Resubmissions

18/09/2023, 09:17

230918-k816rsag34 10

18/09/2023, 09:12

230918-k6ppysag22 10

Analysis

  • max time kernel
    163s
  • max time network
    158s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/09/2023, 09:17

General

  • Target

    486caab0ec60616a407fd97a1729fd3b013d6b0fe06fd5ee2a3c43ec8359625b.exe

  • Size

    261KB

  • MD5

    78f8c13da0feed4055ce3cb732a2212b

  • SHA1

    b07ad6f030f907475c2ab7344f76d755be146c18

  • SHA256

    486caab0ec60616a407fd97a1729fd3b013d6b0fe06fd5ee2a3c43ec8359625b

  • SHA512

    bd4207815731f3d23082fd7441b7c3b8b76503f759b309ef937e13915965fc7da25d673bb7201f12c7385f9539abae1ad381cc361a6362711b933050b717754b

  • SSDEEP

    6144:noLpmE9POTt+wqWbiC+9DAOHIQNDB8nXJg8f:nYQE9GTcNmSS5g8f

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

0305

C2

185.215.113.25:10195

Attributes
  • auth_value

    c86205ff1cc37b2da12f0190adfda52c

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • DcRat 3 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Fabookie payload 2 IoCs
  • Detected google phishing page
  • Fabookie

    Fabookie is facebook account info stealer.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 4 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Windows security bypass 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\486caab0ec60616a407fd97a1729fd3b013d6b0fe06fd5ee2a3c43ec8359625b.exe
    "C:\Users\Admin\AppData\Local\Temp\486caab0ec60616a407fd97a1729fd3b013d6b0fe06fd5ee2a3c43ec8359625b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • DcRat
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3212
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1780
  • C:\Users\Admin\AppData\Local\Temp\8B63.exe
    C:\Users\Admin\AppData\Local\Temp\8B63.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4204
  • C:\Users\Admin\AppData\Local\Temp\8CEA.exe
    C:\Users\Admin\AppData\Local\Temp\8CEA.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4960
  • C:\Users\Admin\AppData\Local\Temp\93A2.exe
    C:\Users\Admin\AppData\Local\Temp\93A2.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -u q9KSGH.3 /S
      2⤵
      • Loads dropped DLL
      PID:608
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\95E5.bat" "
    1⤵
    • Checks computer location settings
    PID:1544
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4900
  • C:\Users\Admin\AppData\Local\Temp\A2D7.exe
    C:\Users\Admin\AppData\Local\Temp\A2D7.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:692
    • C:\Users\Admin\AppData\Local\Temp\ss41.exe
      "C:\Users\Admin\AppData\Local\Temp\ss41.exe"
      2⤵
      • Executes dropped EXE
      PID:2856
    • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
      "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:5000
      • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
        "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:4652
    • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
      "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4004
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:5052
      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
        "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
        3⤵
        • Windows security bypass
        • Executes dropped EXE
        • Windows security modification
        • Adds Run key to start application
        • Checks for VirtualBox DLLs, possible anti-VM trick
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:3736
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:3840
        • C:\Windows\System32\cmd.exe
          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
          4⤵
            PID:3688
            • C:\Windows\system32\netsh.exe
              netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
              5⤵
              • Modifies Windows Firewall
              PID:2520
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            PID:4360
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            PID:1096
          • C:\Windows\rss\csrss.exe
            C:\Windows\rss\csrss.exe
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Adds Run key to start application
            • Manipulates WinMonFS driver.
            • Modifies data under HKEY_USERS
            • Modifies registry class
            PID:4900
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              PID:220
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
              5⤵
              • DcRat
              • Creates scheduled task(s)
              PID:208
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /delete /tn ScheduledUpdate /f
              5⤵
                PID:8
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                PID:3368
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                PID:4408
              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                5⤵
                • Executes dropped EXE
                PID:4596
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                5⤵
                • DcRat
                • Creates scheduled task(s)
                PID:3100
      • C:\Windows\system32\browser_broker.exe
        C:\Windows\system32\browser_broker.exe -Embedding
        1⤵
        • Modifies Internet Explorer settings
        PID:3620
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1876
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3212
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        PID:4632
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        PID:316
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4392
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        PID:2320
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        PID:3140

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\P4M9UM7Z\B8BxsscfVBr[1].ico

              Filesize

              1KB

              MD5

              e508eca3eafcc1fc2d7f19bafb29e06b

              SHA1

              a62fc3c2a027870d99aedc241e7d5babba9a891f

              SHA256

              e6d1d77403cd9f14fd2377d07e84350cfe768e3353e402bf42ebdc8593a58c9a

              SHA512

              49e3f31fd73e52ba274db9c7d306cc188e09c3ae683827f420fbb17534d197a503460e7ec2f1af46065f8d0b33f37400659bfa2ae165e502f97a8150e184a38c

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF527510A7BE1DE381.TMP

              Filesize

              24KB

              MD5

              d3cdb7663712ddb6ef5056c72fe69e86

              SHA1

              f08bf69934fb2b9ca0aba287c96abe145a69366c

              SHA256

              3e8c2095986b262ac8fccfabda2d021fc0d3504275e83cffe1f0a333f9efbe15

              SHA512

              c0acd65db7098a55dae0730eb1dcd8aa94e95a71f39dd40b087be0b06afc5d1bb310f555781853b5a78a8803dba0fb44df44bd2bb14baeca29c7c7410dffc812

            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\ELOZB7B3.cookie

              Filesize

              130B

              MD5

              b3ee90aed25f5c9ff76e124d62813950

              SHA1

              1dfeeaa8506c49a636bf5149df828e2fcda0dc57

              SHA256

              6c8a68f29510e66a35744763b08ff42ecaf06b5bbba90319e5166eb69fdb123c

              SHA512

              1b8eda9f02ff25a67633fa36839cdeca5bbb842937a334841d0e3a56ca3594f43de87be98702530752c655f08ceb0cfb426669738f2a3bacff0aa18560ec1a72

            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

              Filesize

              1KB

              MD5

              fcf81ecbf1ef1e27e5383eb663aeaf5d

              SHA1

              77a0af81eef83714243e44cc46848864f1c29e59

              SHA256

              2ea3b115d9b003119d33b9639771dbc23ea2a771f407e75ff39abbaddb63982b

              SHA512

              a7fd7d2860a54f6684013d2815e7d3fb1cce9d14fea1d8d77019b91ed99d8477ccf9a746f7d680262c904596944882e8ced557a085c94e8ebc2ac4a08476f1d8

            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_BA0BAB2D4C396325C2233CA4C6557724

              Filesize

              472B

              MD5

              149a7377ce505162af15127c384d5e3b

              SHA1

              f4bf765455a03741b3c401204af7aadc8356e4a4

              SHA256

              f6731d465327021f3b3ced0bb1087faf90bf1d7b7619edb8b94dbf3f80fd3f43

              SHA512

              06ea8e0a9348ff73c0ca08ffde9ca5747697f80b61ae5f83e28c8ad54320398b9e9bc3a3d892921c9beb6ce55ebf7c910dbcd99bfec178b710f5e6a55fca522d

            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

              Filesize

              724B

              MD5

              aa62f8ce77e072c8160c71b5df3099b0

              SHA1

              06b8c07db93694a3fe73a4276283fabb0e20ac38

              SHA256

              3eb4927c4d9097dc924fcde21b56d01d5d1ef61b7d22bfb6786e3b546b33e176

              SHA512

              71724e837286c5f0eb2ee4ad01ac0304d4c7597bb2d46169c342821b0da04d8597491bd27ef80e817bc77031cd29d2182ccc82ef8ea3860696875f89427c8e0a

            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

              Filesize

              410B

              MD5

              ffd788561ceae504fd6ac5c5fa663045

              SHA1

              537e574f91d2f6bc0d705930676b2614fb49ce1e

              SHA256

              3ede2d10f1e239b2e41d27033cbec371298f5aaeab980c20a90b0a8236a40720

              SHA512

              acb4d0298ec409da5bdcba3a00bb77549bb8be28c6b6d24b40cb8f21208e4ba34adf9bea0dfdf981fdf3730931af74b8b56c3fe1a728e6bc0d0de37b47db8747

            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_BA0BAB2D4C396325C2233CA4C6557724

              Filesize

              410B

              MD5

              49053758b6b330825b3855db527e38f8

              SHA1

              d2792eb4854969caf0785fae1d0657f8b9ab3df7

              SHA256

              8d87431b47efbe53a923e3dce7177e824b08f601f9b28a683de9d53c68493e99

              SHA512

              6a22d71e66d1acbbeb7ca7524d3907350dde5db04c063b4f5c2ba45f8d47ae2538cbdd457aa186be3693be8df9ab4abe44b3c2b66a8960a468c6819f4d9e7018

            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

              Filesize

              392B

              MD5

              e6c745790caf38ca170633f96a1d85de

              SHA1

              009d372235a057b9d1f3a96dc2b1d34604ac4874

              SHA256

              7f33146b6210157f46c2ae0b0ea3581eeefb51b0604d7fe1be1cd02a6ecf5702

              SHA512

              141b7e3695267d55eb8bcf3c99b7554fece3a0349b78358c54430b81dfa626af9dbc514b2df899b6cb13e3a3a3a2e9e8852ad409d148dca47508593e66ad7030

            • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

              Filesize

              4.1MB

              MD5

              637f73095de9f62dc6fcfbe9b3f6d3d6

              SHA1

              708771d9413e7df69189d2a0c283ec72bd63d99e

              SHA256

              6a678e471f24d7560be7cda7a49a34b4f0c2cb279b779984e5f002be3dfacf1d

              SHA512

              00d4d05c7b894d4c52dcbc75d555c76f966defed1934747ffe4a29d8dc1b426fad021a02a5e221dd583ac86d67661a6b9cddde13ad1465546439f52ed567aeb5

            • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

              Filesize

              4.1MB

              MD5

              637f73095de9f62dc6fcfbe9b3f6d3d6

              SHA1

              708771d9413e7df69189d2a0c283ec72bd63d99e

              SHA256

              6a678e471f24d7560be7cda7a49a34b4f0c2cb279b779984e5f002be3dfacf1d

              SHA512

              00d4d05c7b894d4c52dcbc75d555c76f966defed1934747ffe4a29d8dc1b426fad021a02a5e221dd583ac86d67661a6b9cddde13ad1465546439f52ed567aeb5

            • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

              Filesize

              4.1MB

              MD5

              637f73095de9f62dc6fcfbe9b3f6d3d6

              SHA1

              708771d9413e7df69189d2a0c283ec72bd63d99e

              SHA256

              6a678e471f24d7560be7cda7a49a34b4f0c2cb279b779984e5f002be3dfacf1d

              SHA512

              00d4d05c7b894d4c52dcbc75d555c76f966defed1934747ffe4a29d8dc1b426fad021a02a5e221dd583ac86d67661a6b9cddde13ad1465546439f52ed567aeb5

            • C:\Users\Admin\AppData\Local\Temp\8B63.exe

              Filesize

              341KB

              MD5

              8669fe397a7225ede807202f6a9d8390

              SHA1

              04a806a5c4218cb703cba85d3e636d0c8cbae043

              SHA256

              1624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e

              SHA512

              29cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45

            • C:\Users\Admin\AppData\Local\Temp\8CEA.exe

              Filesize

              412KB

              MD5

              5200fbe07521eb001f145afb95d40283

              SHA1

              df6cfdf15b58a0bb24255b3902886dc375f3346f

              SHA256

              00c3f29f9a8aec0774256501c562275e2d866f0130a2b8a58d74003c6c77e812

              SHA512

              c38359959ce1083f94d2206d1b4b317e8c5d493168013b4e8c406acb5a55fd4f85ec7ce4d5e400b9105fd82eae3d6301d52346f040a64c09981185c66f2cbf75

            • C:\Users\Admin\AppData\Local\Temp\8CEA.exe

              Filesize

              412KB

              MD5

              5200fbe07521eb001f145afb95d40283

              SHA1

              df6cfdf15b58a0bb24255b3902886dc375f3346f

              SHA256

              00c3f29f9a8aec0774256501c562275e2d866f0130a2b8a58d74003c6c77e812

              SHA512

              c38359959ce1083f94d2206d1b4b317e8c5d493168013b4e8c406acb5a55fd4f85ec7ce4d5e400b9105fd82eae3d6301d52346f040a64c09981185c66f2cbf75

            • C:\Users\Admin\AppData\Local\Temp\93A2.exe

              Filesize

              1.6MB

              MD5

              fb0f4bbb1e2fc532caac02fa4ec18e9c

              SHA1

              1572e0c2bd9af26eec465c81e60c0a4f11274a8d

              SHA256

              7fb7170c41f22c2c9062e6600366b7721094afbe55a34f7469a81558777b7f6c

              SHA512

              039c52468e2a022912efafaf5ee46d1412c5696f14eabe20e36398c4027852225c5fa8f010f0d8074c2d8fbdc5ecce1222a2a7f12369415b212f71486576088e

            • C:\Users\Admin\AppData\Local\Temp\95E5.bat

              Filesize

              79B

              MD5

              403991c4d18ac84521ba17f264fa79f2

              SHA1

              850cc068de0963854b0fe8f485d951072474fd45

              SHA256

              ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f

              SHA512

              a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576

            • C:\Users\Admin\AppData\Local\Temp\A2D7.exe

              Filesize

              4.6MB

              MD5

              b32d5a382373d7df0c1fec9f15f0724a

              SHA1

              472fc4c27859f39e8b9a0bf784949f72944dc52b

              SHA256

              010fe481ba6275ebbf71e102e66d73f5d819252f2b4b1893d2acf53c04f4200f

              SHA512

              1320be23719f86e043beaeea8affa9ab125a68a1210f596c4424d4a5a2a9ef72eb572578897722842ad0586afe1d669ff816648ea3eeb3aa0b8379c9066da3a9

            • C:\Users\Admin\AppData\Local\Temp\A2D7.exe

              Filesize

              4.6MB

              MD5

              b32d5a382373d7df0c1fec9f15f0724a

              SHA1

              472fc4c27859f39e8b9a0bf784949f72944dc52b

              SHA256

              010fe481ba6275ebbf71e102e66d73f5d819252f2b4b1893d2acf53c04f4200f

              SHA512

              1320be23719f86e043beaeea8affa9ab125a68a1210f596c4424d4a5a2a9ef72eb572578897722842ad0586afe1d669ff816648ea3eeb3aa0b8379c9066da3a9

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ga4n2w32.nlr.ps1

              Filesize

              1B

              MD5

              c4ca4238a0b923820dcc509a6f75849b

              SHA1

              356a192b7913b04c54574d18c28d46e6395428ab

              SHA256

              6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

              SHA512

              4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

              Filesize

              99KB

              MD5

              09031a062610d77d685c9934318b4170

              SHA1

              880f744184e7774f3d14c1bb857e21cc7fe89a6d

              SHA256

              778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd

              SHA512

              9a276e1f0f55d35f2bf38eb093464f7065bdd30a660e6d1c62eed5e76d1fb2201567b89d9ae65d2d89dc99b142159e36fb73be8d5e08252a975d50544a7cda27

            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

              Filesize

              281KB

              MD5

              d98e33b66343e7c96158444127a117f6

              SHA1

              bb716c5509a2bf345c6c1152f6e3e1452d39d50d

              SHA256

              5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

              SHA512

              705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

              Filesize

              281KB

              MD5

              d98e33b66343e7c96158444127a117f6

              SHA1

              bb716c5509a2bf345c6c1152f6e3e1452d39d50d

              SHA256

              5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

              SHA512

              705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

            • C:\Users\Admin\AppData\Local\Temp\q9KSGH.3

              Filesize

              1.4MB

              MD5

              7fb1edd903feeae7f408f0b5f9e63ec9

              SHA1

              459a5e27c6c9206e869fe50de0b1466b398daae2

              SHA256

              20c525d44de968ebaaf53c6599372be6d6fe80d329126cd6b35c3a1e0469bbe8

              SHA512

              b2724dfad917a9867afc73fd88e8f427155f2eb4470c1014d1a3c45cfb9a2c4ae7343c6595102d909228da99db9108c38b25f28d3ce972c5d650077c0090fefc

            • C:\Users\Admin\AppData\Local\Temp\ss41.exe

              Filesize

              298KB

              MD5

              8bd874c0500c7112d04cfad6fda75524

              SHA1

              d04a20e3bb7ffe5663f69c870457ad4edeb00192

              SHA256

              22aa36bd2f8ace8d959f22cf0e99bfe1d3fd655c075aa14a3232fb9e0f35adc2

              SHA512

              d6c43d5a5d1bfca1dddfb6283eafcd1f274e52812ccfee877298dfc74930fe6a8ec7035f95107600742ef19a630bee3ca3fab1fc7ab3ff717bea8f8c05e384d8

            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

              Filesize

              227KB

              MD5

              fccd5785d54697b968ebe3c55641c4b3

              SHA1

              f3353f2cfb27100ea14ae6ad02a72f834694fbf3

              SHA256

              757568f5af7731014baf25b6941c179d14b2041d2aa8a43e482a942e99d86f82

              SHA512

              0360e3c3469219f6c13ab3bd0c47304c6bb1319463c4102433156400ebfbf468b88f9b469eeb01e78ed32021adb93d52e9dd410dcc9d44e5dbee67f9a51aed6d

            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

              Filesize

              227KB

              MD5

              fccd5785d54697b968ebe3c55641c4b3

              SHA1

              f3353f2cfb27100ea14ae6ad02a72f834694fbf3

              SHA256

              757568f5af7731014baf25b6941c179d14b2041d2aa8a43e482a942e99d86f82

              SHA512

              0360e3c3469219f6c13ab3bd0c47304c6bb1319463c4102433156400ebfbf468b88f9b469eeb01e78ed32021adb93d52e9dd410dcc9d44e5dbee67f9a51aed6d

            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

              Filesize

              227KB

              MD5

              fccd5785d54697b968ebe3c55641c4b3

              SHA1

              f3353f2cfb27100ea14ae6ad02a72f834694fbf3

              SHA256

              757568f5af7731014baf25b6941c179d14b2041d2aa8a43e482a942e99d86f82

              SHA512

              0360e3c3469219f6c13ab3bd0c47304c6bb1319463c4102433156400ebfbf468b88f9b469eeb01e78ed32021adb93d52e9dd410dcc9d44e5dbee67f9a51aed6d

            • C:\Users\Admin\AppData\Roaming\brisavc

              Filesize

              227KB

              MD5

              fccd5785d54697b968ebe3c55641c4b3

              SHA1

              f3353f2cfb27100ea14ae6ad02a72f834694fbf3

              SHA256

              757568f5af7731014baf25b6941c179d14b2041d2aa8a43e482a942e99d86f82

              SHA512

              0360e3c3469219f6c13ab3bd0c47304c6bb1319463c4102433156400ebfbf468b88f9b469eeb01e78ed32021adb93d52e9dd410dcc9d44e5dbee67f9a51aed6d

            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              1c19c16e21c97ed42d5beabc93391fc5

              SHA1

              8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

              SHA256

              1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

              SHA512

              7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              18KB

              MD5

              f12a3594177efb70fefef9a9266145a4

              SHA1

              4ff0b50c0cf9502957d291178fd84b3b3e73efb6

              SHA256

              e2afa9afaa3c8e5817c301332e247e8ae8604ad192cbba3994984e0b433755de

              SHA512

              c350fe55af107d80daab97685a57282d3df19486e5dd54b3eb0b53fbb84d64cc23c73e5cd782a5dff23abfc20f915b27ff042b11d282894a4f15e65aa1558c9f

            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              18KB

              MD5

              0b6a3837c4619a0752fad76a00f94562

              SHA1

              44d0f683dee4b495b0f09ff3a7c67c64c318d910

              SHA256

              fdbce7f405f81193c488698b2645a44a83579251997d51fdcbde674eeeaaef93

              SHA512

              dcbb0a6e738ac333b9b425717d6888d3c28efe31793a4f5a118f91c2c51a9c6e37ae88d3c4b55ef641bdf8c9775ecfd1f34a663e4f4c4c71c55c7e7975a04fc5

            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              18KB

              MD5

              990be81c7734e866604a0c94955cc350

              SHA1

              974de0aa93c237a8a05593759fcadc02e6f59922

              SHA256

              755f42181ec64eb65e537d11489899a89169e245dac234dec1600f767a42ef8e

              SHA512

              20abef91457181c75d92b79577c9262cdb6cd64ad110a067b39faa548700b2a899a4f18a62fcecad959268909b39920d5b31e2626f13dec7612fc6f850bc40fb

            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              18KB

              MD5

              b2444669c0e9cc685fe340c5d7032cec

              SHA1

              89bc6715ddb7defb2434c31e9a1b74852012a90f

              SHA256

              4ece8d8865a0bf5259723e01c17f0c4b7bea8719896f6586d45429b1662b9ed9

              SHA512

              4521b2127ddee5095f2557903e56d419f6af96a5cd5a0051522e0d7a9e55bcf23fc56dcdb05a0cc39518bed192f10a06053f488cb7eafb5c1aee3c76120f8ee4

            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              18KB

              MD5

              06f187e8cb6081a5e98bfd9bdbcd2c71

              SHA1

              a7cfe439a862b28192f2e6f66c6878b2407e5f3c

              SHA256

              82bf1221e7b112deacb393e279f3ff8e043d295ec07275d06834b1b49772153e

              SHA512

              763a8889809424f329e3c3e86a20b89f381a44bdff76b8c6d2451c8d7eef3dc0e939743fc6053f2336f4f53f087acb11a9eea9c52abca0ed661be50cd0b52d72

            • C:\Windows\rss\csrss.exe

              Filesize

              4.1MB

              MD5

              637f73095de9f62dc6fcfbe9b3f6d3d6

              SHA1

              708771d9413e7df69189d2a0c283ec72bd63d99e

              SHA256

              6a678e471f24d7560be7cda7a49a34b4f0c2cb279b779984e5f002be3dfacf1d

              SHA512

              00d4d05c7b894d4c52dcbc75d555c76f966defed1934747ffe4a29d8dc1b426fad021a02a5e221dd583ac86d67661a6b9cddde13ad1465546439f52ed567aeb5

            • C:\Windows\rss\csrss.exe

              Filesize

              4.1MB

              MD5

              637f73095de9f62dc6fcfbe9b3f6d3d6

              SHA1

              708771d9413e7df69189d2a0c283ec72bd63d99e

              SHA256

              6a678e471f24d7560be7cda7a49a34b4f0c2cb279b779984e5f002be3dfacf1d

              SHA512

              00d4d05c7b894d4c52dcbc75d555c76f966defed1934747ffe4a29d8dc1b426fad021a02a5e221dd583ac86d67661a6b9cddde13ad1465546439f52ed567aeb5

            • C:\Windows\rss\csrss.exe

              Filesize

              4.1MB

              MD5

              637f73095de9f62dc6fcfbe9b3f6d3d6

              SHA1

              708771d9413e7df69189d2a0c283ec72bd63d99e

              SHA256

              6a678e471f24d7560be7cda7a49a34b4f0c2cb279b779984e5f002be3dfacf1d

              SHA512

              00d4d05c7b894d4c52dcbc75d555c76f966defed1934747ffe4a29d8dc1b426fad021a02a5e221dd583ac86d67661a6b9cddde13ad1465546439f52ed567aeb5

            • \??\c:\users\admin\appdata\local\temp\8b63.exe

              Filesize

              341KB

              MD5

              8669fe397a7225ede807202f6a9d8390

              SHA1

              04a806a5c4218cb703cba85d3e636d0c8cbae043

              SHA256

              1624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e

              SHA512

              29cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45

            • \??\c:\users\admin\appdata\local\temp\93a2.exe

              Filesize

              1.6MB

              MD5

              fb0f4bbb1e2fc532caac02fa4ec18e9c

              SHA1

              1572e0c2bd9af26eec465c81e60c0a4f11274a8d

              SHA256

              7fb7170c41f22c2c9062e6600366b7721094afbe55a34f7469a81558777b7f6c

              SHA512

              039c52468e2a022912efafaf5ee46d1412c5696f14eabe20e36398c4027852225c5fa8f010f0d8074c2d8fbdc5ecce1222a2a7f12369415b212f71486576088e

            • \??\c:\users\admin\appdata\local\temp\ss41.exe

              Filesize

              298KB

              MD5

              8bd874c0500c7112d04cfad6fda75524

              SHA1

              d04a20e3bb7ffe5663f69c870457ad4edeb00192

              SHA256

              22aa36bd2f8ace8d959f22cf0e99bfe1d3fd655c075aa14a3232fb9e0f35adc2

              SHA512

              d6c43d5a5d1bfca1dddfb6283eafcd1f274e52812ccfee877298dfc74930fe6a8ec7035f95107600742ef19a630bee3ca3fab1fc7ab3ff717bea8f8c05e384d8

            • \??\c:\windows\rss\csrss.exe

              Filesize

              4.1MB

              MD5

              637f73095de9f62dc6fcfbe9b3f6d3d6

              SHA1

              708771d9413e7df69189d2a0c283ec72bd63d99e

              SHA256

              6a678e471f24d7560be7cda7a49a34b4f0c2cb279b779984e5f002be3dfacf1d

              SHA512

              00d4d05c7b894d4c52dcbc75d555c76f966defed1934747ffe4a29d8dc1b426fad021a02a5e221dd583ac86d67661a6b9cddde13ad1465546439f52ed567aeb5

            • \Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

              Filesize

              99KB

              MD5

              09031a062610d77d685c9934318b4170

              SHA1

              880f744184e7774f3d14c1bb857e21cc7fe89a6d

              SHA256

              778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd

              SHA512

              9a276e1f0f55d35f2bf38eb093464f7065bdd30a660e6d1c62eed5e76d1fb2201567b89d9ae65d2d89dc99b142159e36fb73be8d5e08252a975d50544a7cda27

            • \Users\Admin\AppData\Local\Temp\q9KSGh.3

              Filesize

              1.4MB

              MD5

              7fb1edd903feeae7f408f0b5f9e63ec9

              SHA1

              459a5e27c6c9206e869fe50de0b1466b398daae2

              SHA256

              20c525d44de968ebaaf53c6599372be6d6fe80d329126cd6b35c3a1e0469bbe8

              SHA512

              b2724dfad917a9867afc73fd88e8f427155f2eb4470c1014d1a3c45cfb9a2c4ae7343c6595102d909228da99db9108c38b25f28d3ce972c5d650077c0090fefc

            • memory/316-431-0x000002167CB00000-0x000002167CB20000-memory.dmp

              Filesize

              128KB

            • memory/608-58-0x0000000000B10000-0x0000000000B16000-memory.dmp

              Filesize

              24KB

            • memory/608-156-0x0000000004A70000-0x0000000004B55000-memory.dmp

              Filesize

              916KB

            • memory/608-57-0x0000000010000000-0x0000000010166000-memory.dmp

              Filesize

              1.4MB

            • memory/608-151-0x0000000004A70000-0x0000000004B55000-memory.dmp

              Filesize

              916KB

            • memory/608-148-0x0000000004A70000-0x0000000004B55000-memory.dmp

              Filesize

              916KB

            • memory/608-146-0x0000000004970000-0x0000000004A6E000-memory.dmp

              Filesize

              1016KB

            • memory/2856-113-0x00007FF68B910000-0x00007FF68B95E000-memory.dmp

              Filesize

              312KB

            • memory/2856-657-0x0000000003450000-0x0000000003581000-memory.dmp

              Filesize

              1.2MB

            • memory/2856-173-0x0000000003450000-0x0000000003581000-memory.dmp

              Filesize

              1.2MB

            • memory/2856-171-0x00000000032D0000-0x0000000003441000-memory.dmp

              Filesize

              1.4MB

            • memory/2904-4-0x0000000002520000-0x0000000002536000-memory.dmp

              Filesize

              88KB

            • memory/2904-152-0x0000000002C10000-0x0000000002C26000-memory.dmp

              Filesize

              88KB

            • memory/3212-0-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/3212-6-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/3212-3-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/4004-132-0x0000000000400000-0x0000000000D1B000-memory.dmp

              Filesize

              9.1MB

            • memory/4004-175-0x0000000003070000-0x000000000395B000-memory.dmp

              Filesize

              8.9MB

            • memory/4004-130-0x0000000003070000-0x000000000395B000-memory.dmp

              Filesize

              8.9MB

            • memory/4004-129-0x0000000002C60000-0x0000000003063000-memory.dmp

              Filesize

              4.0MB

            • memory/4004-165-0x0000000002C60000-0x0000000003063000-memory.dmp

              Filesize

              4.0MB

            • memory/4004-183-0x0000000000400000-0x0000000000D1B000-memory.dmp

              Filesize

              9.1MB

            • memory/4204-133-0x000000000A8B0000-0x000000000A926000-memory.dmp

              Filesize

              472KB

            • memory/4204-134-0x000000000A850000-0x000000000A86E000-memory.dmp

              Filesize

              120KB

            • memory/4204-29-0x0000000007C80000-0x0000000007C90000-memory.dmp

              Filesize

              64KB

            • memory/4204-30-0x0000000007B70000-0x0000000007B7A000-memory.dmp

              Filesize

              40KB

            • memory/4204-31-0x0000000008B40000-0x0000000009146000-memory.dmp

              Filesize

              6.0MB

            • memory/4204-32-0x0000000007C20000-0x0000000007C32000-memory.dmp

              Filesize

              72KB

            • memory/4204-27-0x0000000007E30000-0x000000000832E000-memory.dmp

              Filesize

              5.0MB

            • memory/4204-33-0x0000000008330000-0x000000000843A000-memory.dmp

              Filesize

              1.0MB

            • memory/4204-25-0x00000000730D0000-0x00000000737BE000-memory.dmp

              Filesize

              6.9MB

            • memory/4204-39-0x0000000007CD0000-0x0000000007D0E000-memory.dmp

              Filesize

              248KB

            • memory/4204-616-0x00000000730D0000-0x00000000737BE000-memory.dmp

              Filesize

              6.9MB

            • memory/4204-41-0x0000000007D10000-0x0000000007D5B000-memory.dmp

              Filesize

              300KB

            • memory/4204-24-0x0000000000B50000-0x0000000000BAA000-memory.dmp

              Filesize

              360KB

            • memory/4204-28-0x0000000007A10000-0x0000000007AA2000-memory.dmp

              Filesize

              584KB

            • memory/4204-116-0x00000000730D0000-0x00000000737BE000-memory.dmp

              Filesize

              6.9MB

            • memory/4204-123-0x0000000007C80000-0x0000000007C90000-memory.dmp

              Filesize

              64KB

            • memory/4204-61-0x0000000008530000-0x0000000008596000-memory.dmp

              Filesize

              408KB

            • memory/4632-370-0x000001ECFEFE0000-0x000001ECFF0E0000-memory.dmp

              Filesize

              1024KB

            • memory/4632-380-0x000001ECFE4C0000-0x000001ECFE4E0000-memory.dmp

              Filesize

              128KB

            • memory/4632-548-0x000001E480360000-0x000001E480460000-memory.dmp

              Filesize

              1024KB

            • memory/4632-544-0x000001ECFF9E0000-0x000001ECFFAE0000-memory.dmp

              Filesize

              1024KB

            • memory/4632-534-0x000001E480020000-0x000001E480022000-memory.dmp

              Filesize

              8KB

            • memory/4652-126-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/4652-122-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/4652-153-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/4652-125-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/4900-83-0x0000026721100000-0x0000026721110000-memory.dmp

              Filesize

              64KB

            • memory/4900-62-0x0000026720820000-0x0000026720830000-memory.dmp

              Filesize

              64KB

            • memory/4900-102-0x000002671DEB0000-0x000002671DEB2000-memory.dmp

              Filesize

              8KB

            • memory/4960-128-0x00000000730D0000-0x00000000737BE000-memory.dmp

              Filesize

              6.9MB

            • memory/4960-131-0x00000000057D0000-0x00000000057E0000-memory.dmp

              Filesize

              64KB

            • memory/4960-147-0x000000000CB90000-0x000000000CBE0000-memory.dmp

              Filesize

              320KB

            • memory/4960-159-0x000000000CED0000-0x000000000D092000-memory.dmp

              Filesize

              1.8MB

            • memory/4960-164-0x000000000D0A0000-0x000000000D5CC000-memory.dmp

              Filesize

              5.2MB

            • memory/4960-47-0x0000000002DE0000-0x0000000002E10000-memory.dmp

              Filesize

              192KB

            • memory/4960-54-0x00000000730D0000-0x00000000737BE000-memory.dmp

              Filesize

              6.9MB

            • memory/4960-53-0x0000000003270000-0x0000000003276000-memory.dmp

              Filesize

              24KB

            • memory/4960-60-0x00000000057D0000-0x00000000057E0000-memory.dmp

              Filesize

              64KB

            • memory/4960-198-0x00000000730D0000-0x00000000737BE000-memory.dmp

              Filesize

              6.9MB

            • memory/5000-117-0x00000000009E0000-0x0000000000AE0000-memory.dmp

              Filesize

              1024KB

            • memory/5000-121-0x0000000000840000-0x0000000000849000-memory.dmp

              Filesize

              36KB

            • memory/5052-172-0x0000000007980000-0x00000000079E6000-memory.dmp

              Filesize

              408KB

            • memory/5052-166-0x0000000007C60000-0x0000000008288000-memory.dmp

              Filesize

              6.2MB

            • memory/5052-428-0x000000000A9C0000-0x000000000AA54000-memory.dmp

              Filesize

              592KB

            • memory/5052-176-0x0000000007C40000-0x0000000007C5C000-memory.dmp

              Filesize

              112KB

            • memory/5052-606-0x0000000007620000-0x0000000007630000-memory.dmp

              Filesize

              64KB

            • memory/5052-400-0x000000006F860000-0x000000006F8AB000-memory.dmp

              Filesize

              300KB

            • memory/5052-402-0x000000006F2D0000-0x000000006F620000-memory.dmp

              Filesize

              3.3MB

            • memory/5052-170-0x0000000007BA0000-0x0000000007BC2000-memory.dmp

              Filesize

              136KB

            • memory/5052-174-0x0000000008390000-0x00000000086E0000-memory.dmp

              Filesize

              3.3MB

            • memory/5052-216-0x0000000007670000-0x00000000076AC000-memory.dmp

              Filesize

              240KB

            • memory/5052-396-0x000000007F200000-0x000000007F210000-memory.dmp

              Filesize

              64KB

            • memory/5052-162-0x0000000005310000-0x0000000005346000-memory.dmp

              Filesize

              216KB

            • memory/5052-167-0x0000000007620000-0x0000000007630000-memory.dmp

              Filesize

              64KB

            • memory/5052-541-0x0000000007620000-0x0000000007630000-memory.dmp

              Filesize

              64KB

            • memory/5052-163-0x0000000007620000-0x0000000007630000-memory.dmp

              Filesize

              64KB

            • memory/5052-161-0x00000000730D0000-0x00000000737BE000-memory.dmp

              Filesize

              6.9MB

            • memory/5052-404-0x000000000A740000-0x000000000A75E000-memory.dmp

              Filesize

              120KB

            • memory/5052-418-0x000000000A7A0000-0x000000000A845000-memory.dmp

              Filesize

              660KB

            • memory/5052-425-0x00000000730D0000-0x00000000737BE000-memory.dmp

              Filesize

              6.9MB

            • memory/5052-427-0x0000000007620000-0x0000000007630000-memory.dmp

              Filesize

              64KB

            • memory/5052-397-0x000000000A760000-0x000000000A793000-memory.dmp

              Filesize

              204KB