Analysis

  • max time kernel
    140s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    14/11/2023, 15:02

General

  • Target

    5655432921d1f7ba0005a97a19904ca5.exe

  • Size

    15.1MB

  • MD5

    5655432921d1f7ba0005a97a19904ca5

  • SHA1

    3f8b87db9799d205b66bb219bb385261b13c6990

  • SHA256

    e26a36702257f07a25adc0e5b1a3ceeabcbcb18b63c8d83c0ccb988f848e4a08

  • SHA512

    2c9101533988b686173ccff9d609e24ffa5a4f10191c92e2b15778d6f238e2fffbb5f218af3d6644880bb6d76460c06ac097d5abfe98ea9c7e6f319d1f0c2729

  • SSDEEP

    196608:yH3soW5wpjr2Wr0TFL7pftFHPEjX/KcxvRmteH:03sohszcjS4z

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 17 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 9 IoCs
  • Modifies boot configuration data using bcdedit 14 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 27 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 10 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5655432921d1f7ba0005a97a19904ca5.exe
    "C:\Users\Admin\AppData\Local\Temp\5655432921d1f7ba0005a97a19904ca5.exe"
    1⤵
    • UAC bypass
    • Windows security bypass
    • Windows security modification
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2820
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\5655432921d1f7ba0005a97a19904ca5.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2280
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Users\Admin\Pictures\W0UfPsXgDFHMTNkOQI50WvUb.exe
        "C:\Users\Admin\Pictures\W0UfPsXgDFHMTNkOQI50WvUb.exe" run
        3⤵
        • Executes dropped EXE
        PID:2912
      • C:\Users\Admin\Pictures\wrLCFSaepO1iGOkaIn46C9up.exe
        "C:\Users\Admin\Pictures\wrLCFSaepO1iGOkaIn46C9up.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1460
        • C:\Users\Admin\Pictures\wrLCFSaepO1iGOkaIn46C9up.exe
          "C:\Users\Admin\Pictures\wrLCFSaepO1iGOkaIn46C9up.exe"
          4⤵
          • Windows security bypass
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Adds Run key to start application
          • Checks for VirtualBox DLLs, possible anti-VM trick
          • Drops file in Windows directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:988
          • C:\Windows\system32\cmd.exe
            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:320
            • C:\Windows\system32\netsh.exe
              netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
              6⤵
              • Modifies Windows Firewall
              • Modifies data under HKEY_USERS
              PID:1136
          • C:\Windows\rss\csrss.exe
            C:\Windows\rss\csrss.exe
            5⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Manipulates WinMon driver.
            • Manipulates WinMonFS driver.
            • Drops file in Windows directory
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2408
            • C:\Windows\system32\schtasks.exe
              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
              6⤵
              • Creates scheduled task(s)
              PID:2596
            • C:\Windows\system32\schtasks.exe
              schtasks /delete /tn ScheduledUpdate /f
              6⤵
                PID:2576
              • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies system certificate store
                • Suspicious use of WriteProcessMemory
                PID:2668
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
                  7⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2868
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
                  7⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1880
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
                  7⤵
                  • Modifies boot configuration data using bcdedit
                  PID:344
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
                  7⤵
                  • Modifies boot configuration data using bcdedit
                  PID:544
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
                  7⤵
                  • Modifies boot configuration data using bcdedit
                  PID:332
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
                  7⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1140
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
                  7⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1612
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
                  7⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2388
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
                  7⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2112
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
                  7⤵
                  • Modifies boot configuration data using bcdedit
                  PID:996
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
                  7⤵
                  • Modifies boot configuration data using bcdedit
                  PID:564
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -timeout 0
                  7⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1476
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
                  7⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2232
              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:1408
              • C:\Windows\system32\bcdedit.exe
                C:\Windows\Sysnative\bcdedit.exe /v
                6⤵
                • Modifies boot configuration data using bcdedit
                PID:2476
              • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                6⤵
                • Executes dropped EXE
                PID:1780
              • C:\Windows\system32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                6⤵
                • Creates scheduled task(s)
                PID:1396
              • C:\Windows\windefender.exe
                "C:\Windows\windefender.exe"
                6⤵
                • Executes dropped EXE
                PID:1992
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                  7⤵
                    PID:2944
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /C sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                  6⤵
                    PID:2980
                    • C:\Windows\SysWOW64\sc.exe
                      sc sdset WmiPrvSE D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                      7⤵
                      • Launches sc.exe
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2936
                  • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
                    C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
                    6⤵
                    • Executes dropped EXE
                    PID:1472
                    • C:\Windows\system32\schtasks.exe
                      schtasks /delete /tn "csrss" /f
                      7⤵
                        PID:2016
                      • C:\Windows\system32\schtasks.exe
                        schtasks /delete /tn "ScheduledUpdate" /f
                        7⤵
                          PID:2480
                • C:\Users\Admin\Pictures\HreqSdh6VhG48pJHh4GPRWlS.exe
                  "C:\Users\Admin\Pictures\HreqSdh6VhG48pJHh4GPRWlS.exe"
                  3⤵
                  • Executes dropped EXE
                  • Checks processor information in registry
                  • Modifies system certificate store
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:1188
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\JDGCGDBGCA.exe"
                    4⤵
                      PID:1360
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Pictures\HreqSdh6VhG48pJHh4GPRWlS.exe" & del "C:\ProgramData\*.dll"" & exit
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2648
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout /t 5
                        5⤵
                        • Delays execution with timeout.exe
                        PID:1600
              • C:\Windows\system32\makecab.exe
                "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231114150228.log C:\Windows\Logs\CBS\CbsPersist_20231114150228.cab
                1⤵
                • Drops file in Windows directory
                PID:1820
              • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe
                "C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe" --nt-service -f "C:\Users\Admin\AppData\Local\Temp\csrss\tor\torrc" --Log "notice file C:\Users\Admin\AppData\Local\Temp\csrss\tor\log.txt"
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2688
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                1⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:864
              • C:\Windows\windefender.exe
                C:\Windows\windefender.exe
                1⤵
                • Executes dropped EXE
                • Modifies data under HKEY_USERS
                PID:2952

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      344B

                      MD5

                      e439b6ca5f4d7a4b5b0d466d7b0c7faf

                      SHA1

                      42facc11642b7f8f9fad68b6104b919f87be7079

                      SHA256

                      58350b4ca7e1b6cb19f07b1cd696fbf2dc58a607a8417a8e43f37643e6e4a097

                      SHA512

                      aec9d85a7b9041b318ed6ed4e6d8e9d7fef0e5c0a01d35fc7b0d9b1f57d812b000d494c305c02a57ff6b8a687106ee76fe364807102825904d8e6fd0edb75c6d

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      344B

                      MD5

                      90067ec1cb4392efe93ec298e407fef3

                      SHA1

                      1dca12e8525bdbd470e5527c29296e7746f4d7f2

                      SHA256

                      b3cbf5f2af31a04d6c313097ff83ba972f08a62d0055c986d205af59b730669a

                      SHA512

                      da14ae8c229f7d222b6bd06ad633280c15796986d50d2628746af08a6156fa5754a9a856bdba95582b7e5dafc55186017cfe5c06abc285fb4822692747d4cf4f

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      344B

                      MD5

                      003182bdf0ec2bff4693d7ed6f1d9dc4

                      SHA1

                      6d9f4049aa542ae4168308b1c5dd0a96878699f0

                      SHA256

                      68b1b7d0f5422114f5408ad452eb3c72216f52ab08f7cae55b8d9186bd22db96

                      SHA512

                      3042df29df5867c4ed807becfd123697579fef9e5c96428d1a0c95daf1a2b2f79479b09e831b673130d919814fe855857eaa9c84dd58680829e50a9951db0bda

                    • C:\Users\Admin\AppData\Local\Temp\Cab4EED.tmp

                      Filesize

                      61KB

                      MD5

                      f3441b8572aae8801c04f3060b550443

                      SHA1

                      4ef0a35436125d6821831ef36c28ffaf196cda15

                      SHA256

                      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

                      SHA512

                      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

                    • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

                      Filesize

                      8.3MB

                      MD5

                      fd2727132edd0b59fa33733daa11d9ef

                      SHA1

                      63e36198d90c4c2b9b09dd6786b82aba5f03d29a

                      SHA256

                      3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e

                      SHA512

                      3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

                    • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

                      Filesize

                      395KB

                      MD5

                      5da3a881ef991e8010deed799f1a5aaf

                      SHA1

                      fea1acea7ed96d7c9788783781e90a2ea48c1a53

                      SHA256

                      f18fdb9e03546bfb98397bcb8378b505eaf4ac061749229a7ee92a1c3cf156e4

                      SHA512

                      24fbcb5353a3d51ee01f1de1bbb965f9e40e0d00e52c42713d446f12edceeb8d08b086a8687a6188decaa8f256899e24a06c424d8d73adaad910149a9c45ef09

                    • C:\Users\Admin\AppData\Local\Temp\Tar4F1F.tmp

                      Filesize

                      163KB

                      MD5

                      9441737383d21192400eca82fda910ec

                      SHA1

                      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

                      SHA256

                      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

                      SHA512

                      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

                    • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe

                      Filesize

                      94KB

                      MD5

                      d98e78fd57db58a11f880b45bb659767

                      SHA1

                      ab70c0d3bd9103c07632eeecee9f51d198ed0e76

                      SHA256

                      414035cc96d8bcc87ed173852a839ffbb45882a98c7a6f7b821e1668891deef0

                      SHA512

                      aafbd3eee102d0b682c4c854d69d50bac077e48f7f0dd8a5f913c6c73027aed7231d99fc9d716511759800da8c4f0f394b318821e9e47f6e62e436c8725a7831

                    • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe

                      Filesize

                      3.2MB

                      MD5

                      f801950a962ddba14caaa44bf084b55c

                      SHA1

                      7cadc9076121297428442785536ba0df2d4ae996

                      SHA256

                      c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f

                      SHA512

                      4183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5

                    • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe

                      Filesize

                      3.2MB

                      MD5

                      f801950a962ddba14caaa44bf084b55c

                      SHA1

                      7cadc9076121297428442785536ba0df2d4ae996

                      SHA256

                      c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f

                      SHA512

                      4183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5

                    • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe

                      Filesize

                      3.2MB

                      MD5

                      f801950a962ddba14caaa44bf084b55c

                      SHA1

                      7cadc9076121297428442785536ba0df2d4ae996

                      SHA256

                      c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f

                      SHA512

                      4183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5

                    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

                      Filesize

                      99KB

                      MD5

                      09031a062610d77d685c9934318b4170

                      SHA1

                      880f744184e7774f3d14c1bb857e21cc7fe89a6d

                      SHA256

                      778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd

                      SHA512

                      9a276e1f0f55d35f2bf38eb093464f7065bdd30a660e6d1c62eed5e76d1fb2201567b89d9ae65d2d89dc99b142159e36fb73be8d5e08252a975d50544a7cda27

                    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                      Filesize

                      281KB

                      MD5

                      d98e33b66343e7c96158444127a117f6

                      SHA1

                      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                      SHA256

                      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                      SHA512

                      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                      Filesize

                      281KB

                      MD5

                      d98e33b66343e7c96158444127a117f6

                      SHA1

                      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                      SHA256

                      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                      SHA512

                      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                    • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe

                      Filesize

                      1.7MB

                      MD5

                      13aaafe14eb60d6a718230e82c671d57

                      SHA1

                      e039dd924d12f264521b8e689426fb7ca95a0a7b

                      SHA256

                      f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3

                      SHA512

                      ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\cached-certs

                      Filesize

                      13KB

                      MD5

                      d123b76cad9f4314df1a045dcbc582d7

                      SHA1

                      e8c24effae26a94e272a8044c37fc0e6e0f0de3c

                      SHA256

                      f64a29f3de71e41ef74b3c28fd890d15b3f4d4141f16778beb2764f1c0c47752

                      SHA512

                      4f8671b762bb71b5f66e5311b0936e14502e6a120808b1a3b80ae4d3910b2f56a1f4192eb146f7a29d23517bb5742d62874624ab29f9cc962acbc1f785ee1dc5

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\cached-microdesc-consensus

                      Filesize

                      2.9MB

                      MD5

                      68077581623e6a9d6ea6888226fdedcc

                      SHA1

                      83e93467a72f32f96b152b38c26c494146fc7d53

                      SHA256

                      d5f2cc291e69e565f2d10b86a02136da166886bb1872eb4696bc54d3328e2e9b

                      SHA512

                      73d20ad0ba392652a3a132ab97326b82e1549b9a9241afb675851bc94d65d24816c78c9db3d8f6d815a7ab3be65e9d9da24261801b945f0e048075835a92e255

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\cached-microdesc-consensus.tmp

                      Filesize

                      2.9MB

                      MD5

                      68077581623e6a9d6ea6888226fdedcc

                      SHA1

                      83e93467a72f32f96b152b38c26c494146fc7d53

                      SHA256

                      d5f2cc291e69e565f2d10b86a02136da166886bb1872eb4696bc54d3328e2e9b

                      SHA512

                      73d20ad0ba392652a3a132ab97326b82e1549b9a9241afb675851bc94d65d24816c78c9db3d8f6d815a7ab3be65e9d9da24261801b945f0e048075835a92e255

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\cached-microdescs.new

                      Filesize

                      6.8MB

                      MD5

                      0599620a9458db2caaead7505c071fa7

                      SHA1

                      a4739683b926d1e8aaa6debc9fd56aab6eecdd20

                      SHA256

                      3512bdb9017c61c7538c04a6c4a9dce9b46ecba7d8ee1cb051f757258fb01420

                      SHA512

                      2394170964d2889b65ffd398fd3b3d3ff9122e1c9fdc89cf0adf5b5274732f786220af603bd43dea7aab6ef18b89bd84a30c7d07cea625645cff53f6443eed77

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\cached-microdescs.new

                      Filesize

                      20.1MB

                      MD5

                      34355d301605d60df66b4ee703747f2e

                      SHA1

                      0b7b9b89c342023cce9f9310e3bb0426c96cc23d

                      SHA256

                      545d6ed255c59bf3efd20f3dfc0a913cf288fe65dd7feddcdf5d785919c16cc6

                      SHA512

                      f59ff83b8be234fabcae203a838e75bffad1965ff118817d228a4e0d36581a70bcb303eadc070f83494ee91c221dd15f5496828a1b706f7219666d15e8dcddf8

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\geoip

                      Filesize

                      3.8MB

                      MD5

                      c72911dec6ae8c4bc62bb2a6a21ba85b

                      SHA1

                      0ae7077313a53103c2b32100d74aafc04216289d

                      SHA256

                      7e777efc194ea9788171636085b19875d19397d3249fbb88136534037a3dc38f

                      SHA512

                      99dc9761ad69f5508d96a2362b930728d451f5ddcf7bb1e210ec5b0f14ee00ee71efaaab150ffa16a2f92fbbb1e2a6b5cd92d51721996df7ac794491c441c304

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\geoip6

                      Filesize

                      5.6MB

                      MD5

                      ed2f9b19dd1584d7e26f5ba460ef2fbf

                      SHA1

                      dcbf1789bf1eeb03276b830cb2ab92bcf779d97f

                      SHA256

                      f11bd1d7546cad00b6db0a1594f3ac1daf9f541004fd7efb5414e068693d6add

                      SHA512

                      dcfc780d1e34968390969b64ea2091b630c8eec94ac4724a4103a003a2f31545c3791a39f514517153538b4d3f5c50b6bfba74cc9cf8c0b1b5daba0a4849c856

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libcrypto-1_1.dll

                      Filesize

                      3.5MB

                      MD5

                      b7c32c8e7d21aa9b79470037227eba43

                      SHA1

                      38d719b10ca035cee65162c1a44e2c62123d41b4

                      SHA256

                      99b4042a858a9e437917c8256692e9ba161b87054ccf5e22538e86bb35c34f23

                      SHA512

                      d85345380b9605c8484e11873218aa4eaeea573ca51eedada6d0518695a2b184bb22faf7c5e3d88330935774ced17e9d80c577b06603aa1ca6dab748b0bd15a7

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libevent-2-1-7.dll

                      Filesize

                      876KB

                      MD5

                      736443b08b5a52b6958f001e8200be71

                      SHA1

                      e56ddc8476aef0d3482c99c5bfaf0f57458b2576

                      SHA256

                      da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4

                      SHA512

                      9dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libevent_core-2-1-7.dll

                      Filesize

                      701KB

                      MD5

                      f1bcc8bd3200845993211eb807f33e56

                      SHA1

                      d25274e36e79d8e50a446b1144d8b6f2b2cf309b

                      SHA256

                      7cd199bbf3bfe19182c5eca3a080a7e93cec0d30cbd872a305c92bc9282a7399

                      SHA512

                      397ba6b995aebce54b95c7f3abd3c64ae2c5ab3d01fb38185f8fccad82cac335e2f0666fc47b73d3a3a4af9b5a5ce311e4963841616f4d38b03e1bc16355b5bb

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libgcc_s_dw2-1.dll

                      Filesize

                      668KB

                      MD5

                      36e1c3814bde3418ba3d38517954cb7c

                      SHA1

                      495e1ba5b0b442e70124d33daa6fea4e3e5931b0

                      SHA256

                      b34edd252f46dd881e79cfd274777fe5e90943d511c8e002aeca0528d7f3b4b1

                      SHA512

                      df7b608c51a782ad5cdfd753577a3dcacf4e2515ac02ce9e35b3cbc543895862844e8adcaff983b1348884085cf7427c33a67acc5ce48fe656f5b2083d0813b0

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libssl-1_1.dll

                      Filesize

                      938KB

                      MD5

                      d92e59b71bf8a0d827597ed95b2eca42

                      SHA1

                      cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a

                      SHA256

                      b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3

                      SHA512

                      be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libssp-0.dll

                      Filesize

                      95KB

                      MD5

                      7cdbaca31739500aefc06dd85a8558ff

                      SHA1

                      adc36ec6a3cdc7e57a1b706c820e382627f6cb90

                      SHA256

                      0a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb

                      SHA512

                      6df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libwinpthread-1.dll

                      Filesize

                      301KB

                      MD5

                      07f4bbf18077231cb44750684dd8daf4

                      SHA1

                      8560627e9e05d6022abdfe7e576856e91ac90188

                      SHA256

                      4a146671b1fed4906799cb1cfc670753f1b1922793f5b40d5cf710befb287316

                      SHA512

                      04e31ad60e797cdbd1f3db36a8473139bbd1b763d2d67a160454b24b524e8bbc4d5784c62446a0f9d83b95dd518534ab4581d3a43a14146b17d0035ecc79c151

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\tor.exe

                      Filesize

                      4.3MB

                      MD5

                      055ae7c584a7b012955bf5d874f30cfa

                      SHA1

                      f2b4d8c5307ff09607be929ec08fc2727bf03dcf

                      SHA256

                      d51b5bf807f6de3b5521b49b9a722592fb85aee1ea2f1c03bbb5255d62bfb9c8

                      SHA512

                      910bb0be7a3840bb37cb453ea066677a5327e272cfa0995f7a600bd4eb2e7c31685dcc0758c3b2cf07c7622fd45b2d4cdd3a4272cddaf9e97e2ffc48120646c5

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\Tor\zlib1.dll

                      Filesize

                      135KB

                      MD5

                      f08b1f044c68770c190daf1eb1f3157e

                      SHA1

                      f94103a542459d60434f9ddb6b5f45b11eae2923

                      SHA256

                      1d0278386f8922bdf4808861e6e901541ad23cc6337bb022c78dc05915202f27

                      SHA512

                      0667416a7515cd845e96d2ad26ca676cffd2d1c9f0449ff05455e8cf6a7ab595d3f972785d051f45332c04f1c0b576726f645e3669122608a4f374e984ba161c

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\log.txt

                      Filesize

                      4KB

                      MD5

                      842343c1a8f6d2d0aa4007ed8c0387ea

                      SHA1

                      0ceed6999c740807e37803f71b8a63a6594fb259

                      SHA256

                      658d3d33d1fe92ad3efef587b538b95a3727fff5b44127695b508f9a6ef78ed0

                      SHA512

                      02a25a5de6163bc2cf70ce4e4ed0deac247120e10721ae4bf9ed74eab00d4210ec033d47ea15935d4a705639239abce0bdd7d408f41f7a0a5a505881126fbb93

                    • C:\Users\Admin\AppData\Local\Temp\csrss\tor\torrc

                      Filesize

                      227B

                      MD5

                      17c2994d6a89cb7d277f1b3f0b49e5ed

                      SHA1

                      2a72ffc34cb2a7d7d3057f4725f2ac660a809158

                      SHA256

                      38ad4c6fb403fc2d5dc0dc83a165983a3fb426e0a850847fefc35e62a5ced67f

                      SHA512

                      d145ea667f70ed08b12d44228aea09cab637dd1acee131b919f22efdd4730b0c18daa0c83b196f5efa2082cf8f90bcd618b7c7efaab79ca5f0478ade0aca4728

                    • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                      Filesize

                      5.3MB

                      MD5

                      1afff8d5352aecef2ecd47ffa02d7f7d

                      SHA1

                      8b115b84efdb3a1b87f750d35822b2609e665bef

                      SHA256

                      c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

                      SHA512

                      e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

                    • C:\Users\Admin\AppData\Local\Temp\osloader.exe

                      Filesize

                      591KB

                      MD5

                      e2f68dc7fbd6e0bf031ca3809a739346

                      SHA1

                      9c35494898e65c8a62887f28e04c0359ab6f63f5

                      SHA256

                      b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

                      SHA512

                      26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

                    • C:\Users\Admin\Pictures\HreqSdh6VhG48pJHh4GPRWlS.exe

                      Filesize

                      208KB

                      MD5

                      cf0f80bd47110c14d7666e49a0b4c82d

                      SHA1

                      6aabf5c0bef973edf1ce911cb14e3a40ba817297

                      SHA256

                      846a1f9545cb52bf3a46d1168889575a32010047b04929721cc131c38a17d49a

                      SHA512

                      22ff200846d59f2a7594463b340212e8cad77bc6b23fe49473622bc870eb4f846a411b3b3607a55f1e19aaa6ccc3baf9680a49a49d80f29754a78128c13db72d

                    • C:\Users\Admin\Pictures\HreqSdh6VhG48pJHh4GPRWlS.exe

                      Filesize

                      208KB

                      MD5

                      cf0f80bd47110c14d7666e49a0b4c82d

                      SHA1

                      6aabf5c0bef973edf1ce911cb14e3a40ba817297

                      SHA256

                      846a1f9545cb52bf3a46d1168889575a32010047b04929721cc131c38a17d49a

                      SHA512

                      22ff200846d59f2a7594463b340212e8cad77bc6b23fe49473622bc870eb4f846a411b3b3607a55f1e19aaa6ccc3baf9680a49a49d80f29754a78128c13db72d

                    • C:\Users\Admin\Pictures\HreqSdh6VhG48pJHh4GPRWlS.exe

                      Filesize

                      208KB

                      MD5

                      cf0f80bd47110c14d7666e49a0b4c82d

                      SHA1

                      6aabf5c0bef973edf1ce911cb14e3a40ba817297

                      SHA256

                      846a1f9545cb52bf3a46d1168889575a32010047b04929721cc131c38a17d49a

                      SHA512

                      22ff200846d59f2a7594463b340212e8cad77bc6b23fe49473622bc870eb4f846a411b3b3607a55f1e19aaa6ccc3baf9680a49a49d80f29754a78128c13db72d

                    • C:\Users\Admin\Pictures\W0UfPsXgDFHMTNkOQI50WvUb.exe

                      Filesize

                      324KB

                      MD5

                      b27323c59498426807574a20824ac525

                      SHA1

                      bdee034558b4b105472e0b0c943460746910ace1

                      SHA256

                      df5397b08e1b72fbf42290033aa11934e895488c93b76e608542fbb49d2e0f98

                      SHA512

                      c438cf185107f8d69139750415397cb674e0dede0ca72352a738425996d7ca6fa1ded38f1711d29fe4cd7a3056b69397f6b5397f842c29ed50aee3897f5f77f1

                    • C:\Users\Admin\Pictures\W0UfPsXgDFHMTNkOQI50WvUb.exe

                      Filesize

                      324KB

                      MD5

                      b27323c59498426807574a20824ac525

                      SHA1

                      bdee034558b4b105472e0b0c943460746910ace1

                      SHA256

                      df5397b08e1b72fbf42290033aa11934e895488c93b76e608542fbb49d2e0f98

                      SHA512

                      c438cf185107f8d69139750415397cb674e0dede0ca72352a738425996d7ca6fa1ded38f1711d29fe4cd7a3056b69397f6b5397f842c29ed50aee3897f5f77f1

                    • C:\Users\Admin\Pictures\wrLCFSaepO1iGOkaIn46C9up.exe

                      Filesize

                      4.1MB

                      MD5

                      66cafebb8b367bb034fff5afa08513cf

                      SHA1

                      202c84c0195d0814194d7c2ac25959fa7a17065a

                      SHA256

                      b5ed4f06f99470e6fafe86a79f86d8b205f16ca686cb9d5c0853e115e11c36ff

                      SHA512

                      7f3b4c9d2a1acb6456db281782de0f18d10954764599b75d2e889117d9886e77f9c0e4dc0597d5d653d5031c2f2f5435e30435e9f63b2aa37b8f9c8affd963f4

                    • C:\Users\Admin\Pictures\wrLCFSaepO1iGOkaIn46C9up.exe

                      Filesize

                      4.1MB

                      MD5

                      66cafebb8b367bb034fff5afa08513cf

                      SHA1

                      202c84c0195d0814194d7c2ac25959fa7a17065a

                      SHA256

                      b5ed4f06f99470e6fafe86a79f86d8b205f16ca686cb9d5c0853e115e11c36ff

                      SHA512

                      7f3b4c9d2a1acb6456db281782de0f18d10954764599b75d2e889117d9886e77f9c0e4dc0597d5d653d5031c2f2f5435e30435e9f63b2aa37b8f9c8affd963f4

                    • C:\Users\Admin\Pictures\wrLCFSaepO1iGOkaIn46C9up.exe

                      Filesize

                      4.1MB

                      MD5

                      66cafebb8b367bb034fff5afa08513cf

                      SHA1

                      202c84c0195d0814194d7c2ac25959fa7a17065a

                      SHA256

                      b5ed4f06f99470e6fafe86a79f86d8b205f16ca686cb9d5c0853e115e11c36ff

                      SHA512

                      7f3b4c9d2a1acb6456db281782de0f18d10954764599b75d2e889117d9886e77f9c0e4dc0597d5d653d5031c2f2f5435e30435e9f63b2aa37b8f9c8affd963f4

                    • C:\Users\Admin\Pictures\wrLCFSaepO1iGOkaIn46C9up.exe

                      Filesize

                      4.1MB

                      MD5

                      66cafebb8b367bb034fff5afa08513cf

                      SHA1

                      202c84c0195d0814194d7c2ac25959fa7a17065a

                      SHA256

                      b5ed4f06f99470e6fafe86a79f86d8b205f16ca686cb9d5c0853e115e11c36ff

                      SHA512

                      7f3b4c9d2a1acb6456db281782de0f18d10954764599b75d2e889117d9886e77f9c0e4dc0597d5d653d5031c2f2f5435e30435e9f63b2aa37b8f9c8affd963f4

                    • C:\Windows\System32\drivers\Winmon.sys

                      Filesize

                      9KB

                      MD5

                      69989105f151015c16a2f422f5722590

                      SHA1

                      3fd92c0224de69048fd8f7d06be85709f25d6573

                      SHA256

                      b1c321b5e495473a401bd6e6adfe1ec931f8247b1b2646b0e259bff011a0958c

                      SHA512

                      f74b8086c083fc90117248ef39a1a64467258740e358aaa6454f24b88af169d27290d0c0a46210746734f975eef320ba2e138b43cdba8c2329c23f140d0c1e71

                    • C:\Windows\rss\csrss.exe

                      Filesize

                      4.1MB

                      MD5

                      66cafebb8b367bb034fff5afa08513cf

                      SHA1

                      202c84c0195d0814194d7c2ac25959fa7a17065a

                      SHA256

                      b5ed4f06f99470e6fafe86a79f86d8b205f16ca686cb9d5c0853e115e11c36ff

                      SHA512

                      7f3b4c9d2a1acb6456db281782de0f18d10954764599b75d2e889117d9886e77f9c0e4dc0597d5d653d5031c2f2f5435e30435e9f63b2aa37b8f9c8affd963f4

                    • C:\Windows\rss\csrss.exe

                      Filesize

                      4.1MB

                      MD5

                      66cafebb8b367bb034fff5afa08513cf

                      SHA1

                      202c84c0195d0814194d7c2ac25959fa7a17065a

                      SHA256

                      b5ed4f06f99470e6fafe86a79f86d8b205f16ca686cb9d5c0853e115e11c36ff

                      SHA512

                      7f3b4c9d2a1acb6456db281782de0f18d10954764599b75d2e889117d9886e77f9c0e4dc0597d5d653d5031c2f2f5435e30435e9f63b2aa37b8f9c8affd963f4

                    • C:\Windows\windefender.exe

                      Filesize

                      2.0MB

                      MD5

                      8e67f58837092385dcf01e8a2b4f5783

                      SHA1

                      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                      SHA256

                      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                      SHA512

                      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                    • C:\Windows\windefender.exe

                      Filesize

                      2.0MB

                      MD5

                      8e67f58837092385dcf01e8a2b4f5783

                      SHA1

                      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                      SHA256

                      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                      SHA512

                      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                    • C:\Windows\windefender.exe

                      Filesize

                      2.0MB

                      MD5

                      8e67f58837092385dcf01e8a2b4f5783

                      SHA1

                      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                      SHA256

                      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                      SHA512

                      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                    • \Users\Admin\AppData\Local\Temp\csrss\dsefix.exe

                      Filesize

                      94KB

                      MD5

                      d98e78fd57db58a11f880b45bb659767

                      SHA1

                      ab70c0d3bd9103c07632eeecee9f51d198ed0e76

                      SHA256

                      414035cc96d8bcc87ed173852a839ffbb45882a98c7a6f7b821e1668891deef0

                      SHA512

                      aafbd3eee102d0b682c4c854d69d50bac077e48f7f0dd8a5f913c6c73027aed7231d99fc9d716511759800da8c4f0f394b318821e9e47f6e62e436c8725a7831

                    • \Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe

                      Filesize

                      3.2MB

                      MD5

                      f801950a962ddba14caaa44bf084b55c

                      SHA1

                      7cadc9076121297428442785536ba0df2d4ae996

                      SHA256

                      c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f

                      SHA512

                      4183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5

                    • \Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe

                      Filesize

                      3.2MB

                      MD5

                      f801950a962ddba14caaa44bf084b55c

                      SHA1

                      7cadc9076121297428442785536ba0df2d4ae996

                      SHA256

                      c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f

                      SHA512

                      4183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5

                    • \Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                      Filesize

                      281KB

                      MD5

                      d98e33b66343e7c96158444127a117f6

                      SHA1

                      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                      SHA256

                      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                      SHA512

                      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                    • \Users\Admin\AppData\Local\Temp\csrss\patch.exe

                      Filesize

                      1.7MB

                      MD5

                      13aaafe14eb60d6a718230e82c671d57

                      SHA1

                      e039dd924d12f264521b8e689426fb7ca95a0a7b

                      SHA256

                      f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3

                      SHA512

                      ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3

                    • \Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libcrypto-1_1.dll

                      Filesize

                      3.5MB

                      MD5

                      b7c32c8e7d21aa9b79470037227eba43

                      SHA1

                      38d719b10ca035cee65162c1a44e2c62123d41b4

                      SHA256

                      99b4042a858a9e437917c8256692e9ba161b87054ccf5e22538e86bb35c34f23

                      SHA512

                      d85345380b9605c8484e11873218aa4eaeea573ca51eedada6d0518695a2b184bb22faf7c5e3d88330935774ced17e9d80c577b06603aa1ca6dab748b0bd15a7

                    • \Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libevent-2-1-7.dll

                      Filesize

                      876KB

                      MD5

                      736443b08b5a52b6958f001e8200be71

                      SHA1

                      e56ddc8476aef0d3482c99c5bfaf0f57458b2576

                      SHA256

                      da1f75b9ce5f47cb78a6930a50c08397ee4d9778302746340f4057fcd838dbf4

                      SHA512

                      9dfcdb1186b089e7961767d427de986ad8e5f7715b7592984349d0b8e7f02198137c83e8c79a096a7475ad9f4695f52539fa08fa65912860ddf0a85515a7cda1

                    • \Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libgcc_s_dw2-1.dll

                      Filesize

                      668KB

                      MD5

                      36e1c3814bde3418ba3d38517954cb7c

                      SHA1

                      495e1ba5b0b442e70124d33daa6fea4e3e5931b0

                      SHA256

                      b34edd252f46dd881e79cfd274777fe5e90943d511c8e002aeca0528d7f3b4b1

                      SHA512

                      df7b608c51a782ad5cdfd753577a3dcacf4e2515ac02ce9e35b3cbc543895862844e8adcaff983b1348884085cf7427c33a67acc5ce48fe656f5b2083d0813b0

                    • \Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libssl-1_1.dll

                      Filesize

                      938KB

                      MD5

                      d92e59b71bf8a0d827597ed95b2eca42

                      SHA1

                      cfc49ff29eddb7127fbed166a8a1e740ea3dfb9a

                      SHA256

                      b6ef5cb4c093431f3e73c53e66df33d08237ba46d457d119a2c4dcae582314e3

                      SHA512

                      be65e003a498e753b08912d697e9b4d8a28828581c17d1e8e20880372a81030ce18610eeff230c8880e68a831041075bb2ebffcf318d29ebf58bc856fac3df04

                    • \Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libssp-0.dll

                      Filesize

                      95KB

                      MD5

                      7cdbaca31739500aefc06dd85a8558ff

                      SHA1

                      adc36ec6a3cdc7e57a1b706c820e382627f6cb90

                      SHA256

                      0a1dee5dd5234971f7526f3d5f8b7e2cfdcb536e18debd51c985010fb504fbdb

                      SHA512

                      6df8ac9054f27ebbef9642ce79ff7ba836411ea0ed0bd04b3cfe724a336a91f665c2cc0b7a4bfc99a80786d1a6d361b971a7dbb7a298b919a1baa812541841ba

                    • \Users\Admin\AppData\Local\Temp\csrss\tor\Tor\libwinpthread-1.dll

                      Filesize

                      301KB

                      MD5

                      07f4bbf18077231cb44750684dd8daf4

                      SHA1

                      8560627e9e05d6022abdfe7e576856e91ac90188

                      SHA256

                      4a146671b1fed4906799cb1cfc670753f1b1922793f5b40d5cf710befb287316

                      SHA512

                      04e31ad60e797cdbd1f3db36a8473139bbd1b763d2d67a160454b24b524e8bbc4d5784c62446a0f9d83b95dd518534ab4581d3a43a14146b17d0035ecc79c151

                    • \Users\Admin\AppData\Local\Temp\csrss\tor\Tor\zlib1.dll

                      Filesize

                      135KB

                      MD5

                      f08b1f044c68770c190daf1eb1f3157e

                      SHA1

                      f94103a542459d60434f9ddb6b5f45b11eae2923

                      SHA256

                      1d0278386f8922bdf4808861e6e901541ad23cc6337bb022c78dc05915202f27

                      SHA512

                      0667416a7515cd845e96d2ad26ca676cffd2d1c9f0449ff05455e8cf6a7ab595d3f972785d051f45332c04f1c0b576726f645e3669122608a4f374e984ba161c

                    • \Users\Admin\AppData\Local\Temp\dbghelp.dll

                      Filesize

                      1.5MB

                      MD5

                      f0616fa8bc54ece07e3107057f74e4db

                      SHA1

                      b33995c4f9a004b7d806c4bb36040ee844781fca

                      SHA256

                      6e58fcf4d763022b1f79a3c448eb2ebd8ad1c15df3acf58416893f1cbc699026

                      SHA512

                      15242e3f5652d7f1d0e31cebadfe2f238ca3222f0e927eb7feb644ab2b3d33132cf2316ee5089324f20f72f1650ad5bb8dd82b96518386ce5b319fb5ceb8313c

                    • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                      Filesize

                      5.3MB

                      MD5

                      1afff8d5352aecef2ecd47ffa02d7f7d

                      SHA1

                      8b115b84efdb3a1b87f750d35822b2609e665bef

                      SHA256

                      c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

                      SHA512

                      e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

                    • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                      Filesize

                      5.3MB

                      MD5

                      1afff8d5352aecef2ecd47ffa02d7f7d

                      SHA1

                      8b115b84efdb3a1b87f750d35822b2609e665bef

                      SHA256

                      c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

                      SHA512

                      e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

                    • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                      Filesize

                      5.3MB

                      MD5

                      1afff8d5352aecef2ecd47ffa02d7f7d

                      SHA1

                      8b115b84efdb3a1b87f750d35822b2609e665bef

                      SHA256

                      c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

                      SHA512

                      e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

                    • \Users\Admin\AppData\Local\Temp\osloader.exe

                      Filesize

                      591KB

                      MD5

                      e2f68dc7fbd6e0bf031ca3809a739346

                      SHA1

                      9c35494898e65c8a62887f28e04c0359ab6f63f5

                      SHA256

                      b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

                      SHA512

                      26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

                    • \Users\Admin\AppData\Local\Temp\osloader.exe

                      Filesize

                      591KB

                      MD5

                      e2f68dc7fbd6e0bf031ca3809a739346

                      SHA1

                      9c35494898e65c8a62887f28e04c0359ab6f63f5

                      SHA256

                      b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

                      SHA512

                      26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

                    • \Users\Admin\AppData\Local\Temp\osloader.exe

                      Filesize

                      591KB

                      MD5

                      e2f68dc7fbd6e0bf031ca3809a739346

                      SHA1

                      9c35494898e65c8a62887f28e04c0359ab6f63f5

                      SHA256

                      b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

                      SHA512

                      26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

                    • \Users\Admin\AppData\Local\Temp\symsrv.dll

                      Filesize

                      163KB

                      MD5

                      5c399d34d8dc01741269ff1f1aca7554

                      SHA1

                      e0ceed500d3cef5558f3f55d33ba9c3a709e8f55

                      SHA256

                      e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f

                      SHA512

                      8ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d

                    • \Users\Admin\Pictures\HreqSdh6VhG48pJHh4GPRWlS.exe

                      Filesize

                      208KB

                      MD5

                      cf0f80bd47110c14d7666e49a0b4c82d

                      SHA1

                      6aabf5c0bef973edf1ce911cb14e3a40ba817297

                      SHA256

                      846a1f9545cb52bf3a46d1168889575a32010047b04929721cc131c38a17d49a

                      SHA512

                      22ff200846d59f2a7594463b340212e8cad77bc6b23fe49473622bc870eb4f846a411b3b3607a55f1e19aaa6ccc3baf9680a49a49d80f29754a78128c13db72d

                    • \Users\Admin\Pictures\HreqSdh6VhG48pJHh4GPRWlS.exe

                      Filesize

                      208KB

                      MD5

                      cf0f80bd47110c14d7666e49a0b4c82d

                      SHA1

                      6aabf5c0bef973edf1ce911cb14e3a40ba817297

                      SHA256

                      846a1f9545cb52bf3a46d1168889575a32010047b04929721cc131c38a17d49a

                      SHA512

                      22ff200846d59f2a7594463b340212e8cad77bc6b23fe49473622bc870eb4f846a411b3b3607a55f1e19aaa6ccc3baf9680a49a49d80f29754a78128c13db72d

                    • \Users\Admin\Pictures\W0UfPsXgDFHMTNkOQI50WvUb.exe

                      Filesize

                      324KB

                      MD5

                      b27323c59498426807574a20824ac525

                      SHA1

                      bdee034558b4b105472e0b0c943460746910ace1

                      SHA256

                      df5397b08e1b72fbf42290033aa11934e895488c93b76e608542fbb49d2e0f98

                      SHA512

                      c438cf185107f8d69139750415397cb674e0dede0ca72352a738425996d7ca6fa1ded38f1711d29fe4cd7a3056b69397f6b5397f842c29ed50aee3897f5f77f1

                    • \Users\Admin\Pictures\wrLCFSaepO1iGOkaIn46C9up.exe

                      Filesize

                      4.1MB

                      MD5

                      66cafebb8b367bb034fff5afa08513cf

                      SHA1

                      202c84c0195d0814194d7c2ac25959fa7a17065a

                      SHA256

                      b5ed4f06f99470e6fafe86a79f86d8b205f16ca686cb9d5c0853e115e11c36ff

                      SHA512

                      7f3b4c9d2a1acb6456db281782de0f18d10954764599b75d2e889117d9886e77f9c0e4dc0597d5d653d5031c2f2f5435e30435e9f63b2aa37b8f9c8affd963f4

                    • \Users\Admin\Pictures\wrLCFSaepO1iGOkaIn46C9up.exe

                      Filesize

                      4.1MB

                      MD5

                      66cafebb8b367bb034fff5afa08513cf

                      SHA1

                      202c84c0195d0814194d7c2ac25959fa7a17065a

                      SHA256

                      b5ed4f06f99470e6fafe86a79f86d8b205f16ca686cb9d5c0853e115e11c36ff

                      SHA512

                      7f3b4c9d2a1acb6456db281782de0f18d10954764599b75d2e889117d9886e77f9c0e4dc0597d5d653d5031c2f2f5435e30435e9f63b2aa37b8f9c8affd963f4

                    • \Windows\rss\csrss.exe

                      Filesize

                      4.1MB

                      MD5

                      66cafebb8b367bb034fff5afa08513cf

                      SHA1

                      202c84c0195d0814194d7c2ac25959fa7a17065a

                      SHA256

                      b5ed4f06f99470e6fafe86a79f86d8b205f16ca686cb9d5c0853e115e11c36ff

                      SHA512

                      7f3b4c9d2a1acb6456db281782de0f18d10954764599b75d2e889117d9886e77f9c0e4dc0597d5d653d5031c2f2f5435e30435e9f63b2aa37b8f9c8affd963f4

                    • \Windows\rss\csrss.exe

                      Filesize

                      4.1MB

                      MD5

                      66cafebb8b367bb034fff5afa08513cf

                      SHA1

                      202c84c0195d0814194d7c2ac25959fa7a17065a

                      SHA256

                      b5ed4f06f99470e6fafe86a79f86d8b205f16ca686cb9d5c0853e115e11c36ff

                      SHA512

                      7f3b4c9d2a1acb6456db281782de0f18d10954764599b75d2e889117d9886e77f9c0e4dc0597d5d653d5031c2f2f5435e30435e9f63b2aa37b8f9c8affd963f4

                    • memory/988-313-0x00000000026B0000-0x0000000002AA8000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/988-243-0x00000000026B0000-0x0000000002AA8000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/988-318-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/988-391-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/1188-307-0x0000000000400000-0x00000000007BD000-memory.dmp

                      Filesize

                      3.7MB

                    • memory/1188-151-0x00000000001B0000-0x00000000001D6000-memory.dmp

                      Filesize

                      152KB

                    • memory/1188-299-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                      Filesize

                      972KB

                    • memory/1188-484-0x00000000002B0000-0x00000000003B0000-memory.dmp

                      Filesize

                      1024KB

                    • memory/1188-483-0x0000000000400000-0x00000000007BD000-memory.dmp

                      Filesize

                      3.7MB

                    • memory/1188-152-0x0000000000400000-0x00000000007BD000-memory.dmp

                      Filesize

                      3.7MB

                    • memory/1188-150-0x00000000002B0000-0x00000000003B0000-memory.dmp

                      Filesize

                      1024KB

                    • memory/1360-513-0x0000000002160000-0x0000000002161000-memory.dmp

                      Filesize

                      4KB

                    • memory/1444-10-0x0000000000400000-0x0000000000408000-memory.dmp

                      Filesize

                      32KB

                    • memory/1444-12-0x0000000000400000-0x0000000000408000-memory.dmp

                      Filesize

                      32KB

                    • memory/1444-17-0x00000000007E0000-0x0000000000820000-memory.dmp

                      Filesize

                      256KB

                    • memory/1444-5-0x0000000000400000-0x0000000000408000-memory.dmp

                      Filesize

                      32KB

                    • memory/1444-13-0x0000000072980000-0x000000007306E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/1444-311-0x0000000072980000-0x000000007306E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/1444-446-0x00000000007E0000-0x0000000000820000-memory.dmp

                      Filesize

                      256KB

                    • memory/1460-232-0x0000000002560000-0x0000000002958000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/1460-222-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/1460-146-0x0000000002560000-0x0000000002958000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/1460-144-0x0000000002560000-0x0000000002958000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/1460-147-0x0000000002960000-0x000000000324B000-memory.dmp

                      Filesize

                      8.9MB

                    • memory/1460-149-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/1460-231-0x0000000002960000-0x000000000324B000-memory.dmp

                      Filesize

                      8.9MB

                    • memory/1472-782-0x0000000000400000-0x0000000000C25000-memory.dmp

                      Filesize

                      8.1MB

                    • memory/1472-749-0x0000000000400000-0x0000000000C25000-memory.dmp

                      Filesize

                      8.1MB

                    • memory/1992-656-0x0000000000400000-0x00000000008DF000-memory.dmp

                      Filesize

                      4.9MB

                    • memory/1992-608-0x0000000000400000-0x00000000008DF000-memory.dmp

                      Filesize

                      4.9MB

                    • memory/2280-14-0x00000000024F0000-0x0000000002530000-memory.dmp

                      Filesize

                      256KB

                    • memory/2280-145-0x0000000073070000-0x000000007361B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2280-15-0x0000000073070000-0x000000007361B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2280-16-0x0000000073070000-0x000000007361B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2280-18-0x00000000024F0000-0x0000000002530000-memory.dmp

                      Filesize

                      256KB

                    • memory/2408-746-0x000000002D520000-0x000000002DD45000-memory.dmp

                      Filesize

                      8.1MB

                    • memory/2408-657-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2408-573-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2408-572-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2408-574-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2408-604-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2408-571-0x0000000002650000-0x0000000002A48000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/2408-507-0x0000000002650000-0x0000000002A48000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/2408-518-0x0000000002650000-0x0000000002A48000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/2408-694-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2408-567-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2408-519-0x0000000002A50000-0x000000000333B000-memory.dmp

                      Filesize

                      8.9MB

                    • memory/2408-520-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2408-753-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2408-748-0x000000002D520000-0x000000002DD45000-memory.dmp

                      Filesize

                      8.1MB

                    • memory/2408-703-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2668-544-0x0000000140000000-0x00000001405E8000-memory.dmp

                      Filesize

                      5.9MB

                    • memory/2668-530-0x0000000140000000-0x00000001405E8000-memory.dmp

                      Filesize

                      5.9MB

                    • memory/2688-695-0x0000000000BD0000-0x000000000101E000-memory.dmp

                      Filesize

                      4.3MB

                    • memory/2688-644-0x0000000074290000-0x00000000742BA000-memory.dmp

                      Filesize

                      168KB

                    • memory/2688-691-0x00000000742C0000-0x0000000074382000-memory.dmp

                      Filesize

                      776KB

                    • memory/2688-647-0x0000000000BD0000-0x000000000101E000-memory.dmp

                      Filesize

                      4.3MB

                    • memory/2688-690-0x00000000738C0000-0x0000000073BC1000-memory.dmp

                      Filesize

                      3.0MB

                    • memory/2688-705-0x0000000000BD0000-0x000000000101E000-memory.dmp

                      Filesize

                      4.3MB

                    • memory/2688-689-0x0000000074F90000-0x0000000074FDD000-memory.dmp

                      Filesize

                      308KB

                    • memory/2688-688-0x00000000746F0000-0x0000000074790000-memory.dmp

                      Filesize

                      640KB

                    • memory/2688-643-0x00000000742C0000-0x0000000074382000-memory.dmp

                      Filesize

                      776KB

                    • memory/2688-646-0x00000000738C0000-0x0000000073BC1000-memory.dmp

                      Filesize

                      3.0MB

                    • memory/2688-687-0x0000000074FE0000-0x0000000074FFE000-memory.dmp

                      Filesize

                      120KB

                    • memory/2688-642-0x0000000074290000-0x00000000742BA000-memory.dmp

                      Filesize

                      168KB

                    • memory/2688-641-0x00000000745B0000-0x0000000074671000-memory.dmp

                      Filesize

                      772KB

                    • memory/2688-645-0x0000000000BD0000-0x000000000101E000-memory.dmp

                      Filesize

                      4.3MB

                    • memory/2688-685-0x0000000000BD0000-0x000000000101E000-memory.dmp

                      Filesize

                      4.3MB

                    • memory/2688-682-0x00000000745B0000-0x0000000074671000-memory.dmp

                      Filesize

                      772KB

                    • memory/2688-771-0x0000000000BD0000-0x000000000101E000-memory.dmp

                      Filesize

                      4.3MB

                    • memory/2820-9-0x00000000745D0000-0x0000000074CBE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2820-4-0x0000000000630000-0x000000000064A000-memory.dmp

                      Filesize

                      104KB

                    • memory/2820-3-0x0000000005770000-0x00000000058FE000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2820-2-0x0000000000FC0000-0x0000000001000000-memory.dmp

                      Filesize

                      256KB

                    • memory/2820-1-0x00000000010B0000-0x0000000001FD6000-memory.dmp

                      Filesize

                      15.1MB

                    • memory/2820-0-0x00000000745D0000-0x0000000074CBE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2952-752-0x0000000000400000-0x00000000008DF000-memory.dmp

                      Filesize

                      4.9MB

                    • memory/2952-693-0x0000000000400000-0x00000000008DF000-memory.dmp

                      Filesize

                      4.9MB

                    • memory/2952-655-0x0000000000400000-0x00000000008DF000-memory.dmp

                      Filesize

                      4.9MB