Analysis

  • max time kernel
    300s
  • max time network
    305s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-10-2023 04:51

General

  • Target

    70af1a1c350554270883747e70ff85910cb2cc2c02d3ec133b4457100a05694d.exe

  • Size

    15.7MB

  • MD5

    3141032e3b1e4f3ee0d0a1fe68ccc6e8

  • SHA1

    37adc7f63e2c38b2ad803c49d2782be701da9b56

  • SHA256

    70af1a1c350554270883747e70ff85910cb2cc2c02d3ec133b4457100a05694d

  • SHA512

    d063301b2c07d8722594dd2eec9fbcb100385bcaac9843c5f329537845888803c3a6ae68ac33983b9ea429bb15d74b43a189ef4bc359c80dbb19e46ae938f0e5

  • SSDEEP

    393216:g8EDE090yXtcYODN8EDE090yXtcYODCef/GyF3ibKL4BCXtU/PS:gjg09jtcYyjg09jtcYyxFSbi4StU6

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 18 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
  • Windows security bypass 2 TTPs 8 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 19 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Windows security modification 2 TTPs 8 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 14 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 11 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:3232
    • C:\Users\Admin\AppData\Local\Temp\70af1a1c350554270883747e70ff85910cb2cc2c02d3ec133b4457100a05694d.exe
      "C:\Users\Admin\AppData\Local\Temp\70af1a1c350554270883747e70ff85910cb2cc2c02d3ec133b4457100a05694d.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
        "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3484
        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
          "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:1184
      • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe
        "C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4376
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
            PID:4776
          • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe
            "C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe"
            4⤵
            • Windows security bypass
            • Executes dropped EXE
            • Windows security modification
            • Adds Run key to start application
            • Checks for VirtualBox DLLs, possible anti-VM trick
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Suspicious use of WriteProcessMemory
            PID:4108
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious use of AdjustPrivilegeToken
              PID:2376
            • C:\Windows\System32\cmd.exe
              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
              5⤵
                PID:4768
                • C:\Windows\System32\Conhost.exe
                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  6⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4728
                • C:\Windows\system32\netsh.exe
                  netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                  6⤵
                  • Modifies Windows Firewall
                  PID:408
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                PID:3268
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                PID:4948
              • C:\Windows\rss\csrss.exe
                C:\Windows\rss\csrss.exe
                5⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Manipulates WinMonFS driver.
                • Drops file in Windows directory
                PID:4160
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  6⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  PID:4752
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                  6⤵
                  • Creates scheduled task(s)
                  PID:4988
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /delete /tn ScheduledUpdate /f
                  6⤵
                    PID:2664
                    • C:\Windows\System32\Conhost.exe
                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      7⤵
                        PID:3288
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      6⤵
                        PID:1396
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        6⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        PID:200
                      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                        C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                        6⤵
                        • Executes dropped EXE
                        PID:5032
                      • C:\Windows\SYSTEM32\schtasks.exe
                        schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                        6⤵
                        • Creates scheduled task(s)
                        PID:3384
                      • C:\Windows\windefender.exe
                        "C:\Windows\windefender.exe"
                        6⤵
                        • Executes dropped EXE
                        PID:1152
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                          7⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          PID:1396
                          • C:\Windows\SysWOW64\sc.exe
                            sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                            8⤵
                            • Launches sc.exe
                            PID:5096
                      • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
                        C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
                        6⤵
                        • Executes dropped EXE
                        PID:2820
                        • C:\Windows\SYSTEM32\schtasks.exe
                          schtasks /delete /tn "csrss" /f
                          7⤵
                            PID:1556
                          • C:\Windows\SYSTEM32\schtasks.exe
                            schtasks /delete /tn "ScheduledUpdate" /f
                            7⤵
                              PID:3988
                    • C:\Users\Admin\AppData\Local\Temp\kos1.exe
                      "C:\Users\Admin\AppData\Local\Temp\kos1.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:1976
                      • C:\Users\Admin\AppData\Local\Temp\set16.exe
                        "C:\Users\Admin\AppData\Local\Temp\set16.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of WriteProcessMemory
                        PID:2548
                        • C:\Users\Admin\AppData\Local\Temp\is-1MF0P.tmp\is-HNJ75.tmp
                          "C:\Users\Admin\AppData\Local\Temp\is-1MF0P.tmp\is-HNJ75.tmp" /SL4 $B01B4 "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1232936 52224
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in Program Files directory
                          • Suspicious use of WriteProcessMemory
                          PID:4876
                          • C:\Program Files (x86)\PA Previewer\previewer.exe
                            "C:\Program Files (x86)\PA Previewer\previewer.exe" -i
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1136
                          • C:\Windows\SysWOW64\net.exe
                            "C:\Windows\system32\net.exe" helpmsg 8
                            6⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2452
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 helpmsg 8
                              7⤵
                                PID:4548
                            • C:\Program Files (x86)\PA Previewer\previewer.exe
                              "C:\Program Files (x86)\PA Previewer\previewer.exe" -s
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4240
                        • C:\Users\Admin\AppData\Local\Temp\kos.exe
                          "C:\Users\Admin\AppData\Local\Temp\kos.exe"
                          4⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4872
                      • C:\Users\Admin\AppData\Local\Temp\latestX.exe
                        "C:\Users\Admin\AppData\Local\Temp\latestX.exe"
                        3⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Drops file in Drivers directory
                        • Executes dropped EXE
                        • Drops file in Program Files directory
                        PID:3264
                      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
                        "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2032
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          4⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5012
                        • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
                          "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
                          4⤵
                          • Windows security bypass
                          • Executes dropped EXE
                          • Windows security modification
                          • Adds Run key to start application
                          • Checks for VirtualBox DLLs, possible anti-VM trick
                          • Drops file in Windows directory
                          • Suspicious use of WriteProcessMemory
                          PID:1920
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            5⤵
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4436
                          • C:\Windows\System32\cmd.exe
                            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                            5⤵
                              PID:4692
                              • C:\Windows\system32\netsh.exe
                                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                6⤵
                                • Modifies Windows Firewall
                                PID:2464
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              5⤵
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              PID:4792
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              5⤵
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              PID:2384
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                        2⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4932
                      • C:\Windows\System32\cmd.exe
                        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2840
                        • C:\Windows\System32\sc.exe
                          sc stop UsoSvc
                          3⤵
                          • Launches sc.exe
                          PID:2568
                        • C:\Windows\System32\sc.exe
                          sc stop WaaSMedicSvc
                          3⤵
                          • Launches sc.exe
                          PID:2204
                        • C:\Windows\System32\sc.exe
                          sc stop bits
                          3⤵
                          • Launches sc.exe
                          PID:1640
                        • C:\Windows\System32\sc.exe
                          sc stop wuauserv
                          3⤵
                          • Launches sc.exe
                          PID:2224
                        • C:\Windows\System32\sc.exe
                          sc stop dosvc
                          3⤵
                          • Launches sc.exe
                          PID:3288
                      • C:\Windows\System32\cmd.exe
                        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4336
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -hibernate-timeout-ac 0
                          3⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2744
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -hibernate-timeout-dc 0
                          3⤵
                            PID:4492
                          • C:\Windows\System32\powercfg.exe
                            powercfg /x -standby-timeout-ac 0
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2968
                          • C:\Windows\System32\powercfg.exe
                            powercfg /x -standby-timeout-dc 0
                            3⤵
                              PID:4728
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                            2⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4740
                            • C:\Windows\System32\Conhost.exe
                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4776
                          • C:\Windows\System32\schtasks.exe
                            C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                            2⤵
                              PID:3268
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                              2⤵
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              PID:220
                            • C:\Windows\System32\cmd.exe
                              C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                              2⤵
                                PID:4900
                                • C:\Windows\System32\sc.exe
                                  sc stop UsoSvc
                                  3⤵
                                  • Launches sc.exe
                                  PID:3272
                                • C:\Windows\System32\sc.exe
                                  sc stop WaaSMedicSvc
                                  3⤵
                                  • Launches sc.exe
                                  PID:4700
                                • C:\Windows\System32\sc.exe
                                  sc stop wuauserv
                                  3⤵
                                  • Launches sc.exe
                                  PID:4668
                                • C:\Windows\System32\sc.exe
                                  sc stop bits
                                  3⤵
                                  • Launches sc.exe
                                  PID:168
                                • C:\Windows\System32\sc.exe
                                  sc stop dosvc
                                  3⤵
                                  • Launches sc.exe
                                  PID:3844
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                2⤵
                                • Drops file in System32 directory
                                • Modifies data under HKEY_USERS
                                PID:4216
                              • C:\Windows\System32\cmd.exe
                                C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                2⤵
                                  PID:236
                                  • C:\Windows\System32\powercfg.exe
                                    powercfg /x -hibernate-timeout-ac 0
                                    3⤵
                                      PID:2164
                                    • C:\Windows\System32\powercfg.exe
                                      powercfg /x -hibernate-timeout-dc 0
                                      3⤵
                                        PID:1580
                                      • C:\Windows\System32\powercfg.exe
                                        powercfg /x -standby-timeout-ac 0
                                        3⤵
                                          PID:2688
                                        • C:\Windows\System32\powercfg.exe
                                          powercfg /x -standby-timeout-dc 0
                                          3⤵
                                            PID:828
                                        • C:\Windows\System32\conhost.exe
                                          C:\Windows\System32\conhost.exe
                                          2⤵
                                            PID:4804
                                          • C:\Windows\explorer.exe
                                            C:\Windows\explorer.exe
                                            2⤵
                                            • Modifies data under HKEY_USERS
                                            PID:1380
                                        • C:\Program Files\Google\Chrome\updater.exe
                                          "C:\Program Files\Google\Chrome\updater.exe"
                                          1⤵
                                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                                          • Drops file in Drivers directory
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • Drops file in Program Files directory
                                          PID:2576
                                        • C:\Windows\system32\wbem\wmiprvse.exe
                                          C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4492
                                        • C:\Windows\windefender.exe
                                          C:\Windows\windefender.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Modifies data under HKEY_USERS
                                          PID:3216

                                        Network

                                        MITRE ATT&CK Matrix ATT&CK v13

                                        Execution

                                        Scheduled Task/Job

                                        1
                                        T1053

                                        Persistence

                                        Create or Modify System Process

                                        2
                                        T1543

                                        Windows Service

                                        2
                                        T1543.003

                                        Boot or Logon Autostart Execution

                                        1
                                        T1547

                                        Registry Run Keys / Startup Folder

                                        1
                                        T1547.001

                                        Scheduled Task/Job

                                        1
                                        T1053

                                        Privilege Escalation

                                        Create or Modify System Process

                                        2
                                        T1543

                                        Windows Service

                                        2
                                        T1543.003

                                        Boot or Logon Autostart Execution

                                        1
                                        T1547

                                        Registry Run Keys / Startup Folder

                                        1
                                        T1547.001

                                        Scheduled Task/Job

                                        1
                                        T1053

                                        Defense Evasion

                                        Impair Defenses

                                        3
                                        T1562

                                        Disable or Modify Tools

                                        2
                                        T1562.001

                                        Modify Registry

                                        3
                                        T1112

                                        Discovery

                                        Query Registry

                                        3
                                        T1012

                                        System Information Discovery

                                        3
                                        T1082

                                        Peripheral Device Discovery

                                        1
                                        T1120

                                        Command and Control

                                        Web Service

                                        1
                                        T1102

                                        Impact

                                        Service Stop

                                        1
                                        T1489

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Program Files (x86)\PA Previewer\previewer.exe
                                          Filesize

                                          1.9MB

                                          MD5

                                          27b85a95804a760da4dbee7ca800c9b4

                                          SHA1

                                          f03136226bf3dd38ba0aa3aad1127ccab380197c

                                          SHA256

                                          f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245

                                          SHA512

                                          e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7

                                        • C:\Program Files (x86)\PA Previewer\previewer.exe
                                          Filesize

                                          1.9MB

                                          MD5

                                          27b85a95804a760da4dbee7ca800c9b4

                                          SHA1

                                          f03136226bf3dd38ba0aa3aad1127ccab380197c

                                          SHA256

                                          f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245

                                          SHA512

                                          e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7

                                        • C:\Program Files (x86)\PA Previewer\previewer.exe
                                          Filesize

                                          1.9MB

                                          MD5

                                          27b85a95804a760da4dbee7ca800c9b4

                                          SHA1

                                          f03136226bf3dd38ba0aa3aad1127ccab380197c

                                          SHA256

                                          f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245

                                          SHA512

                                          e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7

                                        • C:\Program Files\Google\Chrome\updater.exe
                                          Filesize

                                          5.6MB

                                          MD5

                                          bae29e49e8190bfbbf0d77ffab8de59d

                                          SHA1

                                          4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                          SHA256

                                          f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                          SHA512

                                          9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                        • C:\Program Files\Google\Chrome\updater.exe
                                          Filesize

                                          5.6MB

                                          MD5

                                          bae29e49e8190bfbbf0d77ffab8de59d

                                          SHA1

                                          4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                          SHA256

                                          f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                          SHA512

                                          9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                                          Filesize

                                          3KB

                                          MD5

                                          ad5cd538ca58cb28ede39c108acb5785

                                          SHA1

                                          1ae910026f3dbe90ed025e9e96ead2b5399be877

                                          SHA256

                                          c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

                                          SHA512

                                          c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                                          Filesize

                                          2KB

                                          MD5

                                          1c19c16e21c97ed42d5beabc93391fc5

                                          SHA1

                                          8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                                          SHA256

                                          1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                                          SHA512

                                          7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                                          Filesize

                                          19KB

                                          MD5

                                          7171feff5f920c38285b78920f52b8b5

                                          SHA1

                                          43257fc6444dcaa983fb078d85deb5aa296867db

                                          SHA256

                                          3e3c33317f6e7efd4ae6ebb80644ea07d6699594abe421648950e5b9bb7f95df

                                          SHA512

                                          7fd39d3129155702c6face30ba921ae8281c14087854ab9831b7c10009317848a5b88fe5c5de05267bb38fb08937f56e95686457ad340e91dcbb75e647851bf1

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                          Filesize

                                          1KB

                                          MD5

                                          62c0fa5391a77a355ed11f2d2c2a50b2

                                          SHA1

                                          a5ae5639e4a3b52b1d26eaf091553f5e30f10c02

                                          SHA256

                                          169394e3bcb4e78e6e7197ea35e46dc7a204c3d61ec40473a3484a77a4666416

                                          SHA512

                                          f8d56fa749c7c9cc1a5b7c986abe286327acf2055c9a647f188787de4c6634e831d3796a6677b22f8cad34a3d74792281c77428e4858e06f571212f9ac514075

                                        • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
                                          Filesize

                                          4.2MB

                                          MD5

                                          906e8dd59115761a98c0308313a2ad3b

                                          SHA1

                                          b2f9debeea9624b2e64e8062bf40382318cc42bd

                                          SHA256

                                          56d6788b4b40af4a7c0329a9d91b1b4407beef8bd9395ef852851f53a3d36dcf

                                          SHA512

                                          18cbbddc8e85acb236cd15c122adaa9537efc18216c394ba368ab0e391afe40b3dd6130dc1c60bb812da616f37897725c0ea6a695a93e9b25eb665f82bca870e

                                        • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
                                          Filesize

                                          4.2MB

                                          MD5

                                          906e8dd59115761a98c0308313a2ad3b

                                          SHA1

                                          b2f9debeea9624b2e64e8062bf40382318cc42bd

                                          SHA256

                                          56d6788b4b40af4a7c0329a9d91b1b4407beef8bd9395ef852851f53a3d36dcf

                                          SHA512

                                          18cbbddc8e85acb236cd15c122adaa9537efc18216c394ba368ab0e391afe40b3dd6130dc1c60bb812da616f37897725c0ea6a695a93e9b25eb665f82bca870e

                                        • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
                                          Filesize

                                          4.2MB

                                          MD5

                                          906e8dd59115761a98c0308313a2ad3b

                                          SHA1

                                          b2f9debeea9624b2e64e8062bf40382318cc42bd

                                          SHA256

                                          56d6788b4b40af4a7c0329a9d91b1b4407beef8bd9395ef852851f53a3d36dcf

                                          SHA512

                                          18cbbddc8e85acb236cd15c122adaa9537efc18216c394ba368ab0e391afe40b3dd6130dc1c60bb812da616f37897725c0ea6a695a93e9b25eb665f82bca870e

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_w5j0nc4p.lrr.ps1
                                          Filesize

                                          1B

                                          MD5

                                          c4ca4238a0b923820dcc509a6f75849b

                                          SHA1

                                          356a192b7913b04c54574d18c28d46e6395428ab

                                          SHA256

                                          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                          SHA512

                                          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                        • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
                                          Filesize

                                          3.2MB

                                          MD5

                                          f801950a962ddba14caaa44bf084b55c

                                          SHA1

                                          7cadc9076121297428442785536ba0df2d4ae996

                                          SHA256

                                          c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f

                                          SHA512

                                          4183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5

                                        • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
                                          Filesize

                                          3.2MB

                                          MD5

                                          f801950a962ddba14caaa44bf084b55c

                                          SHA1

                                          7cadc9076121297428442785536ba0df2d4ae996

                                          SHA256

                                          c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f

                                          SHA512

                                          4183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5

                                        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                          Filesize

                                          99KB

                                          MD5

                                          09031a062610d77d685c9934318b4170

                                          SHA1

                                          880f744184e7774f3d14c1bb857e21cc7fe89a6d

                                          SHA256

                                          778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd

                                          SHA512

                                          9a276e1f0f55d35f2bf38eb093464f7065bdd30a660e6d1c62eed5e76d1fb2201567b89d9ae65d2d89dc99b142159e36fb73be8d5e08252a975d50544a7cda27

                                        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                          Filesize

                                          281KB

                                          MD5

                                          d98e33b66343e7c96158444127a117f6

                                          SHA1

                                          bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                          SHA256

                                          5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                          SHA512

                                          705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                          Filesize

                                          281KB

                                          MD5

                                          d98e33b66343e7c96158444127a117f6

                                          SHA1

                                          bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                          SHA256

                                          5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                          SHA512

                                          705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                        • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe
                                          Filesize

                                          4.2MB

                                          MD5

                                          4c05c54dd3007dced398eb41ab68992f

                                          SHA1

                                          1a737edff587c6acc830c8897ccf6128c718530c

                                          SHA256

                                          7a0417d7440e50f8156d6487b9e58fd1c5cb55eafe6e2dc95ab1627f7b099e6a

                                          SHA512

                                          71c1ebd7b0e6038fda5d970af409bf1a00171c44ade366482226348907e335abbd32c4daa89b0e3407f272e0302a9c0900120aec5ff57041fc26c91951815ca0

                                        • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe
                                          Filesize

                                          4.2MB

                                          MD5

                                          4c05c54dd3007dced398eb41ab68992f

                                          SHA1

                                          1a737edff587c6acc830c8897ccf6128c718530c

                                          SHA256

                                          7a0417d7440e50f8156d6487b9e58fd1c5cb55eafe6e2dc95ab1627f7b099e6a

                                          SHA512

                                          71c1ebd7b0e6038fda5d970af409bf1a00171c44ade366482226348907e335abbd32c4daa89b0e3407f272e0302a9c0900120aec5ff57041fc26c91951815ca0

                                        • C:\Users\Admin\AppData\Local\Temp\e0cbefcb1af40c7d4aff4aca26621a98.exe
                                          Filesize

                                          4.2MB

                                          MD5

                                          4c05c54dd3007dced398eb41ab68992f

                                          SHA1

                                          1a737edff587c6acc830c8897ccf6128c718530c

                                          SHA256

                                          7a0417d7440e50f8156d6487b9e58fd1c5cb55eafe6e2dc95ab1627f7b099e6a

                                          SHA512

                                          71c1ebd7b0e6038fda5d970af409bf1a00171c44ade366482226348907e335abbd32c4daa89b0e3407f272e0302a9c0900120aec5ff57041fc26c91951815ca0

                                        • C:\Users\Admin\AppData\Local\Temp\is-1MF0P.tmp\is-HNJ75.tmp
                                          Filesize

                                          647KB

                                          MD5

                                          2fba5642cbcaa6857c3995ccb5d2ee2a

                                          SHA1

                                          91fe8cd860cba7551fbf78bc77cc34e34956e8cc

                                          SHA256

                                          ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa

                                          SHA512

                                          30613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c

                                        • C:\Users\Admin\AppData\Local\Temp\is-1MF0P.tmp\is-HNJ75.tmp
                                          Filesize

                                          647KB

                                          MD5

                                          2fba5642cbcaa6857c3995ccb5d2ee2a

                                          SHA1

                                          91fe8cd860cba7551fbf78bc77cc34e34956e8cc

                                          SHA256

                                          ddec51f3741f3988b9cc792f6f8fc0dfa2098ef0eb84c6a2af7f8da5a72b40fa

                                          SHA512

                                          30613b43427d17115134798506f197c0f5f8b2b9f247668fa25b9dd4853bbd97ac1e27f4e3325dec4f6dfc0e448ebbddb2969ad1a1781aa59ebf522d436aed7c

                                        • C:\Users\Admin\AppData\Local\Temp\kos.exe
                                          Filesize

                                          8KB

                                          MD5

                                          076ab7d1cc5150a5e9f8745cc5f5fb6c

                                          SHA1

                                          7b40783a27a38106e2cc91414f2bc4d8b484c578

                                          SHA256

                                          d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90

                                          SHA512

                                          75e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b

                                        • C:\Users\Admin\AppData\Local\Temp\kos.exe
                                          Filesize

                                          8KB

                                          MD5

                                          076ab7d1cc5150a5e9f8745cc5f5fb6c

                                          SHA1

                                          7b40783a27a38106e2cc91414f2bc4d8b484c578

                                          SHA256

                                          d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90

                                          SHA512

                                          75e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b

                                        • C:\Users\Admin\AppData\Local\Temp\kos1.exe
                                          Filesize

                                          1.4MB

                                          MD5

                                          85b698363e74ba3c08fc16297ddc284e

                                          SHA1

                                          171cfea4a82a7365b241f16aebdb2aad29f4f7c0

                                          SHA256

                                          78efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe

                                          SHA512

                                          7e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796

                                        • C:\Users\Admin\AppData\Local\Temp\kos1.exe
                                          Filesize

                                          1.4MB

                                          MD5

                                          85b698363e74ba3c08fc16297ddc284e

                                          SHA1

                                          171cfea4a82a7365b241f16aebdb2aad29f4f7c0

                                          SHA256

                                          78efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe

                                          SHA512

                                          7e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796

                                        • C:\Users\Admin\AppData\Local\Temp\latestX.exe
                                          Filesize

                                          5.6MB

                                          MD5

                                          bae29e49e8190bfbbf0d77ffab8de59d

                                          SHA1

                                          4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                          SHA256

                                          f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                          SHA512

                                          9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                        • C:\Users\Admin\AppData\Local\Temp\latestX.exe
                                          Filesize

                                          5.6MB

                                          MD5

                                          bae29e49e8190bfbbf0d77ffab8de59d

                                          SHA1

                                          4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                          SHA256

                                          f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                          SHA512

                                          9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                        • C:\Users\Admin\AppData\Local\Temp\set16.exe
                                          Filesize

                                          1.4MB

                                          MD5

                                          22d5269955f256a444bd902847b04a3b

                                          SHA1

                                          41a83de3273270c3bd5b2bd6528bdc95766aa268

                                          SHA256

                                          ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd

                                          SHA512

                                          d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c

                                        • C:\Users\Admin\AppData\Local\Temp\set16.exe
                                          Filesize

                                          1.4MB

                                          MD5

                                          22d5269955f256a444bd902847b04a3b

                                          SHA1

                                          41a83de3273270c3bd5b2bd6528bdc95766aa268

                                          SHA256

                                          ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd

                                          SHA512

                                          d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c

                                        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
                                          Filesize

                                          292KB

                                          MD5

                                          39baa178f1fc5ec2111eb95008ee6e38

                                          SHA1

                                          8a36b6d95d6453e9eed8df12eaed71580384f2a3

                                          SHA256

                                          0990c73e4389e3b912fff43e2ed3363e9f9af367741fc285b3aa5168b5646c74

                                          SHA512

                                          3b50e27da905b4c8cd8a5dcc7c4c37015d1c1bc3187f1572d3bea7caffdd278a00f73844024cc04d06f47374425fc4c7cbfa4752678f9f40269d2979369b2d74

                                        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
                                          Filesize

                                          292KB

                                          MD5

                                          39baa178f1fc5ec2111eb95008ee6e38

                                          SHA1

                                          8a36b6d95d6453e9eed8df12eaed71580384f2a3

                                          SHA256

                                          0990c73e4389e3b912fff43e2ed3363e9f9af367741fc285b3aa5168b5646c74

                                          SHA512

                                          3b50e27da905b4c8cd8a5dcc7c4c37015d1c1bc3187f1572d3bea7caffdd278a00f73844024cc04d06f47374425fc4c7cbfa4752678f9f40269d2979369b2d74

                                        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
                                          Filesize

                                          292KB

                                          MD5

                                          39baa178f1fc5ec2111eb95008ee6e38

                                          SHA1

                                          8a36b6d95d6453e9eed8df12eaed71580384f2a3

                                          SHA256

                                          0990c73e4389e3b912fff43e2ed3363e9f9af367741fc285b3aa5168b5646c74

                                          SHA512

                                          3b50e27da905b4c8cd8a5dcc7c4c37015d1c1bc3187f1572d3bea7caffdd278a00f73844024cc04d06f47374425fc4c7cbfa4752678f9f40269d2979369b2d74

                                        • C:\Users\Admin\AppData\Roaming\grgwevf
                                          Filesize

                                          292KB

                                          MD5

                                          39baa178f1fc5ec2111eb95008ee6e38

                                          SHA1

                                          8a36b6d95d6453e9eed8df12eaed71580384f2a3

                                          SHA256

                                          0990c73e4389e3b912fff43e2ed3363e9f9af367741fc285b3aa5168b5646c74

                                          SHA512

                                          3b50e27da905b4c8cd8a5dcc7c4c37015d1c1bc3187f1572d3bea7caffdd278a00f73844024cc04d06f47374425fc4c7cbfa4752678f9f40269d2979369b2d74

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                                          Filesize

                                          2KB

                                          MD5

                                          1c19c16e21c97ed42d5beabc93391fc5

                                          SHA1

                                          8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                                          SHA256

                                          1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                                          SHA512

                                          7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                                          Filesize

                                          18KB

                                          MD5

                                          0c35e53486f6b3e4979197ea3378589a

                                          SHA1

                                          65bed070e76a054bc9c017e3140836e57c1e8729

                                          SHA256

                                          a43d4ede5f2c56f839772477c9491b1d52aa5813a74055509e762050248a24be

                                          SHA512

                                          59a321b862dd6c999f50a64caee51ce8d51844e7f63220f66852de13214c007ea6769dc22ea47a9ef382d9e1ad449c08892a7b360a8865b3f95fc36e77c917f5

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                                          Filesize

                                          18KB

                                          MD5

                                          0c35e53486f6b3e4979197ea3378589a

                                          SHA1

                                          65bed070e76a054bc9c017e3140836e57c1e8729

                                          SHA256

                                          a43d4ede5f2c56f839772477c9491b1d52aa5813a74055509e762050248a24be

                                          SHA512

                                          59a321b862dd6c999f50a64caee51ce8d51844e7f63220f66852de13214c007ea6769dc22ea47a9ef382d9e1ad449c08892a7b360a8865b3f95fc36e77c917f5

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                                          Filesize

                                          18KB

                                          MD5

                                          92c7f7f693b18bc8604c5451c35e89e8

                                          SHA1

                                          e00d7e87abf6d4da52536af1929dfee384015040

                                          SHA256

                                          223db522b6884ea4a7e14596ee54e413c0929170fcea6b70305ed7db8c257718

                                          SHA512

                                          e6c5efba925ba98e974afd295bfbe7d33c166afe6221b4020c7995f935b5b5834eddeba58e1ed02b3c65e6b17f2459e1de0a5bebb621b23ac716808b59084a57

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                                          Filesize

                                          18KB

                                          MD5

                                          92c7f7f693b18bc8604c5451c35e89e8

                                          SHA1

                                          e00d7e87abf6d4da52536af1929dfee384015040

                                          SHA256

                                          223db522b6884ea4a7e14596ee54e413c0929170fcea6b70305ed7db8c257718

                                          SHA512

                                          e6c5efba925ba98e974afd295bfbe7d33c166afe6221b4020c7995f935b5b5834eddeba58e1ed02b3c65e6b17f2459e1de0a5bebb621b23ac716808b59084a57

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                                          Filesize

                                          18KB

                                          MD5

                                          e3225e36f8ca62cb890965e95db539dc

                                          SHA1

                                          7b64d69bc9dde1bdb7822680dfba423b243556d4

                                          SHA256

                                          d26e650e0f8109d5dba30ef4215270eb2c1a555772488c68fc5e6e84147a4cd1

                                          SHA512

                                          b8ab14c22bca63ba60647f3b42c0198b2a7393425cdac7c53606f3e236a1465d9deaaacaef76fb86574caaea7131dd5423e57d2b9c7affdc8d0e67c1724efc23

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                                          Filesize

                                          18KB

                                          MD5

                                          e3225e36f8ca62cb890965e95db539dc

                                          SHA1

                                          7b64d69bc9dde1bdb7822680dfba423b243556d4

                                          SHA256

                                          d26e650e0f8109d5dba30ef4215270eb2c1a555772488c68fc5e6e84147a4cd1

                                          SHA512

                                          b8ab14c22bca63ba60647f3b42c0198b2a7393425cdac7c53606f3e236a1465d9deaaacaef76fb86574caaea7131dd5423e57d2b9c7affdc8d0e67c1724efc23

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                                          Filesize

                                          18KB

                                          MD5

                                          79491be6b7b83a2896161ec037a86b16

                                          SHA1

                                          58bc7910d391c671507e637fc937c7d1f5b00cf0

                                          SHA256

                                          51c0543ce4c77fa8efbefd89b0c69698329cf3589115916544b1a478e44e7fa7

                                          SHA512

                                          03cf7ffc577168b051319e78db3ae6ee492d5f90c26b5a51901a1fb5920eb95534238560f208755ab7e299babe6fcf364f09c99f982a0c709853f1fe3a9f1907

                                        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                                          Filesize

                                          18KB

                                          MD5

                                          09b404583f88cf93cbe493a408d8edce

                                          SHA1

                                          90de24b87499ca2e29551a583b7479bb2dbdc3c8

                                          SHA256

                                          e109924044925370c9e96168482e1d026c34156a1d4e9a54ad6588a74fd5594e

                                          SHA512

                                          caec244307ad1534db39779a0c618d36e92e5c813219381abf07b2278ab1803eea08047a50fb8f32c5b545a411e3025c9cefa031b6891a0897fd9e9adff0674f

                                        • C:\Windows\System32\drivers\etc\hosts
                                          Filesize

                                          3KB

                                          MD5

                                          00930b40cba79465b7a38ed0449d1449

                                          SHA1

                                          4b25a89ee28b20ba162f23772ddaf017669092a5

                                          SHA256

                                          eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                                          SHA512

                                          cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                                        • C:\Windows\rss\csrss.exe
                                          Filesize

                                          4.2MB

                                          MD5

                                          4c05c54dd3007dced398eb41ab68992f

                                          SHA1

                                          1a737edff587c6acc830c8897ccf6128c718530c

                                          SHA256

                                          7a0417d7440e50f8156d6487b9e58fd1c5cb55eafe6e2dc95ab1627f7b099e6a

                                          SHA512

                                          71c1ebd7b0e6038fda5d970af409bf1a00171c44ade366482226348907e335abbd32c4daa89b0e3407f272e0302a9c0900120aec5ff57041fc26c91951815ca0

                                        • C:\Windows\rss\csrss.exe
                                          Filesize

                                          4.2MB

                                          MD5

                                          4c05c54dd3007dced398eb41ab68992f

                                          SHA1

                                          1a737edff587c6acc830c8897ccf6128c718530c

                                          SHA256

                                          7a0417d7440e50f8156d6487b9e58fd1c5cb55eafe6e2dc95ab1627f7b099e6a

                                          SHA512

                                          71c1ebd7b0e6038fda5d970af409bf1a00171c44ade366482226348907e335abbd32c4daa89b0e3407f272e0302a9c0900120aec5ff57041fc26c91951815ca0

                                        • C:\Windows\rss\csrss.exe
                                          Filesize

                                          4.2MB

                                          MD5

                                          4c05c54dd3007dced398eb41ab68992f

                                          SHA1

                                          1a737edff587c6acc830c8897ccf6128c718530c

                                          SHA256

                                          7a0417d7440e50f8156d6487b9e58fd1c5cb55eafe6e2dc95ab1627f7b099e6a

                                          SHA512

                                          71c1ebd7b0e6038fda5d970af409bf1a00171c44ade366482226348907e335abbd32c4daa89b0e3407f272e0302a9c0900120aec5ff57041fc26c91951815ca0

                                        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                                          Filesize

                                          3KB

                                          MD5

                                          573d77d4e77a445f5db769812a0be865

                                          SHA1

                                          7473d15ef2d3c6894edefd472f411c8e3209a99c

                                          SHA256

                                          5ec3f268845a50e309ae0d80bcee4f4dd4cd1b279ab1e64b523a057c11074f1c

                                          SHA512

                                          af2422a9790a91cdcbe39e6ef6d17899c2cbd4159b1b71ac56f633015068d3afc678fcef34892575bf59bdf7d5914ec6070864940d44130263fe84e28abba2dc

                                        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                                          Filesize

                                          10KB

                                          MD5

                                          46dd239c95c8186b5347a900ce231eae

                                          SHA1

                                          733674325a8ad34a0147479f0510bd8bc824e879

                                          SHA256

                                          e9abb69b1483c5e1c26d6fb755cd7147b885154a653e188f34401930d89c4116

                                          SHA512

                                          41ce13eee4ae7a3475e220ed224d44f2e6b03eedaea52a6119e5ebbc6751734a03cf059b94b24e052358166dca34a3a6890b626313f4b24b1d517057919941b6

                                        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                          Filesize

                                          1KB

                                          MD5

                                          631f4b3792b263fdda6b265e93be4747

                                          SHA1

                                          1d6916097d419198bfdf78530d59d0d9f3e12d45

                                          SHA256

                                          4e68d2d067c5680a2e55853ac58b16f199b09f1b9e5f2174605fff18da828976

                                          SHA512

                                          e0280041c4ca63971ab2524f25d2047820f031c1b4aeb6021a3367297045ddf6616ffccafb54630eb07fd154571d844329ebcc34d6ce64834cb77cba373e4fbe

                                        • C:\Windows\system32\drivers\etc\hosts
                                          Filesize

                                          3KB

                                          MD5

                                          00930b40cba79465b7a38ed0449d1449

                                          SHA1

                                          4b25a89ee28b20ba162f23772ddaf017669092a5

                                          SHA256

                                          eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                                          SHA512

                                          cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                                        • C:\Windows\windefender.exe
                                          Filesize

                                          2.0MB

                                          MD5

                                          8e67f58837092385dcf01e8a2b4f5783

                                          SHA1

                                          012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                          SHA256

                                          166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                          SHA512

                                          40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                        • C:\Windows\windefender.exe
                                          Filesize

                                          2.0MB

                                          MD5

                                          8e67f58837092385dcf01e8a2b4f5783

                                          SHA1

                                          012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                          SHA256

                                          166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                          SHA512

                                          40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                        • C:\Windows\windefender.exe
                                          Filesize

                                          2.0MB

                                          MD5

                                          8e67f58837092385dcf01e8a2b4f5783

                                          SHA1

                                          012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                          SHA256

                                          166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                          SHA512

                                          40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                        • \Users\Admin\AppData\Local\Temp\is-TPCO0.tmp\_isetup\_iscrypt.dll
                                          Filesize

                                          2KB

                                          MD5

                                          a69559718ab506675e907fe49deb71e9

                                          SHA1

                                          bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                          SHA256

                                          2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                          SHA512

                                          e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                        • \Users\Admin\AppData\Local\Temp\is-TPCO0.tmp\_isetup\_isdecmp.dll
                                          Filesize

                                          32KB

                                          MD5

                                          b4786eb1e1a93633ad1b4c112514c893

                                          SHA1

                                          734750b771d0809c88508e4feb788d7701e6dada

                                          SHA256

                                          2ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f

                                          SHA512

                                          0882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6

                                        • \Users\Admin\AppData\Local\Temp\is-TPCO0.tmp\_isetup\_isdecmp.dll
                                          Filesize

                                          32KB

                                          MD5

                                          b4786eb1e1a93633ad1b4c112514c893

                                          SHA1

                                          734750b771d0809c88508e4feb788d7701e6dada

                                          SHA256

                                          2ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f

                                          SHA512

                                          0882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6

                                        • memory/1136-90-0x0000000000400000-0x00000000005F1000-memory.dmp
                                          Filesize

                                          1.9MB

                                        • memory/1136-88-0x0000000000400000-0x00000000005F1000-memory.dmp
                                          Filesize

                                          1.9MB

                                        • memory/1136-94-0x0000000000400000-0x00000000005F1000-memory.dmp
                                          Filesize

                                          1.9MB

                                        • memory/1184-55-0x0000000000400000-0x0000000000409000-memory.dmp
                                          Filesize

                                          36KB

                                        • memory/1184-57-0x0000000000400000-0x0000000000409000-memory.dmp
                                          Filesize

                                          36KB

                                        • memory/1184-128-0x0000000000400000-0x0000000000409000-memory.dmp
                                          Filesize

                                          36KB

                                        • memory/1920-1869-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/1920-1569-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/1976-46-0x0000000073E90000-0x000000007457E000-memory.dmp
                                          Filesize

                                          6.9MB

                                        • memory/1976-17-0x0000000000ED0000-0x0000000001044000-memory.dmp
                                          Filesize

                                          1.5MB

                                        • memory/1976-20-0x0000000073E90000-0x000000007457E000-memory.dmp
                                          Filesize

                                          6.9MB

                                        • memory/2032-107-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/2032-106-0x0000000004790000-0x000000000507B000-memory.dmp
                                          Filesize

                                          8.9MB

                                        • memory/2032-105-0x0000000004390000-0x000000000478C000-memory.dmp
                                          Filesize

                                          4.0MB

                                        • memory/2032-737-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/2032-717-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/2032-273-0x0000000004390000-0x000000000478C000-memory.dmp
                                          Filesize

                                          4.0MB

                                        • memory/2032-731-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/2032-246-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/2548-91-0x0000000000400000-0x0000000000413000-memory.dmp
                                          Filesize

                                          76KB

                                        • memory/2548-38-0x0000000000400000-0x0000000000413000-memory.dmp
                                          Filesize

                                          76KB

                                        • memory/2576-1571-0x00007FF642B30000-0x00007FF6430D1000-memory.dmp
                                          Filesize

                                          5.6MB

                                        • memory/3048-0-0x0000000073E90000-0x000000007457E000-memory.dmp
                                          Filesize

                                          6.9MB

                                        • memory/3048-36-0x0000000073E90000-0x000000007457E000-memory.dmp
                                          Filesize

                                          6.9MB

                                        • memory/3048-1-0x00000000006A0000-0x0000000001658000-memory.dmp
                                          Filesize

                                          15.7MB

                                        • memory/3232-126-0x0000000000B50000-0x0000000000B66000-memory.dmp
                                          Filesize

                                          88KB

                                        • memory/3264-1049-0x00007FF6DF590000-0x00007FF6DFB31000-memory.dmp
                                          Filesize

                                          5.6MB

                                        • memory/3264-231-0x00007FF6DF590000-0x00007FF6DFB31000-memory.dmp
                                          Filesize

                                          5.6MB

                                        • memory/3264-802-0x00007FF6DF590000-0x00007FF6DFB31000-memory.dmp
                                          Filesize

                                          5.6MB

                                        • memory/3264-714-0x00007FF6DF590000-0x00007FF6DFB31000-memory.dmp
                                          Filesize

                                          5.6MB

                                        • memory/3264-1122-0x00007FF6DF590000-0x00007FF6DFB31000-memory.dmp
                                          Filesize

                                          5.6MB

                                        • memory/3484-53-0x0000000002470000-0x0000000002570000-memory.dmp
                                          Filesize

                                          1024KB

                                        • memory/3484-54-0x00000000023E0000-0x00000000023E9000-memory.dmp
                                          Filesize

                                          36KB

                                        • memory/4108-849-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/4108-1566-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/4108-1865-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/4240-1507-0x0000000000400000-0x00000000005F1000-memory.dmp
                                          Filesize

                                          1.9MB

                                        • memory/4240-1166-0x0000000000400000-0x00000000005F1000-memory.dmp
                                          Filesize

                                          1.9MB

                                        • memory/4240-1856-0x0000000000870000-0x00000000008B9000-memory.dmp
                                          Filesize

                                          292KB

                                        • memory/4240-1864-0x0000000000400000-0x00000000005F1000-memory.dmp
                                          Filesize

                                          1.9MB

                                        • memory/4240-726-0x0000000000400000-0x00000000005F1000-memory.dmp
                                          Filesize

                                          1.9MB

                                        • memory/4240-841-0x0000000000400000-0x00000000005F1000-memory.dmp
                                          Filesize

                                          1.9MB

                                        • memory/4240-103-0x0000000000400000-0x00000000005F1000-memory.dmp
                                          Filesize

                                          1.9MB

                                        • memory/4240-740-0x0000000000400000-0x00000000005F1000-memory.dmp
                                          Filesize

                                          1.9MB

                                        • memory/4376-229-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/4376-706-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/4376-98-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/4376-89-0x00000000047D0000-0x00000000050BB000-memory.dmp
                                          Filesize

                                          8.9MB

                                        • memory/4376-728-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/4376-735-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/4376-86-0x00000000043D0000-0x00000000047C9000-memory.dmp
                                          Filesize

                                          4.0MB

                                        • memory/4376-267-0x0000000000400000-0x0000000002675000-memory.dmp
                                          Filesize

                                          34.5MB

                                        • memory/4376-233-0x00000000043D0000-0x00000000047C9000-memory.dmp
                                          Filesize

                                          4.0MB

                                        • memory/4776-249-0x000000006F7D0000-0x000000006FB20000-memory.dmp
                                          Filesize

                                          3.3MB

                                        • memory/4776-116-0x0000000006FA0000-0x0000000006FB0000-memory.dmp
                                          Filesize

                                          64KB

                                        • memory/4776-115-0x00000000075E0000-0x0000000007C08000-memory.dmp
                                          Filesize

                                          6.2MB

                                        • memory/4776-247-0x000000000A240000-0x000000000A273000-memory.dmp
                                          Filesize

                                          204KB

                                        • memory/4776-260-0x000000000A280000-0x000000000A325000-memory.dmp
                                          Filesize

                                          660KB

                                        • memory/4776-263-0x000000007EE10000-0x000000007EE20000-memory.dmp
                                          Filesize

                                          64KB

                                        • memory/4776-666-0x000000000A360000-0x000000000A37A000-memory.dmp
                                          Filesize

                                          104KB

                                        • memory/4776-266-0x000000000A460000-0x000000000A4F4000-memory.dmp
                                          Filesize

                                          592KB

                                        • memory/4776-119-0x0000000072EF0000-0x00000000735DE000-memory.dmp
                                          Filesize

                                          6.9MB

                                        • memory/4776-413-0x0000000006FA0000-0x0000000006FB0000-memory.dmp
                                          Filesize

                                          64KB

                                        • memory/4776-269-0x0000000006FA0000-0x0000000006FB0000-memory.dmp
                                          Filesize

                                          64KB

                                        • memory/4776-168-0x0000000009370000-0x00000000093AC000-memory.dmp
                                          Filesize

                                          240KB

                                        • memory/4776-461-0x0000000072EF0000-0x00000000735DE000-memory.dmp
                                          Filesize

                                          6.9MB

                                        • memory/4776-123-0x0000000007DB0000-0x0000000007E16000-memory.dmp
                                          Filesize

                                          408KB

                                        • memory/4776-250-0x000000000A220000-0x000000000A23E000-memory.dmp
                                          Filesize

                                          120KB

                                        • memory/4776-248-0x0000000071910000-0x000000007195B000-memory.dmp
                                          Filesize

                                          300KB

                                        • memory/4776-117-0x0000000006FA0000-0x0000000006FB0000-memory.dmp
                                          Filesize

                                          64KB

                                        • memory/4776-414-0x0000000006FA0000-0x0000000006FB0000-memory.dmp
                                          Filesize

                                          64KB

                                        • memory/4872-44-0x0000000000A00000-0x0000000000A08000-memory.dmp
                                          Filesize

                                          32KB

                                        • memory/4872-47-0x00007FFA534E0000-0x00007FFA53ECC000-memory.dmp
                                          Filesize

                                          9.9MB

                                        • memory/4872-102-0x00007FFA534E0000-0x00007FFA53ECC000-memory.dmp
                                          Filesize

                                          9.9MB

                                        • memory/4872-110-0x000000001B5C0000-0x000000001B5D0000-memory.dmp
                                          Filesize

                                          64KB

                                        • memory/4872-49-0x000000001B5C0000-0x000000001B5D0000-memory.dmp
                                          Filesize

                                          64KB

                                        • memory/4876-74-0x00000000001F0000-0x00000000001F1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4876-258-0x0000000000400000-0x00000000004B0000-memory.dmp
                                          Filesize

                                          704KB

                                        • memory/4876-232-0x00000000001F0000-0x00000000001F1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/5012-125-0x0000000008030000-0x000000000804C000-memory.dmp
                                          Filesize

                                          112KB

                                        • memory/5012-118-0x0000000006EF0000-0x0000000006F00000-memory.dmp
                                          Filesize

                                          64KB

                                        • memory/5012-120-0x00000000071B0000-0x00000000071D2000-memory.dmp
                                          Filesize

                                          136KB

                                        • memory/5012-114-0x0000000072EF0000-0x00000000735DE000-memory.dmp
                                          Filesize

                                          6.9MB

                                        • memory/5012-113-0x0000000004B60000-0x0000000004B96000-memory.dmp
                                          Filesize

                                          216KB

                                        • memory/5012-121-0x0000000006EF0000-0x0000000006F00000-memory.dmp
                                          Filesize

                                          64KB

                                        • memory/5012-268-0x0000000006EF0000-0x0000000006F00000-memory.dmp
                                          Filesize

                                          64KB

                                        • memory/5012-122-0x0000000007B60000-0x0000000007BC6000-memory.dmp
                                          Filesize

                                          408KB

                                        • memory/5012-385-0x0000000072EF0000-0x00000000735DE000-memory.dmp
                                          Filesize

                                          6.9MB

                                        • memory/5012-124-0x0000000007CC0000-0x0000000008010000-memory.dmp
                                          Filesize

                                          3.3MB

                                        • memory/5012-127-0x00000000085A0000-0x00000000085EB000-memory.dmp
                                          Filesize

                                          300KB

                                        • memory/5012-415-0x0000000006EF0000-0x0000000006F00000-memory.dmp
                                          Filesize

                                          64KB

                                        • memory/5012-230-0x0000000009180000-0x00000000091F6000-memory.dmp
                                          Filesize

                                          472KB

                                        • memory/5012-464-0x0000000006EF0000-0x0000000006F00000-memory.dmp
                                          Filesize

                                          64KB

                                        • memory/5012-265-0x000000007F290000-0x000000007F2A0000-memory.dmp
                                          Filesize

                                          64KB

                                        • memory/5012-251-0x0000000071910000-0x000000007195B000-memory.dmp
                                          Filesize

                                          300KB

                                        • memory/5012-253-0x000000006F7D0000-0x000000006FB20000-memory.dmp
                                          Filesize

                                          3.3MB