SHA256

                                                      211c27b21f4d110368304e47c15cbd9cbcc558c414377dfd320da3f0c67ad2c5

                                                      SHA512

                                                      5af35e13fbf8d2f0573bb9bc9910e146b8938046184a1deefa8c99643f14cfcfaf8d03dd0ca92dd91dcb43e99f66ab844c136f6723f8a23c038bd3d52bbb9288

                                                    • C:\Users\Admin\AppData\Local\Temp\A1.exe

                                                      Filesize

                                                      199KB

                                                      MD5

                                                      eab5a6cc11491b2b455143b7254cc805

                                                      SHA1

                                                      55f06c9e92db39266595cb75e711fa740741bcbe

                                                      SHA256

                                                      211c27b21f4d110368304e47c15cbd9cbcc558c414377dfd320da3f0c67ad2c5

                                                      SHA512

                                                      5af35e13fbf8d2f0573bb9bc9910e146b8938046184a1deefa8c99643f14cfcfaf8d03dd0ca92dd91dcb43e99f66ab844c136f6723f8a23c038bd3d52bbb9288

                                                    • C:\Users\Admin\AppData\Local\Temp\D14F.exe

                                                      Filesize

                                                      274KB

                                                      MD5

                                                      422bae02b141829ff15435a9116e33f7

                                                      SHA1

                                                      c5521bdc6287df403cbbf89f282e810aa001ae49

                                                      SHA256

                                                      c02b287cfde7eeea78da65bb100f6d84a2ada656653234e3eaae732ddc4f607e

                                                      SHA512

                                                      a5133919d1f41db225418ea7bad7e28ef7985ebffc0e4f4b7f9b1f99cb804e7e6223af5d81519447764d2ae00498c6676e8cb8bfb957b124091dc7fbb1e82f34

                                                    • C:\Users\Admin\AppData\Local\Temp\D14F.exe

                                                      Filesize

                                                      274KB

                                                      MD5

                                                      422bae02b141829ff15435a9116e33f7

                                                      SHA1

                                                      c5521bdc6287df403cbbf89f282e810aa001ae49

                                                      SHA256

                                                      c02b287cfde7eeea78da65bb100f6d84a2ada656653234e3eaae732ddc4f607e

                                                      SHA512

                                                      a5133919d1f41db225418ea7bad7e28ef7985ebffc0e4f4b7f9b1f99cb804e7e6223af5d81519447764d2ae00498c6676e8cb8bfb957b124091dc7fbb1e82f34

                                                    • C:\Users\Admin\AppData\Local\Temp\D518.exe

                                                      Filesize

                                                      198KB

                                                      MD5

                                                      27ecc28902fc2b694b39e284980d0c1a

                                                      SHA1

                                                      8a19a799b1da0146f6c583415c1060f380450118

                                                      SHA256

                                                      4718fa2de2addfec44ab90ab9f1112059c2145d110db0a0a518c32d675843366

                                                      SHA512

                                                      3b04b31fce2003058fb3bea6a4e0364f631113f5cc4e26ab7616db922d086d6c3c02935c44ab75ce082182c158d0a4d04c86bd720c4fc9fc764203002da4728a

                                                    • C:\Users\Admin\AppData\Local\Temp\D518.exe

                                                      Filesize

                                                      198KB

                                                      MD5

                                                      27ecc28902fc2b694b39e284980d0c1a

                                                      SHA1

                                                      8a19a799b1da0146f6c583415c1060f380450118

                                                      SHA256

                                                      4718fa2de2addfec44ab90ab9f1112059c2145d110db0a0a518c32d675843366

                                                      SHA512

                                                      3b04b31fce2003058fb3bea6a4e0364f631113f5cc4e26ab7616db922d086d6c3c02935c44ab75ce082182c158d0a4d04c86bd720c4fc9fc764203002da4728a

                                                    • C:\Users\Admin\AppData\Local\Temp\D6A0.exe

                                                      Filesize

                                                      229KB

                                                      MD5

                                                      ee4b240c18a598277991ba4ec8957417

                                                      SHA1

                                                      11bc69eee12f74edd762216c4b2aac9536ea49a5

                                                      SHA256

                                                      67cc26f5d9a43b794f7e0edad0b111592c6ab805a4e933e9e2b1bb95718646c7

                                                      SHA512

                                                      2ea3d73f83758b3aa80c867c9d29f27f60d316c18c66f147476e39b1db1a6c8c765f096453a432ac396908ef3248aaec50dc1d94b95ad721d3d977e8ea300615

                                                    • C:\Users\Admin\AppData\Local\Temp\D6A0.exe

                                                      Filesize

                                                      229KB

                                                      MD5

                                                      ee4b240c18a598277991ba4ec8957417

                                                      SHA1

                                                      11bc69eee12f74edd762216c4b2aac9536ea49a5

                                                      SHA256

                                                      67cc26f5d9a43b794f7e0edad0b111592c6ab805a4e933e9e2b1bb95718646c7

                                                      SHA512

                                                      2ea3d73f83758b3aa80c867c9d29f27f60d316c18c66f147476e39b1db1a6c8c765f096453a432ac396908ef3248aaec50dc1d94b95ad721d3d977e8ea300615

                                                    • C:\Users\Admin\AppData\Local\Temp\E576.exe

                                                      Filesize

                                                      7.5MB

                                                      MD5

                                                      52f4f9797fbb76785a1b8cf695e65a15

                                                      SHA1

                                                      32deadcec14dca90fe14030f69097f8bd6d98b95

                                                      SHA256

                                                      1ea28978334fa03b2714b5c22abd580cdd8b5b0a6fcdf895fe1367ac96da0e8b

                                                      SHA512

                                                      3c32798f1dae91d17ea4ca32aa153dd064e6d2dfe7acd98079edb1182f16b287a76ea621aa01b08019d10cac771c8d16db555f96fd4b0b6e0bcd528010a64e84

                                                    • C:\Users\Admin\AppData\Local\Temp\E576.exe

                                                      Filesize

                                                      7.5MB

                                                      MD5

                                                      52f4f9797fbb76785a1b8cf695e65a15

                                                      SHA1

                                                      32deadcec14dca90fe14030f69097f8bd6d98b95

                                                      SHA256

                                                      1ea28978334fa03b2714b5c22abd580cdd8b5b0a6fcdf895fe1367ac96da0e8b

                                                      SHA512

                                                      3c32798f1dae91d17ea4ca32aa153dd064e6d2dfe7acd98079edb1182f16b287a76ea621aa01b08019d10cac771c8d16db555f96fd4b0b6e0bcd528010a64e84

                                                    • C:\Users\Admin\AppData\Local\Temp\FC6A.exe

                                                      Filesize

                                                      7.5MB

                                                      MD5

                                                      52f4f9797fbb76785a1b8cf695e65a15

                                                      SHA1

                                                      32deadcec14dca90fe14030f69097f8bd6d98b95

                                                      SHA256

                                                      1ea28978334fa03b2714b5c22abd580cdd8b5b0a6fcdf895fe1367ac96da0e8b

                                                      SHA512

                                                      3c32798f1dae91d17ea4ca32aa153dd064e6d2dfe7acd98079edb1182f16b287a76ea621aa01b08019d10cac771c8d16db555f96fd4b0b6e0bcd528010a64e84

                                                    • C:\Users\Admin\AppData\Local\Temp\FC6A.exe

                                                      Filesize

                                                      7.5MB

                                                      MD5

                                                      52f4f9797fbb76785a1b8cf695e65a15

                                                      SHA1

                                                      32deadcec14dca90fe14030f69097f8bd6d98b95

                                                      SHA256

                                                      1ea28978334fa03b2714b5c22abd580cdd8b5b0a6fcdf895fe1367ac96da0e8b

                                                      SHA512

                                                      3c32798f1dae91d17ea4ca32aa153dd064e6d2dfe7acd98079edb1182f16b287a76ea621aa01b08019d10cac771c8d16db555f96fd4b0b6e0bcd528010a64e84

                                                    • C:\Users\Admin\AppData\Local\Temp\XandETC.exe

                                                      Filesize

                                                      3.7MB

                                                      MD5

                                                      3006b49f3a30a80bb85074c279acc7df

                                                      SHA1

                                                      728a7a867d13ad0034c29283939d94f0df6c19df

                                                      SHA256

                                                      f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                                                      SHA512

                                                      e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                                                    • C:\Users\Admin\AppData\Local\Temp\XandETC.exe

                                                      Filesize

                                                      3.7MB

                                                      MD5

                                                      3006b49f3a30a80bb85074c279acc7df

                                                      SHA1

                                                      728a7a867d13ad0034c29283939d94f0df6c19df

                                                      SHA256

                                                      f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                                                      SHA512

                                                      e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                                                    • C:\Users\Admin\AppData\Local\Temp\db.dat

                                                      Filesize

                                                      557KB

                                                      MD5

                                                      30d5f615722d12fdda4f378048221909

                                                      SHA1

                                                      e94e3e3a6fae8b29f0f80128761ad1b69304a7eb

                                                      SHA256

                                                      b7cb464cd0c61026ec38d89c0a041393bc9369e217303677551eec65a09d2628

                                                      SHA512

                                                      a561a224d7228ec531a966c7dbd6bc88138e2f4a1c8112e5950644f69bf3a43b1e87e03bc1b4fd5e9ca071b5a9353b18697573404602ccd51f2946faf95144c2

                                                    • C:\Users\Admin\AppData\Local\Temp\db.dll

                                                      Filesize

                                                      52KB

                                                      MD5

                                                      1b20e998d058e813dfc515867d31124f

                                                      SHA1

                                                      c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f

                                                      SHA256

                                                      24a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00

                                                      SHA512

                                                      79849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6

                                                    • C:\Users\Admin\AppData\Local\Temp\db.dll

                                                      Filesize

                                                      52KB

                                                      MD5

                                                      1b20e998d058e813dfc515867d31124f

                                                      SHA1

                                                      c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f

                                                      SHA256

                                                      24a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00

                                                      SHA512

                                                      79849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6

                                                    • C:\Users\Admin\AppData\Local\Temp\liyy.exe

                                                      Filesize

                                                      312KB

                                                      MD5

                                                      1310b14202d951cfeb5a37256cb577f1

                                                      SHA1

                                                      8372ad9ceaf4f386bee6f28d2686f44598b0e422

                                                      SHA256

                                                      2658e2d285ffb7dbc4d084728bcb65a537fefe900eeb07a10b42f3c61291ce2c

                                                      SHA512

                                                      f4a56b74e660b4683fd61e90528a65804053c84501af1735a12171a097b9a368538aee99d9338208407a1060a47ee532c5bfc2f479b0034debcf7559a757a79e

                                                    • C:\Users\Admin\AppData\Local\Temp\liyy.exe

                                                      Filesize

                                                      312KB

                                                      MD5

                                                      1310b14202d951cfeb5a37256cb577f1

                                                      SHA1

                                                      8372ad9ceaf4f386bee6f28d2686f44598b0e422

                                                      SHA256

                                                      2658e2d285ffb7dbc4d084728bcb65a537fefe900eeb07a10b42f3c61291ce2c

                                                      SHA512

                                                      f4a56b74e660b4683fd61e90528a65804053c84501af1735a12171a097b9a368538aee99d9338208407a1060a47ee532c5bfc2f479b0034debcf7559a757a79e

                                                    • C:\Users\Admin\AppData\Local\Temp\liyy.exe

                                                      Filesize

                                                      312KB

                                                      MD5

                                                      1310b14202d951cfeb5a37256cb577f1

                                                      SHA1

                                                      8372ad9ceaf4f386bee6f28d2686f44598b0e422

                                                      SHA256

                                                      2658e2d285ffb7dbc4d084728bcb65a537fefe900eeb07a10b42f3c61291ce2c

                                                      SHA512

                                                      f4a56b74e660b4683fd61e90528a65804053c84501af1735a12171a097b9a368538aee99d9338208407a1060a47ee532c5bfc2f479b0034debcf7559a757a79e

                                                    • C:\Users\Admin\AppData\Local\Temp\llpb1133a.exe

                                                      Filesize

                                                      3.5MB

                                                      MD5

                                                      61f42ae7c6cd1248603f3b08945531d8

                                                      SHA1

                                                      760a9f9d637162f32067e26ffe09c0c3a6e03796

                                                      SHA256

                                                      5e616003629c8604e0345f7ffb0902c641438ea73ad692cf1e2100e5560a6e0c

                                                      SHA512

                                                      cb5195c2812aa8399a94b9612831622b88e180f0f08c6e93dca0ff9279bde029d129cac43ccfe4aada61ac974839d93bff6869db2a8470db1c5131e9626ed4dd

                                                    • C:\Users\Admin\AppData\Local\Temp\llpb1133a.exe

                                                      Filesize

                                                      3.5MB

                                                      MD5

                                                      61f42ae7c6cd1248603f3b08945531d8

                                                      SHA1

                                                      760a9f9d637162f32067e26ffe09c0c3a6e03796

                                                      SHA256

                                                      5e616003629c8604e0345f7ffb0902c641438ea73ad692cf1e2100e5560a6e0c

                                                      SHA512

                                                      cb5195c2812aa8399a94b9612831622b88e180f0f08c6e93dca0ff9279bde029d129cac43ccfe4aada61ac974839d93bff6869db2a8470db1c5131e9626ed4dd

                                                    • C:\Users\Admin\AppData\Local\b0669104-750d-4b7a-9f5a-f991dba747b4\40E.exe

                                                      Filesize

                                                      728KB

                                                      MD5

                                                      d31f2adb699c91039cadd65a1858c32e

                                                      SHA1

                                                      3bc0f147f2965e412597b258237f39c5c0a27490

                                                      SHA256

                                                      dc29173fe5ef8012fa19496d83bbbe5684569733e7d04dacb8cad267b166149c

                                                      SHA512

                                                      497d6bd934009ce22c4b73a1f108db9feb27aa52d124cc2dad9cb0ffefd9805c118a50283661c39dbdab06fa276150e1fe9037f302aa4273348eb2e57fe188c8

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      9ead10c08e72ae41921191f8db39bc16

                                                      SHA1

                                                      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                      SHA256

                                                      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                      SHA512

                                                      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      9ead10c08e72ae41921191f8db39bc16

                                                      SHA1

                                                      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                                      SHA256

                                                      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                                      SHA512

                                                      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                                    • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe

                                                      Filesize

                                                      485.8MB

                                                      MD5

                                                      9a1274c406ca57619d723bfd1c15c659

                                                      SHA1

                                                      3f3c59ecc89c6c16a7624b13c27688fcf295df1a

                                                      SHA256

                                                      0608612aebdf57e5c60a7c025609adf8db039145fb93500ecbbca6576d3cf9eb

                                                      SHA512

                                                      2815904149c3a8cc084ac5a368f73f1c4e5f843c7ff40341c9cc076e7339671223e4b1180045edc699663f9581ffead566af406517516fedf207ee49a1f6810d

                                                    • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe

                                                      Filesize

                                                      486.3MB

                                                      MD5

                                                      319989f6df8cd9197dd98229013eac60

                                                      SHA1

                                                      b1e980290ea6121f3d8db90cf39167fb25ab8a69

                                                      SHA256

                                                      ffc40fd597da41f119d51e213a2ea847a9a252f6320740723599afa321ab902b

                                                      SHA512

                                                      e9b3be9e1976c5e1d52d0da60df5a7b791c24b38d94417df42a75e2ab5679119480e693591c5abd70a8b3addb5efeff0a2f1988b40dd4d1d49517f83890fa064

                                                    • memory/912-266-0x0000000000400000-0x0000000000472000-memory.dmp

                                                      Filesize

                                                      456KB

                                                    • memory/912-239-0x0000000000400000-0x0000000000472000-memory.dmp

                                                      Filesize

                                                      456KB

                                                    • memory/912-240-0x0000000050BD0000-0x0000000050CC3000-memory.dmp

                                                      Filesize

                                                      972KB

                                                    • memory/912-229-0x0000000000400000-0x0000000000472000-memory.dmp

                                                      Filesize

                                                      456KB

                                                    • memory/912-232-0x0000000000400000-0x0000000000472000-memory.dmp

                                                      Filesize

                                                      456KB

                                                    • memory/912-234-0x0000000000400000-0x0000000000472000-memory.dmp

                                                      Filesize

                                                      456KB

                                                    • memory/980-320-0x0000000000C10000-0x0000000000C16000-memory.dmp

                                                      Filesize

                                                      24KB

                                                    • memory/980-321-0x0000000000C00000-0x0000000000C0C000-memory.dmp

                                                      Filesize

                                                      48KB

                                                    • memory/1096-203-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/1096-200-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/1096-204-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/1096-198-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/1096-212-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/1188-315-0x00000000010B0000-0x00000000010B9000-memory.dmp

                                                      Filesize

                                                      36KB

                                                    • memory/1188-297-0x00000000010A0000-0x00000000010AF000-memory.dmp

                                                      Filesize

                                                      60KB

                                                    • memory/1256-201-0x0000000002136000-0x00000000021C8000-memory.dmp

                                                      Filesize

                                                      584KB

                                                    • memory/1256-202-0x0000000002320000-0x000000000243B000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/1856-314-0x0000000000630000-0x0000000000639000-memory.dmp

                                                      Filesize

                                                      36KB

                                                    • memory/1856-313-0x0000000000640000-0x0000000000645000-memory.dmp

                                                      Filesize

                                                      20KB

                                                    • memory/1872-159-0x0000000000FA0000-0x0000000001728000-memory.dmp

                                                      Filesize

                                                      7.5MB

                                                    • memory/2268-207-0x0000000000400000-0x0000000000579000-memory.dmp

                                                      Filesize

                                                      1.5MB

                                                    • memory/2268-269-0x00000000024C0000-0x00000000034C0000-memory.dmp

                                                      Filesize

                                                      16.0MB

                                                    • memory/2268-267-0x0000000000877000-0x0000000000890000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/2268-276-0x0000000000877000-0x0000000000890000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/2268-275-0x0000000000400000-0x0000000000579000-memory.dmp

                                                      Filesize

                                                      1.5MB

                                                    • memory/2268-274-0x000000000084C000-0x0000000000871000-memory.dmp

                                                      Filesize

                                                      148KB

                                                    • memory/2268-268-0x0000000000810000-0x000000000082C000-memory.dmp

                                                      Filesize

                                                      112KB

                                                    • memory/2268-242-0x0000000000400000-0x0000000000579000-memory.dmp

                                                      Filesize

                                                      1.5MB

                                                    • memory/2268-206-0x00000000007E0000-0x000000000080E000-memory.dmp

                                                      Filesize

                                                      184KB

                                                    • memory/2268-277-0x0000000000810000-0x000000000082C000-memory.dmp

                                                      Filesize

                                                      112KB

                                                    • memory/2268-205-0x000000000084C000-0x0000000000871000-memory.dmp

                                                      Filesize

                                                      148KB

                                                    • memory/2296-235-0x00000000021A0000-0x00000000021FE000-memory.dmp

                                                      Filesize

                                                      376KB

                                                    • memory/2296-231-0x0000000000648000-0x000000000067C000-memory.dmp

                                                      Filesize

                                                      208KB

                                                    • memory/2376-151-0x0000000000649000-0x0000000000673000-memory.dmp

                                                      Filesize

                                                      168KB

                                                    • memory/2376-152-0x00000000021E0000-0x0000000002227000-memory.dmp

                                                      Filesize

                                                      284KB

                                                    • memory/2376-160-0x0000000000649000-0x0000000000673000-memory.dmp

                                                      Filesize

                                                      168KB

                                                    • memory/2376-161-0x0000000000400000-0x0000000000575000-memory.dmp

                                                      Filesize

                                                      1.5MB

                                                    • memory/2376-153-0x0000000000400000-0x0000000000575000-memory.dmp

                                                      Filesize

                                                      1.5MB

                                                    • memory/2520-281-0x0000000000E90000-0x0000000000E98000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/2520-282-0x00007FF832EC0000-0x00007FF833981000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2636-132-0x00000000007FC000-0x0000000000811000-memory.dmp

                                                      Filesize

                                                      84KB

                                                    • memory/2636-135-0x0000000000400000-0x0000000000562000-memory.dmp

                                                      Filesize

                                                      1.4MB

                                                    • memory/2636-134-0x0000000000400000-0x0000000000562000-memory.dmp

                                                      Filesize

                                                      1.4MB

                                                    • memory/2636-133-0x00000000022A0000-0x00000000022A9000-memory.dmp

                                                      Filesize

                                                      36KB

                                                    • memory/3408-290-0x00007FF832EC0000-0x00007FF833981000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/3408-289-0x000001FFF9BA0000-0x000001FFF9BC2000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/3440-296-0x00007FF832EC0000-0x00007FF833981000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/3440-317-0x00007FF832EC0000-0x00007FF833981000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/3616-327-0x0000000000E80000-0x0000000000EA2000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/3616-328-0x0000000000E50000-0x0000000000E77000-memory.dmp

                                                      Filesize

                                                      156KB

                                                    • memory/3772-149-0x000000000070C000-0x0000000000721000-memory.dmp

                                                      Filesize

                                                      84KB

                                                    • memory/3772-150-0x0000000000400000-0x000000000061B000-memory.dmp

                                                      Filesize

                                                      2.1MB

                                                    • memory/3832-217-0x000000000211E000-0x00000000021B0000-memory.dmp

                                                      Filesize

                                                      584KB

                                                    • memory/4072-224-0x0000000000400000-0x0000000000613000-memory.dmp

                                                      Filesize

                                                      2.1MB

                                                    • memory/4072-193-0x0000000000400000-0x0000000000613000-memory.dmp

                                                      Filesize

                                                      2.1MB

                                                    • memory/4072-191-0x000000000065C000-0x0000000000672000-memory.dmp

                                                      Filesize

                                                      88KB

                                                    • memory/4072-192-0x0000000000620000-0x0000000000629000-memory.dmp

                                                      Filesize

                                                      36KB

                                                    • memory/4180-286-0x00007FF832EC0000-0x00007FF833981000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4268-172-0x0000000140000000-0x000000014061E000-memory.dmp

                                                      Filesize

                                                      6.1MB

                                                    • memory/4324-305-0x00007FF41B0A0000-0x00007FF41B19A000-memory.dmp

                                                      Filesize

                                                      1000KB

                                                    • memory/4324-270-0x0000013F270A0000-0x0000013F270A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4324-272-0x0000013F271B0000-0x0000013F271B7000-memory.dmp

                                                      Filesize

                                                      28KB

                                                    • memory/4324-273-0x00007FF41B0A0000-0x00007FF41B19A000-memory.dmp

                                                      Filesize

                                                      1000KB

                                                    • memory/4324-288-0x00007FF41B0A0000-0x00007FF41B19A000-memory.dmp

                                                      Filesize

                                                      1000KB

                                                    • memory/4360-263-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/4360-218-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/4360-216-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/4360-223-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/4508-326-0x00007FF832FE0000-0x00007FF833AA1000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4956-295-0x0000000000BB0000-0x0000000000BBB000-memory.dmp

                                                      Filesize

                                                      44KB

                                                    • memory/4956-294-0x0000000000BC0000-0x0000000000BC7000-memory.dmp

                                                      Filesize

                                                      28KB

                                                    • memory/5028-148-0x0000000000400000-0x0000000000612000-memory.dmp

                                                      Filesize

                                                      2.1MB

                                                    • memory/5028-146-0x0000000000620000-0x0000000000720000-memory.dmp

                                                      Filesize

                                                      1024KB

                                                    • memory/5028-157-0x0000000000400000-0x0000000000612000-memory.dmp

                                                      Filesize

                                                      2.1MB

                                                    • memory/5028-147-0x0000000000750000-0x0000000000759000-memory.dmp

                                                      Filesize

                                                      36KB