Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2024 06:15

General

  • Target

    latestrocki.exe

  • Size

    6.5MB

  • MD5

    0518d9c6db9a614769bf43fbff180167

  • SHA1

    928084a70bffb6eb474658dcf062d74f5ca84f68

  • SHA256

    6369f6e4a8398cccbbebef2ae7078834d3f92d499257a59b4f9142bd5b079057

  • SHA512

    a3a9ae62006133d5e6e7d74527732d6f245c7bfbb8770fba371e877c56b47b61fd5e809eac7e462013c811ab4e49c1162ce16eec7dd15db76530ea09c2a0cbf1

  • SSDEEP

    196608:21qELhrUIpNiSF4B3ri+e7UDV2BnIuaR:shRpNPcrrDVgnIH

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

stealc

C2

http://185.172.128.79

Attributes
  • url_path

    /3886d2276f6914c4.php

rc4.plain

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

fabookie

C2

http://app.alie3ksgaa.com/check/safe

Extracted

Family

djvu

C2

http://habrafa.com/test1/get.php

Attributes
  • extension

    .cdpo

  • offline_id

    Bn3q97hwLouKbhkQRNO4SeV07gjdEQVm8NKhg0t1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://habrafa.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-FCWSCsjEWS Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0844OSkw

rsa_pubkey.plain

Extracted

Family

risepro

C2

193.233.132.62:50500

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Fabookie payload 2 IoCs
  • Detect Vidar Stealer 3 IoCs
  • Detect ZGRat V1 2 IoCs
  • Detected Djvu ransomware 13 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Fabookie

    Fabookie is facebook account info stealer.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 10 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Windows security bypass 2 TTPs 7 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Modifies boot configuration data using bcdedit 14 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Executes dropped EXE 39 IoCs
  • Loads dropped DLL 49 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Suspicious use of SetThreadContext 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 21 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\latestrocki.exe
    "C:\Users\Admin\AppData\Local\Temp\latestrocki.exe"
    1⤵
      PID:2528
      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
        "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2716
        • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
          "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
          3⤵
          • Windows security bypass
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Adds Run key to start application
          • Checks for VirtualBox DLLs, possible anti-VM trick
          • Drops file in Windows directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2480
          • C:\Windows\system32\cmd.exe
            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1864
            • C:\Windows\system32\netsh.exe
              netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
              5⤵
              • Modifies Windows Firewall
              • Modifies data under HKEY_USERS
              PID:2472
          • C:\Windows\rss\csrss.exe
            C:\Windows\rss\csrss.exe
            4⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Manipulates WinMon driver.
            • Manipulates WinMonFS driver.
            • Drops file in Windows directory
            • Modifies system certificate store
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2872
            • C:\Windows\system32\schtasks.exe
              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
              5⤵
              • Creates scheduled task(s)
              PID:2632
            • C:\Windows\system32\schtasks.exe
              schtasks /delete /tn ScheduledUpdate /f
              5⤵
                PID:584
              • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies system certificate store
                PID:1916
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:3000
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2416
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:956
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:832
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2064
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1844
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2756
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1284
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -timeout 0
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2780
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1224
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2608
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:3012
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2888
              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                5⤵
                • Executes dropped EXE
                PID:2012
              • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                5⤵
                • Executes dropped EXE
                PID:2404
              • C:\Windows\system32\bcdedit.exe
                C:\Windows\Sysnative\bcdedit.exe /v
                5⤵
                • Modifies boot configuration data using bcdedit
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:2528
              • C:\Windows\system32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                5⤵
                • Creates scheduled task(s)
                PID:2928
              • C:\Windows\windefender.exe
                "C:\Windows\windefender.exe"
                5⤵
                • Executes dropped EXE
                PID:2708
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                  6⤵
                    PID:2156
                    • C:\Windows\SysWOW64\sc.exe
                      sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                      7⤵
                      • Launches sc.exe
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2768
          • C:\Users\Admin\AppData\Local\Temp\rty25.exe
            "C:\Users\Admin\AppData\Local\Temp\rty25.exe"
            2⤵
            • Executes dropped EXE
            • Modifies system certificate store
            PID:2860
          • C:\Users\Admin\AppData\Local\Temp\toolspub1.exe
            "C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"
            2⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            PID:2712
          • C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe
            "C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2676
            • C:\Users\Admin\AppData\Local\Temp\nsi453D.tmp
              C:\Users\Admin\AppData\Local\Temp\nsi453D.tmp
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:588
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nsi453D.tmp" & del "C:\ProgramData\*.dll"" & exit
                4⤵
                  PID:2448
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 5
                    5⤵
                    • Delays execution with timeout.exe
                    PID:2868
          • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
            C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2752
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2940
          • C:\Windows\system32\makecab.exe
            "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240120061538.log C:\Windows\Logs\CBS\CbsPersist_20240120061538.cab
            1⤵
            • Drops file in Windows directory
            PID:1268
          • C:\Windows\SysWOW64\chcp.com
            chcp 1251
            1⤵
              PID:2596
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
              1⤵
              • Creates scheduled task(s)
              PID:2304
            • C:\Users\Admin\AppData\Local\Temp\A41C.exe
              C:\Users\Admin\AppData\Local\Temp\A41C.exe
              1⤵
              • Executes dropped EXE
              • Checks SCSI registry key(s)
              • Suspicious behavior: MapViewOfSection
              PID:2896
            • C:\Users\Admin\AppData\Local\Temp\BD86.exe
              C:\Users\Admin\AppData\Local\Temp\BD86.exe
              1⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              PID:1248
              • C:\Users\Admin\AppData\Local\Temp\BD86.exe
                C:\Users\Admin\AppData\Local\Temp\BD86.exe
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                • Modifies system certificate store
                PID:888
                • C:\Windows\SysWOW64\icacls.exe
                  icacls "C:\Users\Admin\AppData\Local\39bde40d-8da7-42bd-aeea-fef50408022d" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                  3⤵
                  • Modifies file permissions
                  PID:2864
                • C:\Users\Admin\AppData\Local\Temp\BD86.exe
                  "C:\Users\Admin\AppData\Local\Temp\BD86.exe" --Admin IsNotAutoStart IsNotTask
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  PID:1704
                  • C:\Users\Admin\AppData\Local\Temp\BD86.exe
                    "C:\Users\Admin\AppData\Local\Temp\BD86.exe" --Admin IsNotAutoStart IsNotTask
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:2804
                    • C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build2.exe
                      "C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build2.exe"
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:2984
                      • C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build2.exe
                        "C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build2.exe"
                        6⤵
                        • Executes dropped EXE
                        • Modifies system certificate store
                        PID:984
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 984 -s 1472
                          7⤵
                          • Loads dropped DLL
                          • Program crash
                          PID:1040
                    • C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build3.exe
                      "C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build3.exe"
                      5⤵
                        PID:1600
                        • C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build3.exe
                          "C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build3.exe"
                          6⤵
                          • Executes dropped EXE
                          PID:1736
                          • C:\Windows\SysWOW64\schtasks.exe
                            /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                            7⤵
                            • Creates scheduled task(s)
                            PID:3012
              • C:\Users\Admin\AppData\Local\Temp\D4ED.exe
                C:\Users\Admin\AppData\Local\Temp\D4ED.exe
                1⤵
                • Executes dropped EXE
                PID:1676
              • C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:1972
                • C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1404
                • C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2056
                • C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  2⤵
                  • Executes dropped EXE
                  PID:580
                • C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2700
                • C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:1600
                • C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1380
                • C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2852
                • C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  2⤵
                  • Executes dropped EXE
                  PID:572
                • C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1280
                • C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  C:\Users\Admin\AppData\Local\Temp\EAEE.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1644
              • C:\Users\Admin\AppData\Local\Temp\5E79.exe
                C:\Users\Admin\AppData\Local\Temp\5E79.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:2696
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  2⤵
                    PID:2112
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    2⤵
                      PID:2164
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      2⤵
                        PID:2492
                    • C:\Windows\windefender.exe
                      C:\Windows\windefender.exe
                      1⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:628
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {CBF64218-D11A-4DF7-8355-0E74B663B7D2} S-1-5-21-1268429524-3929314613-1992311491-1000:XBTLDBHN\Admin:Interactive:[1]
                      1⤵
                        PID:688
                        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:2824
                          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                            C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                            3⤵
                            • Executes dropped EXE
                            • Suspicious behavior: MapViewOfSection
                            PID:2712
                            • C:\Windows\SysWOW64\schtasks.exe
                              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                              4⤵
                              • Creates scheduled task(s)
                              PID:2476
                        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:1344
                          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                            C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                            3⤵
                            • Executes dropped EXE
                            PID:1788

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                        Filesize

                        1KB

                        MD5

                        e31a2a18a6a4690a4055dd16e5d940d9

                        SHA1

                        068b665c7ecad288aa47a5b49fca2bb835007529

                        SHA256

                        5864fe5f730abef927b53ccd842790a30a281b1aaca7f7311087947a960d5c62

                        SHA512

                        ad759fc658e9af123064040088394baffa5fb0ad02932879ddc91c93644740a5d86738008f224ab111cfaed17e6a93adbd2f5bf4902356fbb2d8d12940a835d4

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                        Filesize

                        410B

                        MD5

                        945744cb5097b07721fdf90833e935cc

                        SHA1

                        b05b5855fa0034c196492f5c85e10c4c66736735

                        SHA256

                        1867f60479991d3e21a76a0873c34bf0e32ed1f04529ab3da637af78ab12185e

                        SHA512

                        73525b044d2a7cc736629117516947b98b2d47cdbc0e0c53482b79804e4930cf218f1eb4a6a681453ac1a9fd167e485ce623b73f7db086c2455801df216e170a

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        344B

                        MD5

                        bc9f8019b5e302ba02a58ba6d300e5c1

                        SHA1

                        c51e263f8db785d91ffe85370c26e5b9b02613ad

                        SHA256

                        b7d9c49df0d4fee2b749eb4e4b82e47a34618610883f3fbe1efb1148ae4b483b

                        SHA512

                        367b0ee582d1de26e8893f5450d2d85cad60fa0f82821138f67422d4bf5254398d5e4f789e41f1d802077be7bf9047ae99ed2a42b818c2c109448313959e40e2

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        344B

                        MD5

                        c4b02740262a25b6393d2d1f8270e325

                        SHA1

                        a0eb8695b9ec800ebfae79007b1cb6b639459204

                        SHA256

                        fa03c9cc87283dbf959befadd3e8898a59a8f9644e5dd59b624f3499546aff85

                        SHA512

                        4ab0e689a11edd16960ba30b485992fa2063c02c2913c46d96d368c781bfc50dbb1dbdac2e886eb2462d6e8671c3e2fe2b19780e13f569db230151521d0c9948

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        344B

                        MD5

                        acaafbbd6bc6c4b51b04ec9d3d25ed92

                        SHA1

                        89743da161cfd1af619f4af11404e88c5294da2b

                        SHA256

                        4bc3fdbeea5f316118124c5a657cf751f2d13e231bc588c2164b04f384e801b6

                        SHA512

                        689d11eb4ca95b3be733c1b9f0ae526f11ea74abb2c82be477a72b01fac32a30ac2732c8e021386eb33c120cf81c8a74a24d115e1bc28d5cba4e78f33f1749af

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        344B

                        MD5

                        da1451247939af869f4d8a3244d2bd03

                        SHA1

                        ec6e3b4bf55ab431105c5dd56f0ea7f3d250ed8e

                        SHA256

                        b77d95c853809334e571a1dffc784a741cfd03a67e7f799d7e7f50e4d23025f5

                        SHA512

                        85c06fdda80fd4f7b7e50ea960e94c554b1b94cc5908495c59536b11c8a1615b2b28a0d9421ac2e0a8d0bd856d6898544d1352a826f0fbc606ecfc9c1d89c427

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                        Filesize

                        392B

                        MD5

                        1dc24de042b099b2273590be2f9cedf1

                        SHA1

                        572f1528a943b88966dab18326849deb6a6a6768

                        SHA256

                        f06c1d2d3d4479aa0adc1d66b3e0b698c07ca1093d593a3a464999194ebf4b9f

                        SHA512

                        8b81a8e3f6b565e76ee3e06efe2506e670f5c96465802dd3e752fb5f3bfe740ae7f88bf119777e50a3638d60d68c42a110e85a6b49dbcc72dd8d3b44c56ea036

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                        Filesize

                        242B

                        MD5

                        69bfef1bb3605e5bd0b3545cbd16b324

                        SHA1

                        d694aac520cbdf7597bf277fdeeafffb9f9be106

                        SHA256

                        024d82fc97309007ba63c4fcb3dc37547480ebaf1693770ed38623b75c641777

                        SHA512

                        6474ba719638adf8ecac804cc8d75932a5701dd6dc384955effcccc1f2b10c700d556bc20464c6d835330bc8776dc35355b36fbc2f8d9401cfb81832ee048d8a

                      • C:\Users\Admin\AppData\Local\39bde40d-8da7-42bd-aeea-fef50408022d\BD86.exe

                        Filesize

                        221KB

                        MD5

                        c31c3fc6bc03444d91357d8c5d19dcae

                        SHA1

                        4687c72b5d18ba3814b99288fc0eef268c2062e7

                        SHA256

                        56ce34eecf44380fff927676814edc5d72c2ae24511b98e0d0f6b019c6d96b5a

                        SHA512

                        58bd1265318b964e3ef2b7a2ccdc2080084e5291bd5c6ee91f4a3afb37bdde2adcb1d8d5b9c9d8e24511f248808017459fae835393dd360fde62d597586d0139

                      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                        Filesize

                        54KB

                        MD5

                        e147b3f61b9169454add3cdcd7be60f8

                        SHA1

                        5960e8f3d080d50c77cdd6baf20199cc61e98b80

                        SHA256

                        eae3fbd826491921e7035bac6dfed716683d25b5f6c8ab7feecef8240a1e4e4e

                        SHA512

                        6ea6de36983137636d7015adc841b595f62d7c2dbcddc86378fb37d1080e962d82d5e52516198aca4fdc84100cc4c684d9ea69731c5e5750c08c87daec8aaf1b

                      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                        Filesize

                        73KB

                        MD5

                        7d970de164e32779860adffa61246032

                        SHA1

                        1fc178dda3336133121a0181bada8d5a04231f7d

                        SHA256

                        cca893cd1dc62d5c8b3dd2d8750b71f4637dcfe4f199b646cc2e8ea82ea6aec2

                        SHA512

                        6793cf9a1b357e605c5c6b3533807323212205b0b7e8a8a515e5a7ead46c3bdb6febd59fe7477527706249af9c47b405bafb6aab0e3bfa52059fc4be9cbcfa88

                      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                        Filesize

                        271KB

                        MD5

                        1a3fe0fddbef939b4b335bfa376a0a4d

                        SHA1

                        3bbe562ada3a67a0c7f82f502638927573f92255

                        SHA256

                        d558320e1a18b4b34b7cf7f9c185e7781d5ef4b87c11fd95611aa1c70a1bcef8

                        SHA512

                        813422d81e2745c6068e5bcb1114217091bdba940ab9518c7649385e52dbb8f6a74c18cbf5119cfc2fe0b49d4ddf990cace0729475cc22b678bf616ca7d0c78c

                      • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                        Filesize

                        211KB

                        MD5

                        8c8ef958678c9862a03985f2214c2a4f

                        SHA1

                        ad0bdc4a219a70a02d98b23687bd352271dda7b9

                        SHA256

                        b1387fecc8b84654eb44daf5089298da8f180bdca61d520d946bbed5df76e8aa

                        SHA512

                        3452252ab86d628873a2acc2b992d96ef2422af31136549f329d1573bc70169b74af6e3caa25a1e64dfb769e8dd66dd170968ce7a3b57228055b8e0ed7d2f8be

                      • C:\Users\Admin\AppData\Local\Temp\A41C.exe

                        Filesize

                        39KB

                        MD5

                        f7fd0353d278c71dfcc1fa3a0e589a7e

                        SHA1

                        127e62008c3dbbb17e37710d6aae7492279d6f49

                        SHA256

                        30fc1516238d244bfb849f4cdf568adfdd06463cf8c026e1515739d818d75cb8

                        SHA512

                        2e697c3dd55339875e644bd00f9d11ff5e4acf544c17f65f68a2111c9f7d0cf43c00b6a78799ef82a6a3dfab143a8b25ac8df4e1aee6017ff8f0ccefbcad72ce

                      • C:\Users\Admin\AppData\Local\Temp\A41C.exe

                        Filesize

                        49KB

                        MD5

                        5cdee2bcac81e93d2c46b08a692c23e0

                        SHA1

                        eec982a7dfb0cf1bb974ad318f18882422beaeb0

                        SHA256

                        880d770a8b423d4fe43025cb72997eb5955e91299e876b4ab8e4545965a2902b

                        SHA512

                        164220a5326815f0900bfdbb661d03c8adbb5440513142935b052ada1b3909c7247a1c53841fa934dcc7530936c253d310b923289efddd3d674c09f308e9a798

                      • C:\Users\Admin\AppData\Local\Temp\BD86.exe

                        Filesize

                        178KB

                        MD5

                        0242ede093b0ee8530678a18eebe85a3

                        SHA1

                        dba34bc661bc8f3b2b09dc3fe271598508f1a3fb

                        SHA256

                        3bbeedf4c945e313c31f42d4516a81b2e9deb9f5a93625d67ff14fca3beb293e

                        SHA512

                        befbfa1da9e5e3b77548b5b762a383a7234adad5aa9fb05cdeb732a181b804db90574b9dfe52f7140ccac4ddbbeabff5db7b96e3d218381bf0234e53cc0e4708

                      • C:\Users\Admin\AppData\Local\Temp\BD86.exe

                        Filesize

                        222KB

                        MD5

                        fff46bc537f30c2d67734515e2ab6a12

                        SHA1

                        a032c8d16ce85ec37d295d3d83a43984872eb87a

                        SHA256

                        d109b598568a7bca1584ecc54ad41e42f5963512bdb58f9abd7e17565aaeb736

                        SHA512

                        9c664122414150451afd99cb4a941a2300eafe39ed883e53a29350ea308cb6a9ef6a9a950a26392e6ba399367b3d6cdb8dbcacb920b3d47f83d1d2156b759ffe

                      • C:\Users\Admin\AppData\Local\Temp\BD86.exe

                        Filesize

                        149KB

                        MD5

                        a76bac50ced9a3a8858d579caf92e46a

                        SHA1

                        701b1a84e07824d1be0a49e6cb915a7349e254f7

                        SHA256

                        ddc378af7b9b5b4df621b6e4b363ef843b3b94da48cc7837d320c35a561bd64c

                        SHA512

                        75e29bdec5e53bbfc4116b80e8613663e3fd468d4da6ff25d9a17ba876a1b658bd1d61106e4cc28230749f4391eda3f16ad5cfb2d920bc707cb274002fb27efa

                      • C:\Users\Admin\AppData\Local\Temp\BD86.exe

                        Filesize

                        84KB

                        MD5

                        6cfb9a5af72c695621556494523cadbd

                        SHA1

                        e3b9fab19a37a0efc6990a4bdd2b6bfd5db28917

                        SHA256

                        649ccb5880ac3b8451df48e95520943f954d81595457b16cf3aa236e426eeb5f

                        SHA512

                        e8654eae04e828deb0b7402f369b5822746e20be9b1f8fbd09758bea38781927052ad954faf5b1459fb015da36470d9116ebfedeb51b787c0709c51e0266b6c0

                      • C:\Users\Admin\AppData\Local\Temp\BD86.exe

                        Filesize

                        18KB

                        MD5

                        74a78d6a29ca26b8b97b948e8484d481

                        SHA1

                        51f704688c965ad757fa338d7f6d3c0ef043c39d

                        SHA256

                        64831b51f8f715945234e3d577372f984377e0f2503c235a12fc385bca0eda15

                        SHA512

                        6d918ea9f9350fe4f8e89fa71e40ab99c6b4199d6b77584a9be3eedcd60ab8f99c5edbfea4e60dd85d5466f4d058a1eb91c63a9e53e7f2e0fc75d10b301ac1e7

                      • C:\Users\Admin\AppData\Local\Temp\BD86.exe

                        Filesize

                        25KB

                        MD5

                        789531a86149a875efea569e723b592f

                        SHA1

                        860da5e5a8cfaea449d497f4057d9019a5cd0b07

                        SHA256

                        e70240f4ce05643f9ca4e89b9c6c01109c206b8cb3182b55399a807db68c0728

                        SHA512

                        fc0d717c07d162cc81b330cb5aa36b5a83b88b3818777e8ba6c612938e27e480dc67bf858f54ba6829c4f4b8f9533be6079b097fc2228c135d50016d30fb180b

                      • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe

                        Filesize

                        71KB

                        MD5

                        42affe8aff1029d15614468ad410c987

                        SHA1

                        806dbb3e2e7e8ca98e32461031378872dd29ac6b

                        SHA256

                        96c05043dc15f3d084a5b26dcc05608333a67d8af2c4a91fdba625673ad3cfcf

                        SHA512

                        6311059fad5e2fa99244df61cefbb08ceb8793045819dc4d69630a066dfb4011e6538e0ffc261033b3c85b5bb18052b506ec4876e0549aa8801569ba22253d69

                      • C:\Users\Admin\AppData\Local\Temp\Cab480A.tmp

                        Filesize

                        56KB

                        MD5

                        5a3a361ff0d108216ea07973dd080b0b

                        SHA1

                        8c612c53306241318dc48577500942d37d351f94

                        SHA256

                        105baaeb65fa0ba450f55621e5a60068a80ec87f143a640530317d0db6174798

                        SHA512

                        b15cfd2fca31c6a0576f9da22d5b79b78b64fd91cda9070900bb04535e0a4fbbc9b2c53d2cd8a6bcc660930d1a36a252c31cdcab9ae61a5f6e82dc2bea95e7b2

                      • C:\Users\Admin\AppData\Local\Temp\D4ED.exe

                        Filesize

                        108KB

                        MD5

                        d565143e66798994cffbd5cafb4e481b

                        SHA1

                        e293bb1d4345b8344491cefca423d12b77f0b240

                        SHA256

                        010dc2a897f3caa663c58177b87ec466173908ea457d9acb629bbe243b7c3169

                        SHA512

                        88b39724960ba0dde02dff9be665177219f17d85c15631660650d0cd27a305d4b18beff94eb33f27f16ab32ab07ccabd3b1c45894eb60ec31459bac412b117a2

                      • C:\Users\Admin\AppData\Local\Temp\D4ED.exe

                        Filesize

                        146KB

                        MD5

                        ac8d5197dd35d0566c076b7ee07213be

                        SHA1

                        49e8b98ae2ced200a8b45f1e17e9abb2fc404f22

                        SHA256

                        f76ec1f31a11f8012e11206366f1ffd31bd223e6ffcadb56ad9604b8918f1c6e

                        SHA512

                        d121e61456102a4a33f6b5aa31ee89b9171b575efde6e3470837a961847689ec43d3f3e941d7c3d77456187ab8a7e215141f44247395263182fce8f5e25ddd89

                      • C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe

                        Filesize

                        99KB

                        MD5

                        eb34799b7abf687438ccfca3369f2fed

                        SHA1

                        8f87b592598b164f243ac3cb96a6865ba7abf745

                        SHA256

                        5827cd343cc86fd5723668b242a839ca2dc627a66bd921e0a62c3fc15c68f38e

                        SHA512

                        4344d01173ea58e5081f0ffecb10c6c44b78f31a4e5641d860aec89105a9af180d30fcfa8fe793e68d524f4c4c85c597a8e97279980a1984b47bbee0c98c4539

                      • C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe

                        Filesize

                        223KB

                        MD5

                        d441912e4cb709d202c227c31c4c1163

                        SHA1

                        dd0cc67dc2cd2cdc175c16d1cc74825772ae883d

                        SHA256

                        28f95229475e8063952fd512deb56cb4376c3ac804cbe242d1e625d9ff14f1db

                        SHA512

                        703c70030654af4c3b4ed009b2bbe250d811da7c22bf076879634739505b7cf8a371a59f183b0e5f6c18b7da1a526afc05d3aa4b7bd12c8d0f2ea9840f335783

                      • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

                        Filesize

                        340KB

                        MD5

                        3f3be193c393c8aacbc5f5c3ec95447e

                        SHA1

                        6961d31ffaf20c339d4e36f8f4d74d8ca7e3cec0

                        SHA256

                        7beeb71894cadd566845bcd7caebeab0cd440f6e192a1de95f210108883d9c7f

                        SHA512

                        1cfb26840185a3a70c97b2c570c9ab80b1908349aced40f55e99abe1f9830d26e16f5dcc0dc757166c0ff49efc4d345f539807b8274d08cde5ce631b56b99928

                      • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

                        Filesize

                        116KB

                        MD5

                        e9dbfea520ffec43c43b979383ff9f8d

                        SHA1

                        714835d67329e75a508167361fb0b3753be345d3

                        SHA256

                        78abad1d49b6bac60559519e5ae5e4e09263f7700c595de0da0cd312645077a9

                        SHA512

                        152e118ad3dbf9b3693370d87cb02f36d64c60b41fc2c961488e86229479b000d27a4c365145a0c0653bbebfe1ddb745c3c5f02ac3c66a7f6cfa9471874a5025

                      • C:\Users\Admin\AppData\Local\Temp\Tar48D8.tmp

                        Filesize

                        171KB

                        MD5

                        9c0c641c06238516f27941aa1166d427

                        SHA1

                        64cd549fb8cf014fcd9312aa7a5b023847b6c977

                        SHA256

                        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                        SHA512

                        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                        Filesize

                        133KB

                        MD5

                        56b06701e253181e2b207437651d4a3a

                        SHA1

                        86beb17b81c720413b2107925e06bfb0783eb08a

                        SHA256

                        0ecc4dfc36b054d290babdd5bdda7cfd4c8beac533c137c47156d346ebea17a7

                        SHA512

                        03600a5ac2d6a50266fc0604f913f4a2d476e0c974a2ba1731c97505ffbc02cd10fd734515209ba8f1f52e5018b0854338a66c9dfa13e2bd351ae01a3f475547

                      • C:\Users\Admin\AppData\Local\Temp\nsi453D.tmp

                        Filesize

                        196KB

                        MD5

                        efa7a8c48ff1e82c0e0cbac946e021e1

                        SHA1

                        631db6e0effad3dd5d0b8c1b76caeb6257e28682

                        SHA256

                        81544d768e7096b6260e74c7d64b9dd0ebad19530ede077d801c386ffac4a21a

                        SHA512

                        50070237c45e807923b9a9e706fb4f48cbe5fb67a5bba71f140cd2ec9261267eb6b72cbbc773073b454b241e2864bd4ddc0c8851c57b29c210162d1e2a49e91a

                      • C:\Users\Admin\AppData\Local\Temp\nsi453D.tmp

                        Filesize

                        238KB

                        MD5

                        7af1a7f0c5d750567bb6c9db170ad76c

                        SHA1

                        756389a0e84646853c77c496c1e5144e83cfd280

                        SHA256

                        0523d96352c2028dd22fe5591db75e08c6d8ad76afd0baf2c0b5ce04ae850439

                        SHA512

                        2095bc5ab45ab4351be4dec9243cf242eab15667c46a4070aa9ec35aba6b8d74c0367153f430d5f4eb40c3e0d6f6a2cc2a68cac06d9c5384a1ccb41f8d232756

                      • C:\Users\Admin\AppData\Local\Temp\nsi453D.tmp

                        Filesize

                        223KB

                        MD5

                        a09a0e0c28718628b75487e8bb670ffe

                        SHA1

                        dafaf1ebfb3ff95e0ec9dd08709aaeca770a9048

                        SHA256

                        baaf0767ead10a85f6ff1a2f80d6dcdcf80c565325b8bdc242592911a34a7ec0

                        SHA512

                        9d5f6d27579bd91877cdafd022f8b6102872229648510be0aa6e696f4f175f5bcbf45109ed22fe2d90f9fbf077f4c40b00f395242caadb7e9ac976b1c129973e

                      • C:\Users\Admin\AppData\Local\Temp\osloader.exe

                        Filesize

                        319KB

                        MD5

                        5ba4cd253bae89a7d50aa8edfcbaccba

                        SHA1

                        1817e012776273d220e4d2fd2be1a5612e84d155

                        SHA256

                        ab1ee990adcd621798bc1687c83d820c2800e4029a463ef1eb08ff88fd7c3c65

                        SHA512

                        a32a40c6232f29ebcbb24c820c11daf42bea88d7ae613706611aaa35c3742b9b44150b4fcb2b6be163624938c7a0ba546de84db4ca940159ea4ac2ed4f506a79

                      • C:\Users\Admin\AppData\Local\Temp\rty25.exe

                        Filesize

                        15KB

                        MD5

                        2f57777fea07eccd4abaab153e1ead02

                        SHA1

                        7699d95f0e88836c4f0bbf1f27f86d4fb9955452

                        SHA256

                        2079d2c488b9b9fe4a10b1e0facd5a4a3729ae0baa55d92f40e5fe23bd8baadb

                        SHA512

                        0ec910aa98ed97dd3a895926eac6d7cb6888e6538a35b13097ef2dc2565bec72dfffbb9e88f601b26b16d2ca232f67485243ffbe62d181ea4579aee82c82b112

                      • C:\Users\Admin\AppData\Local\Temp\toolspub1.exe

                        Filesize

                        272KB

                        MD5

                        43c66bb7924057abaf91e8ac6cc54072

                        SHA1

                        d05479ac2b8016f9435a75c5ec9506ff42b56563

                        SHA256

                        35852b3d65c820d9d95c4b5105b5f8ace19a951932111c8b6929b0651591288c

                        SHA512

                        69b9b5d98e2d098cd48c645bd0dab4dbeadac1614a9e3e373c03c4c171a676188a2874524b2231404b18c742d144d1f4f7722f44daeb4da733eafd42c17d1f62

                      • C:\Users\Admin\AppData\Local\Temp\toolspub1.exe

                        Filesize

                        154KB

                        MD5

                        98f376d0ed10defb21bba9bd337af15c

                        SHA1

                        2b62605849c714cfefc2b8b0cd430bc9ff5cd38a

                        SHA256

                        819752d00232816c88a69e88530ae87e69eac52a7bd33920e421c998bf255264

                        SHA512

                        54ab5e682908259447bc0c3d116c8c104aa45f837edca55dfe2d10d1a24ba4515f17407316734956cd72d21b84abdba961ad82f399601f0d256ad70f8f40d67b

                      • C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build2.exe

                        Filesize

                        226KB

                        MD5

                        a48ecbec3e4a6aeecda7f9ca54b5f195

                        SHA1

                        6f1032b536542de51b2a69418c46892753665403

                        SHA256

                        ede93338b0676fac72bbff8be1a90900f9b4762055abe699519d5a163c43740d

                        SHA512

                        cfedfa9725c51a054a4f538c33da0b10ddfc0a595a1b846734ec8782f23bd63921119d049351f5ba9d210be4fe734af5aa98c00810e1fc883706a60bf09ded65

                      • C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build2.exe

                        Filesize

                        194KB

                        MD5

                        fabb9d8b71a30a9fbd380208851f3672

                        SHA1

                        5d71224663589173bba59641f46c9f17422fd937

                        SHA256

                        eab4f1b17f202fb4c29af2a572caf0c087da63e3268a6c394d80bed1e333b81d

                        SHA512

                        2ed9df1473ef38fc0750c67d510d2792ace50dced98131588976c9dadbd0e2a1253636d8b687baa4788b70d47af883a7ed54a05f50a3ba61eb1f2ef772533742

                      • C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build2.exe

                        Filesize

                        82KB

                        MD5

                        86a7a5f25a656b29662235e00e0ed445

                        SHA1

                        9dab8da79bf1c393395c7179c4efe934c294f335

                        SHA256

                        a142e896cab350c05587093b356256e32df445ff19aa2d684bd319d6e9184432

                        SHA512

                        3e1e2043a3eaff24c1ad37f4578a13ff3b2746d921e5fc8237a6fead3b28d290463d3afd45e79f8d145f2d39015a45cbfea5616c8f21c9053d90fe75be78eda0

                      • C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build2.exe

                        Filesize

                        119KB

                        MD5

                        34b3f1020aefd334370707eab741aede

                        SHA1

                        5a49ae20e427403a2d86dc8eb187d8f730726fe3

                        SHA256

                        24a1e711280df35108606316ff7547841875209df5e0aaede829714e0bc644b7

                        SHA512

                        eb36878b8234ebd114539ac4d88ec5d93efc9cb428f31e395defcbaa39a169538bb2244f05023d4115eb05559b5db3bbb5212b7a0fff9fbdf55132b88150224b

                      • C:\Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build3.exe

                        Filesize

                        41KB

                        MD5

                        a77373195d6e83ac13ce87d72eb01e1d

                        SHA1

                        416389daeadbb7fce58c5384070edb86856aad8f

                        SHA256

                        983da97ba5d8b04d46aec6a83f0e7d1dcbc14ad8f1f26afbffeda226875bbaeb

                        SHA512

                        dc18461226a73fb0db6f66cace010b69e66b7519a6413be8fade38d9c0b99c507c31ba2a3f4d924384ee941684cb46027c1660db703527abccf34bac7174c06b

                      • C:\Users\Admin\AppData\Roaming\Temp\Task.bat

                        Filesize

                        128B

                        MD5

                        11bb3db51f701d4e42d3287f71a6a43e

                        SHA1

                        63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                        SHA256

                        6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                        SHA512

                        907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

                      • C:\Windows\rss\csrss.exe

                        Filesize

                        242KB

                        MD5

                        3495674efea726c41d4bb4d3d9d0bade

                        SHA1

                        e7defa64bc161e6587c84282161cd20900270336

                        SHA256

                        2a0113ff06def13831ae4ca863285655df03339e06026d41482d11364b660b2f

                        SHA512

                        76f635368b8766411aeef037017237f7b516a6338503fecb46918b8785b603a8fd06d256a8838dacfa8c9592906ed335f17950690688d5a713b52fae9476efd6

                      • C:\Windows\rss\csrss.exe

                        Filesize

                        383KB

                        MD5

                        0a72d5a40212d2a40780af837d6052e7

                        SHA1

                        1a670028eab7bcfd8ef3ed677c5c01899f478a91

                        SHA256

                        d1a56c417dca9c8501a1e6f6d47351e3cd78b4e62038b13aeffdb7931abfeb06

                        SHA512

                        0a95959062cacfe34f323070cc29e8f6bf8847ff7ec0211efc53e054dd507b47878367ee7ade003461cfc8ba9d98cac070b119f4c64061f3eaf0bc6db583cf3f

                      • \ProgramData\mozglue.dll

                        Filesize

                        53KB

                        MD5

                        342b265ebb7371d82c889d108bc75794

                        SHA1

                        56d024d6f0c6cba5cd2fd0e468a7054cc5ef73b3

                        SHA256

                        3573509f187145905c67851e9ae4fd3f9b5699810031d3feef7f904bf62af1f5

                        SHA512

                        e3ad7217ae728470f7b92addc8cfbd5d51322ab59d997f0f557809be13df5f71c5a879b298b4487bc2d57fc4aa17cac6149115cbc15368bb274d450ecfac8a5f

                      • \ProgramData\nss3.dll

                        Filesize

                        49KB

                        MD5

                        709dd6aef34c6acc3bb862488c378a8b

                        SHA1

                        ee7a39404dc47c7f0d3b283c170bc13d3dc75364

                        SHA256

                        edca95c4f4c991aa5922ab5647bee89584b0d9f16e4d1e260d0f7468df7c53e9

                        SHA512

                        971a9de46c64c4c9c523fa6eb7b2466b748a6d40f81b20ee517dd46cc6941ca141c74fd8a4b63dd0bf946d52cdb698ec96d7f3d96c19c9dc491f623eab013a57

                      • \Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                        Filesize

                        68KB

                        MD5

                        008023555d4dc578465fd981b0f51110

                        SHA1

                        5ef75d2406bf67917abac68986eef37287bf4cc0

                        SHA256

                        d7725b84fa91b81f6cc3bff4f605547f0ace62848bf0982ba4c6d0c06bc519f5

                        SHA512

                        111f63962956c45028a3b6c41431491d6b83e2dec608acee60b5325e577371709ac3404d7960b9fcc906c079d5d07b55a5a4560c0f423e12e0759cdfec5040fd

                      • \Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                        Filesize

                        370KB

                        MD5

                        bf1f4bdfae7fde93a0794597a720ed84

                        SHA1

                        f36adc13744fecd2343cb9be6a426badbdde62ab

                        SHA256

                        409da3c8df03e0fe50f4b9ae5cafef7dfefea35bc5dc6547681bf6787d3a0f1a

                        SHA512

                        d1f8984057e336fa7a330ecad1c7587dde84fbdbfb337e307cdadcfb7e83d29041c69695b4dbf0eb9f85617a4e40ad75a17fc95641d3ac14a4697ee3de6c6469

                      • \Users\Admin\AppData\Local\Temp\BD86.exe

                        Filesize

                        183KB

                        MD5

                        1d6e2961e4b296f189c0327c33a199d4

                        SHA1

                        e0459ceaef4dbc8c2d3cb378036434c273f064c6

                        SHA256

                        63f3e8ae1b8071e5dd4e4f3ab7a83c9dd9d24813f30b0486588b0967ddcc3604

                        SHA512

                        2d26ee688f6088588282c2d09caa58495c6d2820fa64fd86f6c929bb92ac3a028bb6a58d9a79c49a558c7261bdcfab07b339027c5907b2e275c8ed3676a14d65

                      • \Users\Admin\AppData\Local\Temp\BD86.exe

                        Filesize

                        71KB

                        MD5

                        96405c278652284fa77269240e869d12

                        SHA1

                        383d91660723098de7fa53104b85fb6c85819ba8

                        SHA256

                        a59749df0d186cd535ef400b36156eadfb158de8c4f3c558cb970dbba5b5d5a0

                        SHA512

                        1f42de3327d6f9d528bb76d69921b88d4b3d97598ac665407253903904a317e03120112c988ccdcb935c1d1d4b466c113608293269f6cf2ed7ef1e65a7b0f04e

                      • \Users\Admin\AppData\Local\Temp\BD86.exe

                        Filesize

                        118KB

                        MD5

                        6e87605a53db38b1931b4a254236805a

                        SHA1

                        565e8f171a99aa4070aae02cb2a8e1b45b73e9bf

                        SHA256

                        2d8c94a169f0be03e5c6097c8d94766e7ef5381dd8ef01989b64c7f99bcaf4c9

                        SHA512

                        9b22cce349fb06e9df984c3a6eba62ad2db57e096f8c246e35e5a0c7647d7143f0fec2d593d31a01608ad7c5a275d864920131162fad567ec84897b467684061

                      • \Users\Admin\AppData\Local\Temp\BD86.exe

                        Filesize

                        41KB

                        MD5

                        ac558b0b4d51c492237cbc8000650c04

                        SHA1

                        e4d23191ab26c7ba37476cf13e6ad5f3fb8dda0d

                        SHA256

                        386fdf65fbaef2b60968934357d45c45fac13c745f818b724e58c0c70342b9df

                        SHA512

                        7e2421be8008f36c870a05de5033de7bd4164be063ac122c6521852bb68beaa885956fb0f6c6537246e8b70ecbadaf3f41ec4c677328e3013cf389793142666a

                      • \Users\Admin\AppData\Local\Temp\BroomSetup.exe

                        Filesize

                        7KB

                        MD5

                        d765ae3fb4188ced3bb1809df0ad8343

                        SHA1

                        4f6994acf00ead1ea499a3e9bf861c960168d944

                        SHA256

                        ddef8f70611b69694e0e6062203c6929d234651fd33b43420013d2399e99ff7f

                        SHA512

                        9c079aae09f313bdf30039ec054a4ecf6c22e7b434b59491af8360161e5c22e4c3325f5a9ae88f76a3826d423d92a75e896355711c0c3d6fffd50a6b0bf64c2d

                      • \Users\Admin\AppData\Local\Temp\InstallSetup7.exe

                        Filesize

                        217KB

                        MD5

                        89c20d363a0eb6ac321045776e00ba29

                        SHA1

                        c525f5df7ff003730d27bf7ca58a1f2e20ef3cc3

                        SHA256

                        bcc674eec928930d1e45f95c33740d3943a2166aad6f88d4d36a1c994a321d0a

                        SHA512

                        8214756f955bdf60022012e2429dada6155efaf54d8dc3d15abd48551782d63bbd98fb16dfba0a6b0e4e8e1397f529401053882f56eb46ac8097210ee31df1ca

                      • \Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                        Filesize

                        64KB

                        MD5

                        a0ab2251d3ceb1349776ff3642e807bb

                        SHA1

                        3a3c78a26b87b9cfc0b9605e94e03eccb288426d

                        SHA256

                        5b1fffd5f6d7e45458ced266a096de2d1b9af84f71c0bc97b0d2b64a317ae391

                        SHA512

                        bb11a89847dc5e9c874453df71dfc8089bbe46c2f7b5079543eb0a686fd4c3dcf468a0aba4f156d6fe193d15552a55b9d1cba58fa82cb59e863c4cda82159ea2

                      • \Users\Admin\AppData\Local\Temp\csrss\patch.exe

                        Filesize

                        1KB

                        MD5

                        14899bb280b156e4ca42a95df5724e36

                        SHA1

                        47dc380d86b9b6b654f0c5dd25ac363e62fa6147

                        SHA256

                        48c72dd6c6350a8cc7b7e8b690718240b701c44b77a82e8af8a1dd0550ed314d

                        SHA512

                        b1fc5b75e4ab585f4c9d611aa515e15dedb9aebf6edfc2980dcd9801d9a2ba5a1923761a344ca141bc4fd6c20be247d0f48cfcbf6aaec52319695362853ff644

                      • \Users\Admin\AppData\Local\Temp\dbghelp.dll

                        Filesize

                        1KB

                        MD5

                        121cc42a218fe1856f3dd72720d3386e

                        SHA1

                        6a5ebba8c315f2ab12e349b2ca58008a2d4ddf25

                        SHA256

                        66174927bc4cb02b6139eb3e50b75a8e056c4682b2dbc2d8733ff7ff64b7b044

                        SHA512

                        f3ee67c55c254803b950f41beecd00587368624d0ccc8c33f24861e09fd12a1ca3d6189c7b8f168deb759b6765c865d36485470122fd05445dddfee42ca0a5fe

                      • \Users\Admin\AppData\Local\Temp\nsi405C.tmp\INetC.dll

                        Filesize

                        25KB

                        MD5

                        40d7eca32b2f4d29db98715dd45bfac5

                        SHA1

                        124df3f617f562e46095776454e1c0c7bb791cc7

                        SHA256

                        85e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9

                        SHA512

                        5fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d

                      • \Users\Admin\AppData\Local\Temp\nsi453D.tmp

                        Filesize

                        230KB

                        MD5

                        d11bde69bcd2adcd294216d4aa5a2668

                        SHA1

                        ca5d8e24e9fb064ae5f35dc8694200fe7d38091f

                        SHA256

                        77d2e160bdd239a28cc33ae08d91d4bead676331798827454309b9a7f4d4f736

                        SHA512

                        0c92b6773c8bd29acf1a55e18310b198b168af8fdb82436a3cd7d557e559077dda0c0ce26aa5aa1ff055587f97a26b26216e3273ab17e4a1f52788467c2b0765

                      • \Users\Admin\AppData\Local\Temp\nsi453D.tmp

                        Filesize

                        228KB

                        MD5

                        84556cd7f13f54eeb877db56a1e595f4

                        SHA1

                        f2de3ced1b367ce6bca58b16a080151f3b25098f

                        SHA256

                        5fb366dc9eec23c7b6ba0819aee813e83c6023132e145528e052051157f6a5ef

                        SHA512

                        5cf3d25a6165e1666d08729b6ecbbb214e9d84ee6c8a3fe3a05227065e188dc9eacb1c6cdcc82f0cd017d04244ad0769d0fe699686360acb95268c5c0a4996ee

                      • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                        Filesize

                        109KB

                        MD5

                        8c228594babc73cdc4db0a4c7e4f33b4

                        SHA1

                        d87fbb7b5860db1b37fa5a7e02d6e14a40325d30

                        SHA256

                        4f39d4f2a7b910ee42a28f08e533e023f5701e6c0af8ff3a682232dcc59d29a0

                        SHA512

                        29b767d176da6a8d59a3ec2cb9ba9ec83b6aea4b132d4f8773757d9b3265a478d66220903608e7c6ea6197915ddaa16bb8a9da0c23f34ce1a9da80a915dbd0ec

                      • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                        Filesize

                        184KB

                        MD5

                        b1759eb0f304dd0a93cd3755f2a6c514

                        SHA1

                        3cbda053661dc142c7988af14cc6992083fda906

                        SHA256

                        b7126b8b1d70f97d59413d03f569df597a648428f8410eafc097da642809847d

                        SHA512

                        177a064b00d684fcee6bfac29f7fff70d1f6bbfc56dccf3582752af6a10cac83b7406fe3436eb725bd4346e1080185faf6858636a76517d5d4992034c3988413

                      • \Users\Admin\AppData\Local\Temp\rty25.exe

                        Filesize

                        164KB

                        MD5

                        e0546e3f0b0e52df523794856e6c758c

                        SHA1

                        f90c66c616e7aef1a9ea05247f3eefeb46fd934f

                        SHA256

                        0cbc86b09391056b432f7b51eac8ed09fca873b379e424a785599d8d690e01ba

                        SHA512

                        464e5abd800b947a52d6c0f3c11f3872897280a7e0bdfc533d86cab9112fb0f7f90a584801708e49f9155b8ce9b46de36256cc49044ced0e922f8745ca720796

                      • \Users\Admin\AppData\Local\Temp\symsrv.dll

                        Filesize

                        2KB

                        MD5

                        58c13da03b15336b2f36bebc22c894e5

                        SHA1

                        fb2c7597f605c17f081778518fd40a45dcac4441

                        SHA256

                        870bfef18b2a9ea05c21379736e0d2fd9c076f8510fc7c533cb20680f741609a

                        SHA512

                        bf06d9454080cf00942fe21f460773819c632ca918dcd51ec1eeb7f23d9cec7051b4856e1b26f6a4a64aebdc2a1890cbc7ec0580810f8cdb14130826e9108d53

                      • \Users\Admin\AppData\Local\Temp\toolspub1.exe

                        Filesize

                        245KB

                        MD5

                        0b1d6a1554d3fd636a3b2ccd839a1849

                        SHA1

                        e45b2df5d972a0f3b40fe7e9006440b0a70b5fab

                        SHA256

                        40ccfd9288050dc64a7573e60cf3128c12829359ea57be8c70d596966859b643

                        SHA512

                        0008ab9a62eb8fdb9063ec32de8a8be047c7790b9a3458b48ff74771e80e922c9b3a5521f0fd9cfcc7e9c05a473d48c26ea018164c443befa8d73a7c51ead0b9

                      • \Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build2.exe

                        Filesize

                        278KB

                        MD5

                        d04d2f1ecbe2f4491d811c8b9afc477e

                        SHA1

                        9ce75cc8c7de520cb07767ad429223fa9ad23f6e

                        SHA256

                        e3d16f3f69fa0857f966022387ee6f9408385ddf389d09ffe7dc44acc8ac1ad5

                        SHA512

                        357322814852a60e7ebb7ff9d2bbbb346d52c7fd6b1f1fc43a265b229fe683f0403e1963d7ad054ced2cec3ddc3bf986ba997c9827d0f513f188b6e80d4673b4

                      • \Users\Admin\AppData\Local\f458e892-2341-4ded-b8fd-6aa9ddfe3878\build2.exe

                        Filesize

                        123KB

                        MD5

                        5b4647cd122b353265ce0cd6e54886a3

                        SHA1

                        16ee6d5844a2cd83fb40286ed7a349adfcf9fd14

                        SHA256

                        9a901ff36e878e1fcc1f66e2dbf8b6904d3598a72934f6f6c97040af3f188036

                        SHA512

                        37640702899cf45d012904dfd1b0808afd11059441768fff07ea427083daa6276f11d9c29ff9d6747db0c18c9379f4857624c86894de0a12b5026224486e33e8

                      • \Windows\rss\csrss.exe

                        Filesize

                        435KB

                        MD5

                        e12237f748f5c12dbe11f31775a98bae

                        SHA1

                        f27523e9d8f6ffdb330f11a7d594bd66de2077e8

                        SHA256

                        1d787cdb685015c25092c4e5e720907eb06e22c87a4d57700614f36be625c234

                        SHA512

                        753886bc99e19abe9e12eaa864a3e1e8382aeba7505b6a96e263ee22acc8e011ca3c8c8c7262ff558a9ad1b33807007362905313cd43356cd746529be93ad62a

                      • \Windows\rss\csrss.exe

                        Filesize

                        274KB

                        MD5

                        2bb2adeba52ca868f98739de247fbb6b

                        SHA1

                        436e1018d5e6875583ffb70ef99bfa55f0a73890

                        SHA256

                        5d71766b7dda256592d4d03133bf604ee3311396fca6c6ead6eefaa833abb49b

                        SHA512

                        3b0878d2361b9b8768415cee700bd0460d8aa5bb50f8ebb5a906549517cf96ed6277a99053a8ecd945db9ed86283da11416cb68c2fcc2586edcb43c246a107c7

                      • memory/588-395-0x0000000000CC0000-0x0000000000DC0000-memory.dmp

                        Filesize

                        1024KB

                      • memory/588-198-0x0000000000400000-0x000000000085E000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/588-246-0x0000000000CC0000-0x0000000000DC0000-memory.dmp

                        Filesize

                        1024KB

                      • memory/588-380-0x0000000000400000-0x000000000085E000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/588-114-0x0000000000400000-0x000000000085E000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/588-104-0x0000000000CC0000-0x0000000000DC0000-memory.dmp

                        Filesize

                        1024KB

                      • memory/588-234-0x0000000000400000-0x000000000085E000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/588-170-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                        Filesize

                        972KB

                      • memory/588-394-0x0000000000400000-0x000000000085E000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/588-105-0x0000000000220000-0x000000000023C000-memory.dmp

                        Filesize

                        112KB

                      • memory/888-391-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/888-393-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/888-383-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                        Filesize

                        4KB

                      • memory/888-386-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/888-420-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/984-1591-0x0000000000400000-0x000000000063F000-memory.dmp

                        Filesize

                        2.2MB

                      • memory/984-497-0x0000000000400000-0x000000000063F000-memory.dmp

                        Filesize

                        2.2MB

                      • memory/1204-363-0x0000000003AD0000-0x0000000003AE6000-memory.dmp

                        Filesize

                        88KB

                      • memory/1204-165-0x0000000002A30000-0x0000000002A46000-memory.dmp

                        Filesize

                        88KB

                      • memory/1248-387-0x00000000006D0000-0x00000000007EB000-memory.dmp

                        Filesize

                        1.1MB

                      • memory/1248-379-0x0000000000330000-0x00000000003C2000-memory.dmp

                        Filesize

                        584KB

                      • memory/1248-385-0x0000000000330000-0x00000000003C2000-memory.dmp

                        Filesize

                        584KB

                      • memory/1248-576-0x00000000006D0000-0x00000000007EB000-memory.dmp

                        Filesize

                        1.1MB

                      • memory/1600-1143-0x0000000000940000-0x0000000000A40000-memory.dmp

                        Filesize

                        1024KB

                      • memory/1600-1146-0x0000000000220000-0x0000000000224000-memory.dmp

                        Filesize

                        16KB

                      • memory/1676-474-0x00000000009E0000-0x0000000001294000-memory.dmp

                        Filesize

                        8.7MB

                      • memory/1676-467-0x00000000009E0000-0x0000000001294000-memory.dmp

                        Filesize

                        8.7MB

                      • memory/1676-473-0x0000000077370000-0x0000000077371000-memory.dmp

                        Filesize

                        4KB

                      • memory/1676-470-0x0000000000090000-0x0000000000091000-memory.dmp

                        Filesize

                        4KB

                      • memory/1676-468-0x0000000000090000-0x0000000000091000-memory.dmp

                        Filesize

                        4KB

                      • memory/1676-465-0x0000000000090000-0x0000000000091000-memory.dmp

                        Filesize

                        4KB

                      • memory/1704-426-0x0000000001C70000-0x0000000001D02000-memory.dmp

                        Filesize

                        584KB

                      • memory/1704-422-0x0000000001C70000-0x0000000001D02000-memory.dmp

                        Filesize

                        584KB

                      • memory/1736-1159-0x0000000000400000-0x0000000000406000-memory.dmp

                        Filesize

                        24KB

                      • memory/1916-280-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/1916-267-0x0000000140000000-0x00000001405E8000-memory.dmp

                        Filesize

                        5.9MB

                      • memory/1972-1587-0x0000000000E70000-0x0000000000F3A000-memory.dmp

                        Filesize

                        808KB

                      • memory/1972-616-0x000007FEF46C0000-0x000007FEF50AC000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/1972-615-0x0000000000F60000-0x00000000010E8000-memory.dmp

                        Filesize

                        1.5MB

                      • memory/1972-635-0x000000001BC30000-0x000000001BD62000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/1972-1589-0x000007FEF46C0000-0x000007FEF50AC000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/1972-1586-0x0000000000140000-0x0000000000141000-memory.dmp

                        Filesize

                        4KB

                      • memory/1972-1585-0x0000000000880000-0x0000000000900000-memory.dmp

                        Filesize

                        512KB

                      • memory/1972-1588-0x0000000000830000-0x000000000087C000-memory.dmp

                        Filesize

                        304KB

                      • memory/2164-1649-0x0000000000400000-0x0000000000575000-memory.dmp

                        Filesize

                        1.5MB

                      • memory/2480-207-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/2480-163-0x0000000000E90000-0x0000000001288000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2480-160-0x0000000000E90000-0x0000000001288000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2480-233-0x0000000000E90000-0x0000000001288000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2480-229-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/2480-169-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/2528-39-0x0000000074260000-0x000000007494E000-memory.dmp

                        Filesize

                        6.9MB

                      • memory/2528-0-0x0000000074260000-0x000000007494E000-memory.dmp

                        Filesize

                        6.9MB

                      • memory/2528-1-0x0000000000CA0000-0x0000000001320000-memory.dmp

                        Filesize

                        6.5MB

                      • memory/2696-1628-0x0000000071C50000-0x000000007233E000-memory.dmp

                        Filesize

                        6.9MB

                      • memory/2696-1631-0x0000000002460000-0x0000000004460000-memory.dmp

                        Filesize

                        32.0MB

                      • memory/2696-1627-0x0000000000310000-0x000000000048C000-memory.dmp

                        Filesize

                        1.5MB

                      • memory/2696-1647-0x0000000071C50000-0x000000007233E000-memory.dmp

                        Filesize

                        6.9MB

                      • memory/2712-166-0x0000000000400000-0x0000000000866000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/2712-20-0x00000000009A0000-0x0000000000AA0000-memory.dmp

                        Filesize

                        1024KB

                      • memory/2712-23-0x0000000000400000-0x0000000000866000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/2712-21-0x0000000000220000-0x000000000022B000-memory.dmp

                        Filesize

                        44KB

                      • memory/2716-52-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/2716-51-0x00000000029C0000-0x00000000032AB000-memory.dmp

                        Filesize

                        8.9MB

                      • memory/2716-161-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/2716-33-0x0000000000EA0000-0x0000000001298000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2716-50-0x0000000000EA0000-0x0000000001298000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2716-164-0x00000000029C0000-0x00000000032AB000-memory.dmp

                        Filesize

                        8.9MB

                      • memory/2716-162-0x0000000000EA0000-0x0000000001298000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2752-371-0x0000000000400000-0x00000000008E2000-memory.dmp

                        Filesize

                        4.9MB

                      • memory/2752-208-0x0000000000250000-0x0000000000251000-memory.dmp

                        Filesize

                        4KB

                      • memory/2752-49-0x0000000000250000-0x0000000000251000-memory.dmp

                        Filesize

                        4KB

                      • memory/2752-213-0x0000000000400000-0x00000000008E2000-memory.dmp

                        Filesize

                        4.9MB

                      • memory/2752-194-0x0000000000400000-0x00000000008E2000-memory.dmp

                        Filesize

                        4.9MB

                      • memory/2804-432-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2804-430-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2804-461-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2804-463-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2804-464-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2804-451-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2804-1157-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2804-450-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2860-176-0x00000000037B0000-0x00000000038E0000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2860-38-0x00000000FF860000-0x00000000FF8B2000-memory.dmp

                        Filesize

                        328KB

                      • memory/2860-279-0x00000000037B0000-0x00000000038E0000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2860-173-0x0000000003570000-0x000000000367C000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2872-431-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/2872-228-0x0000000000E60000-0x0000000001258000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2872-392-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/2872-390-0x0000000000E60000-0x0000000001258000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2872-242-0x0000000000E60000-0x0000000001258000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2872-245-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/2872-244-0x0000000002980000-0x000000000326B000-memory.dmp

                        Filesize

                        8.9MB

                      • memory/2896-364-0x0000000000400000-0x000000000085E000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/2896-256-0x0000000000400000-0x000000000085E000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/2896-255-0x00000000002B0000-0x00000000003B0000-memory.dmp

                        Filesize

                        1024KB

                      • memory/2984-495-0x0000000000240000-0x000000000026B000-memory.dmp

                        Filesize

                        172KB

                      • memory/2984-492-0x0000000000553000-0x000000000056B000-memory.dmp

                        Filesize

                        96KB