Analysis

  • max time kernel
    128s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-01-2024 12:44

General

  • Target

    file.exe

  • Size

    6.4MB

  • MD5

    4bf40a595b37b88d2f0967eb52a30d7d

  • SHA1

    4ae12b7d109b46943121a6ee5feeff34b454e5f6

  • SHA256

    1cf4a4b0f9432f78cd76b30cf8e6070d2d49b70d42ec4e2192da86d09a0a02fa

  • SHA512

    01f49988f45eabe58fb2b33cd5e367d83373a87a7afe1bbc032e60d2cc5938b23b43fd39203179bdccd10f54217d20dad1339a372108a07cdf2b4611044ea2ba

  • SSDEEP

    98304:v627llWkfUUxdWhVwDGd6wJgl12SS3aayEb22ZA6EbK54UQYvhvWgVPWGAMh1uxT:v68XZ1dMgGYwJSax6u5JdBS7UkxT

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

fabookie

C2

http://app.alie3ksgaa.com/check/safe

Extracted

Family

djvu

C2

http://habrafa.com/test1/get.php

Attributes
  • extension

    .cdpo

  • offline_id

    Bn3q97hwLouKbhkQRNO4SeV07gjdEQVm8NKhg0t1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://habrafa.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-FCWSCsjEWS Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0844OSkw

rsa_pubkey.plain

Extracted

Family

stealc

C2

http://185.172.128.79

Attributes
  • url_path

    /3886d2276�6914c4.php

rc4.plain

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

45.15.156.60:12050

Signatures

  • DcRat 5 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Fabookie payload 1 IoCs
  • Detected Djvu ransomware 7 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Fabookie

    Fabookie is facebook account info stealer.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Downloads MZ/PE file
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 24 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 8 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 14 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3352
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:516
      • C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe
        "C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:392
        • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
          C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2528
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3368
        • C:\Users\Admin\AppData\Local\Temp\nsg5779.tmp
          C:\Users\Admin\AppData\Local\Temp\nsg5779.tmp
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          PID:3860
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 2440
            5⤵
            • Program crash
            PID:5004
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nsg5779.tmp" & del "C:\ProgramData\*.dll"" & exit
            5⤵
              PID:3776
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 5
                6⤵
                • Delays execution with timeout.exe
                PID:1320
        • C:\Users\Admin\AppData\Local\Temp\toolspub1.exe
          "C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"
          3⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:2724
        • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
          "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3944
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4620
          • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
            "C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
            4⤵
            • DcRat
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks for VirtualBox DLLs, possible anti-VM trick
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:812
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4908
            • C:\Windows\system32\cmd.exe
              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3560
              • C:\Windows\system32\netsh.exe
                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                6⤵
                • Modifies Windows Firewall
                PID:4836
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious use of AdjustPrivilegeToken
              PID:3696
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
                PID:2180
              • C:\Windows\rss\csrss.exe
                C:\Windows\rss\csrss.exe
                5⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Manipulates WinMonFS driver.
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4484
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  6⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2736
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                  6⤵
                  • DcRat
                  • Creates scheduled task(s)
                  PID:952
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  6⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3880
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /delete /tn ScheduledUpdate /f
                  6⤵
                    PID:1484
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    6⤵
                      PID:1504
                    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                      C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                      6⤵
                      • Executes dropped EXE
                      PID:5056
                    • C:\Windows\SYSTEM32\schtasks.exe
                      schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                      6⤵
                      • DcRat
                      • Creates scheduled task(s)
                      PID:4584
                    • C:\Windows\windefender.exe
                      "C:\Windows\windefender.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:3288
              • C:\Users\Admin\AppData\Local\Temp\rty25.exe
                "C:\Users\Admin\AppData\Local\Temp\rty25.exe"
                3⤵
                • Executes dropped EXE
                PID:816
            • C:\Users\Admin\AppData\Local\Temp\B3A0.exe
              C:\Users\Admin\AppData\Local\Temp\B3A0.exe
              2⤵
              • Executes dropped EXE
              • Checks SCSI registry key(s)
              • Suspicious behavior: MapViewOfSection
              PID:3708
            • C:\Users\Admin\AppData\Local\Temp\C17C.exe
              C:\Users\Admin\AppData\Local\Temp\C17C.exe
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1092
            • C:\Users\Admin\AppData\Local\Temp\D44A.exe
              C:\Users\Admin\AppData\Local\Temp\D44A.exe
              2⤵
              • Executes dropped EXE
              PID:3092
            • C:\Users\Admin\AppData\Local\Temp\EAA1.exe
              C:\Users\Admin\AppData\Local\Temp\EAA1.exe
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4952
            • C:\Users\Admin\AppData\Local\Temp\C5D0.exe
              C:\Users\Admin\AppData\Local\Temp\C5D0.exe
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              PID:2036
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k cmd < Butt & exit
                3⤵
                  PID:2960
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd
                    4⤵
                      PID:3828
                      • C:\Windows\SysWOW64\tasklist.exe
                        tasklist
                        5⤵
                        • Enumerates processes with tasklist
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3936
                      • C:\Windows\SysWOW64\findstr.exe
                        findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                        5⤵
                          PID:5064
                        • C:\Windows\SysWOW64\tasklist.exe
                          tasklist
                          5⤵
                          • Enumerates processes with tasklist
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2824
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr /I "wrsa.exe"
                          5⤵
                            PID:1376
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c mkdir 19455
                            5⤵
                              PID:4844
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c copy /b Promotions + Forwarding + Enrollment + Dive + Screensavers + Gender + Orgasm 19455\Looksmart.pif
                              5⤵
                                PID:1220
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c copy /b Beds + Hardcore + Cheese + Nancy + Violin + Refused + Wells + Comment + Pts + Money + Rebel + Socks + Ranging + Nj + Travel + Menus + Washing + Crops + Mail + Clone + Reflected + Workstation + Malaysia + Accessory 19455\X
                                5⤵
                                  PID:2736
                                • C:\Windows\SysWOW64\PING.EXE
                                  ping -n 5 localhost
                                  5⤵
                                  • Runs ping.exe
                                  PID:4240
                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\19455\Looksmart.pif
                                  19455\Looksmart.pif 19455\X
                                  5⤵
                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:1060
                          • C:\Windows\SYSTEM32\cmd.exe
                            cmd /c schtasks.exe /create /tn "Techrepublic" /tr "wscript 'C:\Users\Admin\AppData\Local\TraceGuard Systems\SmartTrace.js'" /sc minute /mo 3 /F
                            2⤵
                              PID:3564
                            • C:\Windows\SYSTEM32\cmd.exe
                              cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartTrace.url" & echo URL="C:\Users\Admin\AppData\Local\TraceGuard Systems\SmartTrace.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartTrace.url" & exit
                              2⤵
                              • Drops startup file
                              PID:4504
                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\19455\Looksmart.pif
                              C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\19455\Looksmart.pif
                              2⤵
                              • Executes dropped EXE
                              PID:3328
                              • C:\Windows\system32\svchost.exe
                                svchost.exe
                                3⤵
                                  PID:4996
                              • C:\Users\Admin\AppData\Local\Temp\2EAC.exe
                                C:\Users\Admin\AppData\Local\Temp\2EAC.exe
                                2⤵
                                • Executes dropped EXE
                                PID:464
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                  3⤵
                                    PID:8
                                • C:\Users\Admin\AppData\Local\Temp\31AB.exe
                                  C:\Users\Admin\AppData\Local\Temp\31AB.exe
                                  2⤵
                                  • Executes dropped EXE
                                  PID:4036
                                  • C:\Users\Admin\AppData\Local\Temp\31AB.exe
                                    C:\Users\Admin\AppData\Local\Temp\31AB.exe
                                    3⤵
                                      PID:4320
                                  • C:\Users\Admin\AppData\Local\Temp\369E.exe
                                    C:\Users\Admin\AppData\Local\Temp\369E.exe
                                    2⤵
                                    • Drops startup file
                                    • Executes dropped EXE
                                    • Adds Run key to start application
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1180
                                    • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
                                      "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 4
                                      3⤵
                                        PID:2212
                                      • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe
                                        "C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.hashvault.pro:3333 -u 49t6urp39F9WQ7iprgWtoA7Xv6iYT8krNCAqo4qJXsrcP2CwHMcQzEsEZJtJLMsdQwSboNLC6a6AsgbKkrHqj6AGJyssTjJ -p x -k -v=0 --donate-level=1 -t 4
                                        3⤵
                                          PID:2648
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                                      1⤵
                                      • DcRat
                                      • Creates scheduled task(s)
                                      PID:3860
                                    • C:\Windows\SysWOW64\chcp.com
                                      chcp 1251
                                      1⤵
                                        PID:4208
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                        1⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:5040
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                          2⤵
                                          • Launches sc.exe
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1932
                                      • C:\Windows\windefender.exe
                                        C:\Windows\windefender.exe
                                        1⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        PID:1496
                                      • C:\Users\Admin\AppData\Local\Temp\C17C.exe
                                        C:\Users\Admin\AppData\Local\Temp\C17C.exe
                                        1⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Adds Run key to start application
                                        PID:2320
                                        • C:\Windows\SysWOW64\icacls.exe
                                          icacls "C:\Users\Admin\AppData\Local\d5473b6a-447f-4deb-9b2e-3cd4d9e26941" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                          2⤵
                                          • Modifies file permissions
                                          • Drops file in System32 directory
                                          • Modifies data under HKEY_USERS
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1504
                                        • C:\Users\Admin\AppData\Local\Temp\C17C.exe
                                          "C:\Users\Admin\AppData\Local\Temp\C17C.exe" --Admin IsNotAutoStart IsNotTask
                                          2⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          PID:2420
                                          • C:\Users\Admin\AppData\Local\Temp\C17C.exe
                                            "C:\Users\Admin\AppData\Local\Temp\C17C.exe" --Admin IsNotAutoStart IsNotTask
                                            3⤵
                                            • Executes dropped EXE
                                            PID:3724
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3724 -ip 3724
                                        1⤵
                                          PID:860
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 568
                                          1⤵
                                          • Program crash
                                          PID:380
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3860 -ip 3860
                                          1⤵
                                          • Drops file in System32 directory
                                          • Modifies data under HKEY_USERS
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2180
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4868
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "Techrepublic" /tr "wscript 'C:\Users\Admin\AppData\Local\TraceGuard Systems\SmartTrace.js'" /sc minute /mo 3 /F
                                          1⤵
                                          • DcRat
                                          • Creates scheduled task(s)
                                          PID:2152
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          1⤵
                                          • Modifies Installed Components in the registry
                                          • Enumerates connected drives
                                          • Modifies registry class
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          PID:2412
                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                          1⤵
                                            PID:5080
                                          • C:\Windows\explorer.exe
                                            explorer.exe
                                            1⤵
                                              PID:3676
                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                              1⤵
                                                PID:2176

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\ProgramData\Are.docx

                                                Filesize

                                                11KB

                                                MD5

                                                a33e5b189842c5867f46566bdbf7a095

                                                SHA1

                                                e1c06359f6a76da90d19e8fd95e79c832edb3196

                                                SHA256

                                                5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                                SHA512

                                                f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                              • C:\ProgramData\mozglue.dll

                                                Filesize

                                                9KB

                                                MD5

                                                788b958408e61be7dd1a0801d8d80edb

                                                SHA1

                                                d34fc289345d89d8ae816189093256acd000d79a

                                                SHA256

                                                4ea5db70ae6c613de2f869f5868074361c84ba491c6097b800ff1716bed613c5

                                                SHA512

                                                7040e67f374ce83dc0428541b52ad1bfb6cc4ad7ebd9902f00cec10b2cb1a541fad472b6a5f6751a691507f08853574a2fcf5ba5cc8bdf5d467516207a1f5bdc

                                              • C:\ProgramData\mozglue.dll

                                                Filesize

                                                71KB

                                                MD5

                                                80d0448ec0963fb298d5f037a7d807bd

                                                SHA1

                                                4946bf302e5b96795ee55653d983b78afbdc52fa

                                                SHA256

                                                3520b47b01315fc030a08f7dd15cf965cf48c8b254b750ddc07c63111bfdeca2

                                                SHA512

                                                d68ca3eb65f286b6515701e34fa579549d230dec86a8a341a8fb9f954771f17b71c9d7644a1ea7357381d05a6e51788747f4885f5dbb71ca4b65bcf57b466899

                                              • C:\ProgramData\nss3.dll

                                                Filesize

                                                24KB

                                                MD5

                                                0f82a90775942848252ccb73b86fad85

                                                SHA1

                                                6b27c62165df4a0f15bc5c31804828e295fe63fb

                                                SHA256

                                                fa863a41ea285a5df640df49ff1b44b349412433f0fe6da8e2330dfd288025d9

                                                SHA512

                                                f906b67319960dc60eb603414d4ccbec2fb71f490d4b9d91117067acd3fd7795b12406cc952c2dd09101fe9fab853bc541174f23c51e07aadfbfb56b561a1a61

                                              • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                Filesize

                                                193KB

                                                MD5

                                                ee844e0d328370d77118b6f69b515bdc

                                                SHA1

                                                1311684f36fd7212870f467d785003a79bd92baa

                                                SHA256

                                                0b96e3e8d213cbab14f519ac5f24809af3cba58648a671ef7fb6d2e22d091156

                                                SHA512

                                                cf1150f3fafc96850d5cc31e32b93d2490b4f8d49a9546a858cbfaad52fa2938f10454d6bd8300e83216bc47972465f0be15289a1f54304b6d07a717f35add59

                                              • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                Filesize

                                                321KB

                                                MD5

                                                234f404040702eb0f7fb32e419b3729e

                                                SHA1

                                                5458963b5af3369e345927ae70f22904bea02489

                                                SHA256

                                                63d359c8f99cac6b799cbfbb0c8c17dd0a4b808c1a7cf8b8c4b5bae7166c828f

                                                SHA512

                                                f062995d432ffb38c63a87cd0b800d0d9adbb9aba95bd51d9ad7dccfd5bc7f514698b1217e2b8cc0aa7f28e9319583bf4970e3d153e5f8ca4f71d5d1e51e6b4b

                                              • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                Filesize

                                                181KB

                                                MD5

                                                1fc3191a70a8b1fb6dbe0c62eaba5860

                                                SHA1

                                                c0826968d5ca1aec202c38b9aac078301ccdae71

                                                SHA256

                                                6b567183c9745885e32a87abedd333d41c1b6dc5a9e237e5c2d511e753276fd6

                                                SHA512

                                                f57accb1e35a8646df80bba4675cf38a75d38473b0850cef1b6b5cb4054228d34933f29eb9a9a12c6fff0124ed75acdac00f6747f97667fec18b415daf6ae09d

                                              • C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

                                                Filesize

                                                168KB

                                                MD5

                                                946fa0261cd1ad81e9fe7ba686af45f4

                                                SHA1

                                                92cdfcae23147791a6918f4ff183fd4a9b72c869

                                                SHA256

                                                98912a5dd9616ebe85c3882741eaa5f7c879025af06cb2e87283653eacbe0ec8

                                                SHA512

                                                49eff56023186d5630383438b7fb3d19d26b02232f2f10d1275e9d9bf8de1ecd4af1db4c4874e91708e724410e5e30760759ac31b21d6eb0850d131cb8b31d2b

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Beds

                                                Filesize

                                                299KB

                                                MD5

                                                693b797ca2972240d0787b717f8f2270

                                                SHA1

                                                ff93584e7c659d933b20b4990720f3bec448ffff

                                                SHA256

                                                03b8adc66636b151ab7c6b855cbcf98d09e56225681c36a8cca4c928c21cf70a

                                                SHA512

                                                689fbeef79e212de6524e0cbf37d88ac521a30f9dcaded6c2145eb56438be8b4aeaa9b2ce35ea7952a29d115d231861806ebf7c2225a62688632328e8f4457fd

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Butt

                                                Filesize

                                                16KB

                                                MD5

                                                7d51f461be553b658c50c25c700ba646

                                                SHA1

                                                80d136845ccf4412a140a9e1b57b7a7dad38ee18

                                                SHA256

                                                2e7138cee7ce2e3244fb0493c75081001f1f8445e4c0f4321c865c8c6746b5ef

                                                SHA512

                                                aea16af7832393aee1b1c2c1362fd0bffd433b47e68cac31537a493b591aff1fdb065ab4d6a50e5b49702763e1ce5e1d30a540090e4a1f4e55b7b0363abf2389

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Cheese

                                                Filesize

                                                99KB

                                                MD5

                                                147f3719aab2ce1db3060faba9d19a77

                                                SHA1

                                                f706378f02b0df59b9e04753bec2927ee79e9d3c

                                                SHA256

                                                95785d17d66d51d7d45528458f12db06aa018d913bcad155e7a98556155e38f1

                                                SHA512

                                                cf2bbb7b81b1b7064ce2698747e66dbe8f921b693bfdcb1d63f9de1eab562f7ed8c1e1df1ecf5a84bbed08e200226b31baa9852af306b8da198113211f7df8d4

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Comment

                                                Filesize

                                                98KB

                                                MD5

                                                3689d552c23a93b87f5374335dc3b24c

                                                SHA1

                                                3f6b70060e370a3eb2594b9011ff2c097d8567d4

                                                SHA256

                                                38f7701872b322c41bda4a4526533995aeda362d836f113ec7a8ef73433c7708

                                                SHA512

                                                1b886f27922817f0647fc6b7f07bc0161e98cf4ab5eba3d16524ba079256625caac84801a2f252579f180a5ef3ba346d793fb778e8a28a0de5fefb053886c1eb

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Dive

                                                Filesize

                                                209KB

                                                MD5

                                                0cee0fd91e8078fda07c9f889685fd46

                                                SHA1

                                                74c20df458e1c3db7ee18391be23438176049cc2

                                                SHA256

                                                8d352265f3438fe56b17d4455a39c672a35bacd52e816ac3d1c3095e5fbee01a

                                                SHA512

                                                8af71a229332cc2ada96058583003e1d5c6b5a2ed4e1f445a51c61c46930c188bd82f23d4f7d477d6c48d865b0c231756c46c618a2be8649c821458c7054e5de

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Enrollment

                                                Filesize

                                                110KB

                                                MD5

                                                bd18a57cfa2813fe8d47249d568574c6

                                                SHA1

                                                dbb4d494ea7d3d6a49a6ac88979567e3f2a4732b

                                                SHA256

                                                9b731412ddf6307eafccef500e4ffc0ed4064eb827f4c65b41bd0d15102a9032

                                                SHA512

                                                3cab3df02b81b44417b6ebaebbd8f857d176c5c1227c995a3b80f048804cdc9726950d9199d326004049fce0024c2501321f962f4f93dbfe30fe803088f231d6

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Forwarding

                                                Filesize

                                                184KB

                                                MD5

                                                92747ca1cc5e0873a745121cecbc5336

                                                SHA1

                                                728bcaa779a56e55bb7fe67b21cd60ff1c82d61d

                                                SHA256

                                                61adbc2ee3702f32749c3088146258245aab73fa00a4b57c9500e5c0812b7a44

                                                SHA512

                                                0df14a4134acfa583440ce4b7d029123ae564ccb609371357766829966546f3a80c4a6aecf1e180bfa733306e8a6970c73548d734e0ad4e983c8318c136d4895

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Gender

                                                Filesize

                                                102KB

                                                MD5

                                                c9a68724c980d66cf8928d5c65fe66e3

                                                SHA1

                                                6560cdb69d3adb6a89846c590c695e69a34170f2

                                                SHA256

                                                9650f9de615a7532fcc11c0bea921f136bee54999f824f0cfee533dc4a367ba4

                                                SHA512

                                                bd4c655c1283a034a6feaf465e1114b8ff431820071ab1d42a2393fb244e74d91c7e3541c1149396d1fea9a73fa6c226e6ced7a530689d6867fe103800448281

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hardcore

                                                Filesize

                                                276KB

                                                MD5

                                                0f096a3528ac2d8e4bd715dc1b217611

                                                SHA1

                                                34d4e3e58de1c41a45325829f0cf0ab917b9b4fc

                                                SHA256

                                                eb0587b286878844fcf81db0d5671a55bb81be08660bdcc427957ba87a09a980

                                                SHA512

                                                4e6884f33b5171c981068b95cddccb24fccc0f6834caf69e41e9c6f7e72158360714bce5487a3c30ab715f1f1f4dd3f83e5694ef67750685875b9eae14c06e0d

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Money

                                                Filesize

                                                69KB

                                                MD5

                                                62230c216dde837c3b8e395c4f25a547

                                                SHA1

                                                59b520d1a6f6b2a841851992dee7c515d8ad8da9

                                                SHA256

                                                47a9f996c4010b49ad743df65e7bb839691774bf5c7422ecd2c8835f75b032c7

                                                SHA512

                                                78aafd19412f3c259d57002c0074881d13a015213bc1f5c499798333e156676052998f5a1732e6da8e5565f2338796752a619227b42ca2b52c58555233c594f5

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Nancy

                                                Filesize

                                                111KB

                                                MD5

                                                ded32634afe31dae99c404b466cc2379

                                                SHA1

                                                249a84adbc6d7158a0bb73931d1cdb6cbdbfc95f

                                                SHA256

                                                5a92e3cb783852083d294e87cba69c9693dfc03bd3104da8ccd0fc69a5a61d6d

                                                SHA512

                                                eda5bebd65352457c0f1d98fa6559397e3623de005641ccf852da9ed03bea29df1f148d8385b8d4b9245ab2351e5e0bb07e47adec55f6457bfdb4ab5af47e648

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Orgasm

                                                Filesize

                                                115KB

                                                MD5

                                                9ba1b9a9af4d072663b3a38f1909af9b

                                                SHA1

                                                b7f4dd56a2316e9ef0173e54170e3c5f74e3fc5c

                                                SHA256

                                                5d38ed752dcf3f1743e60881be9e0f0538c609d4657ba09a2b7202d8776fb325

                                                SHA512

                                                441ec94f79aae8dbc1e887dd14212f35418e51ccf57ceae948b5fa233c89ce3e88d9197773ec9fc545d42e9696c1e3cab45bb6a5d7c7103e006aaea496a9b306

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Promotions

                                                Filesize

                                                202KB

                                                MD5

                                                247f9ae5d8cb92864e5fa63767afb500

                                                SHA1

                                                26d41294c79a4d2b6821ae892da4efef73169799

                                                SHA256

                                                d10c4371c4f4ffc53c1705c0805199a05eb9d5b5959de9adee02df9b4a02b03d

                                                SHA512

                                                4df21e7c082429f9f4cc42a7587394cab411d37d6b758e9f8f9b4200c112bb5f38e717c91c2052b17638ffb7b57291347a30fae4463716681fbbfd3592b9f552

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pts

                                                Filesize

                                                49KB

                                                MD5

                                                fdde5bad2c3ea053a41289836dbda0f1

                                                SHA1

                                                5ab9e65a2ced3ce4ecec358dcdd2a793b556f84e

                                                SHA256

                                                6a6c2f610a5635eddf2bd23871b99cf0c0a4c67e83ff9b86d5c80519f4b9c039

                                                SHA512

                                                1392f3a44f27d32e1a9853675152373b7c83a8039b6d53484bd15e4ce46926cabf99b7d04465435dd63f66b40b9003ccfba0d0624e5e860d569441008d9df5ca

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Rebel

                                                Filesize

                                                86KB

                                                MD5

                                                873a7eb96b6fc25ce88af08d37855516

                                                SHA1

                                                192da53eb3f512616cda916e3db66ad15bfbbcb1

                                                SHA256

                                                a38d334af574cc5eebd46f1faf857fe31d2ce4cff1304ef6756a48eae115b2ca

                                                SHA512

                                                3ce2235795e640a9c5540572c4f166a4480e9ca4cab8339a7be3b6019701309fea16781f59b92c6dde72486af97ba9c94147b37a28e45080769fc9307b240f7d

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Refused

                                                Filesize

                                                96KB

                                                MD5

                                                3f429d87d21bedcaec429bb5620cb009

                                                SHA1

                                                ec5fd72b844a4068d23061ff92395758e0ce1841

                                                SHA256

                                                e0f844976b862e124701d93d1a10c810037183b36d97b377994d619c2960237b

                                                SHA512

                                                76387b33860c7a0f7d1e0a23b0b009998e16732f07337a5681f716e0550e10fa7743cb3bec8d89cd4467ec8665c292a4de8c3e4db212ef6ba499d0bd9a7d2c7c

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Screensavers

                                                Filesize

                                                124KB

                                                MD5

                                                6f16ec1eb0541b1bfebd1fa24fcdb6ba

                                                SHA1

                                                c6bf809be636f4f3cd79ba41425eaa38266be261

                                                SHA256

                                                5d1df1211b570de076468be7283bcbb0befdb478972bca90b6ccad9c7acb44d2

                                                SHA512

                                                c0828519fd0f06acd2a3ce79ad0be9e25712740d1d209f1691cdc124b040db60fa818312ca5cbaeadb11193e7c99cf2f60fa0d5b5013523f4ab93247ca6c8cda

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Violin

                                                Filesize

                                                108KB

                                                MD5

                                                4e7b304aa0a13a673c06ff9872d6c6de

                                                SHA1

                                                919c81954986e214a7e6d7bf259ee5d9fd9673be

                                                SHA256

                                                ce0764cea60fc78690ce7334b2ff8530b11a9b697be9f8c4b276afd57879b473

                                                SHA512

                                                c514766f44225aa0b13d113f786b3e50d5be8818b9333ee85649e630f186f06b0b08e9ffcd924be8138262fadca65fb42a612d5f5799d6aeba739ed33f1e26b4

                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Wells

                                                Filesize

                                                92KB

                                                MD5

                                                6925e23977d124977f409812b0c32d5c

                                                SHA1

                                                b4fc3fb0edee5c07d8c09610bdfd870f94c24595

                                                SHA256

                                                8129fa5f2b4ae8a4f38ae8a53beb74a23405826bc237e0ba7f76149dd69ba4f9

                                                SHA512

                                                af36e4eadd9e96a7589d3e6af689c67d632506840e08b687641ac8a61d16341f27a7addcd706373cbd58055313272f31f6f649f0227565378cc5de20e0609ff8

                                              • C:\Users\Admin\AppData\Local\Temp\B3A0.exe

                                                Filesize

                                                156KB

                                                MD5

                                                601bb7238db1a52d9c206aaee78e62ab

                                                SHA1

                                                29ac315a7c8c33364de7ab4ac3894f45c11ed527

                                                SHA256

                                                4e1170f7986e57013af5feebea15167842b0e038343d9042e978c165a6b21178

                                                SHA512

                                                b8957ec4991945a22f869d159ca7985c05397861216a683059d153a554a96878dec5f862ae77fdbd32d197a962be66870936deaa9e562a024c64c7ea016850bf

                                              • C:\Users\Admin\AppData\Local\Temp\B3A0.exe

                                                Filesize

                                                126KB

                                                MD5

                                                93b9e686c358f1508b38e4deb0556148

                                                SHA1

                                                e50eced18909e5bf4ac812be998d02f5f54e8a55

                                                SHA256

                                                42a4325d0ab491d4f2afced14906b3ceb3c9649277c4be67d20f67e5aaffd031

                                                SHA512

                                                dd8178ed153eb33fdb9c155bf5b2441513cca0ddc22b8df3f8ecaf13588baba8e2a1ef462122b79b97f4a3a1860ef48197df52dfd82e340ece51c06a90c69805

                                              • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe

                                                Filesize

                                                220KB

                                                MD5

                                                f2b84f645a5bd44970b18146386ae7b1

                                                SHA1

                                                2463edeede50f1d12176a781b612028ace0a8110

                                                SHA256

                                                89b10b3c47bdc4c7882cc0db2014c87451ac02a0eb0614e28913455c80c71859

                                                SHA512

                                                4a9176cee05afde4e67e2a280c7e1ef28015b5dd885ff7e69eb8e31b0529a5826d06c04cf9c85e1579e1750551b79f52d571581a4e66a6d7a46fa62aca3bfd4b

                                              • C:\Users\Admin\AppData\Local\Temp\C17C.exe

                                                Filesize

                                                222KB

                                                MD5

                                                727ca5c69ebf4f21f17899cc2bb1eb94

                                                SHA1

                                                3072f71d78e015e469ab804492256b31a018e513

                                                SHA256

                                                6cf9a3fc500e51837e61c569cad6b323eb50e294697f2074585ea5ed9c078192

                                                SHA512

                                                00269dc01938970c48df8ec5cf94e149ac73847a3c3e903ff8385782fde0d3533190b8a1602e7febd893cb1cfa4d37c5c42be16c0bffedae0807076c6f06a504

                                              • C:\Users\Admin\AppData\Local\Temp\C17C.exe

                                                Filesize

                                                115KB

                                                MD5

                                                d9b9a2e99ac422ecad87332976adef7d

                                                SHA1

                                                47e17d5d944c9c1676b141209948ac3af1378e98

                                                SHA256

                                                0dada79b2b56902ef36f743f31fdf2b5ab94d3c8b5829855f88874e00520affe

                                                SHA512

                                                0a40af4ca67407a76fc55d18af27339699fadd0c246a2db606fc00137cf197627963e77c31d71d7d968a7bcc31212c2fc50fec18e645f8d3d974589637842b27

                                              • C:\Users\Admin\AppData\Local\Temp\C17C.exe

                                                Filesize

                                                92KB

                                                MD5

                                                0e2ac541e89bce7c3b7830f756187756

                                                SHA1

                                                01b326804d1dab3df983b5df396a54d52323794a

                                                SHA256

                                                c7c27bfa61e3e28dd3017ff8f5ef65a0c9eb6510ade2539a07884af867751264

                                                SHA512

                                                c9f37989d0401fb8df442b311fb69796cca7a6389e8ed19ab51a8f544901795449fa462712885f9645f68dff56da7548f4f1500529b2521862cb1cf4fa18ee7d

                                              • C:\Users\Admin\AppData\Local\Temp\C17C.exe

                                                Filesize

                                                1KB

                                                MD5

                                                dd249c54dc46b4ac48c41833517de08e

                                                SHA1

                                                87ecca4d0704e00b7cba3bcd367d1af6a04567f6

                                                SHA256

                                                2af90efaddea4d059f2301e057f4d208475c40709e69c1e6a2e76e5d229257a5

                                                SHA512

                                                180e333ea2f375722b30a73c703bf68624e86faef9a804f50f4becdd20c68500461f8c8c453d5a3e6563ecee6379ee988ceffb38a7101f548266af619e1b2e69

                                              • C:\Users\Admin\AppData\Local\Temp\C17C.exe

                                                Filesize

                                                196KB

                                                MD5

                                                ec9c9a9e0267ede15678e23d37bf37ad

                                                SHA1

                                                6a9c9b14d4d607d0a0f2289137a24ab5870ba735

                                                SHA256

                                                4659afaaa60af9156393cb56dd680ff9fd1f98c9d8592f30952d56c384956f63

                                                SHA512

                                                3ca611c9cea8feed5743548cd519f130df24c6d959ab9bee20c5caf482adb1b167950ce11db8118b86ce0b4759f8ac6ce8324ed39b7206205e89c3a859a1768e

                                              • C:\Users\Admin\AppData\Local\Temp\C5D0.exe

                                                Filesize

                                                5.9MB

                                                MD5

                                                e3465bcef591b93b16788fb546b71b7f

                                                SHA1

                                                0d6fcf9407712deb6cc44b022ba70124756e36d8

                                                SHA256

                                                e51dd4d244b9c9b15888106770b107644eff238ee7662007733d94f68282c298

                                                SHA512

                                                3eb4d5f1a704b2fd76959491385f63974e63ba8e5e9f8cc0084a32bfed49076f2ff569bdb3afaa2b20be4e981eb00bda97e0fe18bd9545ba4cdd073ba7d84e4a

                                              • C:\Users\Admin\AppData\Local\Temp\D44A.exe

                                                Filesize

                                                84KB

                                                MD5

                                                a157ae17cc7898a0fe244f1ef4ed9032

                                                SHA1

                                                99e44af57c7fa1759e6e799b0ca1376b7ed2b99c

                                                SHA256

                                                19bc31c04da2447f28025ba528f7759a451295735371cba8f89cb49d4cf4e4a2

                                                SHA512

                                                cbe1e60b59add5928d92147f567556df0f5177fb698a351296f35b4621837d635e5048f47ed8280b33fe2c6ddeb16680a9d2e6152aaa58c4cc342885fa5974ae

                                              • C:\Users\Admin\AppData\Local\Temp\D44A.exe

                                                Filesize

                                                36KB

                                                MD5

                                                fcd3d56573bd21b9637e94e5805d05d6

                                                SHA1

                                                62c11063ae86880ec6b4d009373adc13e5bc9d75

                                                SHA256

                                                f8d3c4c415813a0cb6126ef27562b9d00bb0a3d7f345e5eba3570131b70a0547

                                                SHA512

                                                cbb1f4629d23f2eb1f755bc315222f44a6a6096f6df7128c655b30a8a183b6de54e19d6b93ac18d49482c34f50917655b2d3f44d3682602f30385ce987cdb951

                                              • C:\Users\Admin\AppData\Local\Temp\EAA1.exe

                                                Filesize

                                                85KB

                                                MD5

                                                33ed1eea8091ef20f81d21181cf051c0

                                                SHA1

                                                5ba7de718c5a8e5d6961cd64529ac7d140228218

                                                SHA256

                                                3dc7598dd95fa135da3362fbc56393351be13a834b829ce3a4a1c9d8902034d4

                                                SHA512

                                                2d80c604aa69751770b40b3c2b635bbf21a324138b9a6708702dfc8dcd4800cb4cc8c9674e4f75520ac3c218f60afeacd6cc7577c044ba5789129d0a9784b292

                                              • C:\Users\Admin\AppData\Local\Temp\EAA1.exe

                                                Filesize

                                                116KB

                                                MD5

                                                d041babea71657ba4e0892e70b292456

                                                SHA1

                                                21456182406aa04724a328c9e42c8ff1e872e844

                                                SHA256

                                                e95777a6c6d7b5d8a009c8cfb14be22858ed60c1dfc4bfb23a5c289d73f54dd0

                                                SHA512

                                                19fb2a7a18aa7cd79505dc372d57a6a3d34de8d8f4e172536f6db4cf5889fba410414f45a2fe7fc0d5f0e14d042c07e7dbabc175d6f0bd071aece0ab1ea6f12f

                                              • C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe

                                                Filesize

                                                172KB

                                                MD5

                                                b8315cfd2eb8934e055797d5bb146077

                                                SHA1

                                                e99938c326061397585b0fb9040636bc5c053790

                                                SHA256

                                                4667e44f4a30db7ba87046b2a65da65c0c1edeeaa66ebef2a2b38d92fad1ce0f

                                                SHA512

                                                59d826f1c810421b8eb8fc803a75db1fe2e300895f744d2805cd2570e902c4b6084955969ee0b973fc2b59d7839af9b4e15ad88455d7bd7be1d3c941f49c4db1

                                              • C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe

                                                Filesize

                                                355KB

                                                MD5

                                                957a80a11cfe590a3f5abb7c75b47d87

                                                SHA1

                                                03a008700cdd519dfeba21e0d7c4cd81c2b399d6

                                                SHA256

                                                61757fe6382b42bb845d4f88d25561d3cb9297188fdda1566560c1993cb97325

                                                SHA512

                                                fb70def1928924d6dec881edea4499293f87540a1a9f7ea84ecc46bee61473d535ccffdeceda4fae10ffd13b78637d129fafac1c2960c61625a1581ed636bef9

                                              • C:\Users\Admin\AppData\Local\Temp\InstallSetup7.exe

                                                Filesize

                                                272KB

                                                MD5

                                                26d351b9ab12326d71c2510b9ed4be25

                                                SHA1

                                                154b303cea739c2d006ed7cffc4638f14699831b

                                                SHA256

                                                c8de8f609792c1168f56c3ac9c96338e5773b449bbfc7a89b25f2a845bdee889

                                                SHA512

                                                3e7b15d35de4081dfc5b26942a54d9981a3ceb14a35fb582fb6d83104f28cbf847ffcada3148935cd00bb3a2b401eec63a1ce5b8bda32a174d2f3f0c00066916

                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5viyz0mo.eha.ps1

                                                Filesize

                                                60B

                                                MD5

                                                d17fe0a3f47be24a6453e9ef58c94641

                                                SHA1

                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                SHA256

                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                SHA512

                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                Filesize

                                                33KB

                                                MD5

                                                443561ef0e3ec8b2af1f9480859c1a5c

                                                SHA1

                                                9014a1c4d184f16d1eb7c01a0a075407bcda1cb0

                                                SHA256

                                                5c1f9f9780eff756f3f633d82ed80b68c0dbee22c3b4d651aadd59095d18d38e

                                                SHA512

                                                712e7f5678181fd3a8cb522d309a2797f7ea5e30a3b14e3b14c8112aef051a3d52f48c6ea740c1d716f80d8574a6dc0939f967148a9ab4aa43b0700e0854ee22

                                              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                Filesize

                                                29KB

                                                MD5

                                                d333779616873dffa5a094b85ebf3736

                                                SHA1

                                                e730326af889171f65065fc24237d183f7a3403e

                                                SHA256

                                                0b51d3cd0da4fc2eceeb9be0176ea7896cb57ced335cc0553e6d65c56f337fb4

                                                SHA512

                                                5ede4c74271dd8a90e5c1bdf7f14250c8df44883f3a5be8d8fb165544a2f45204b119034c14ce2fbdefbfa0826d163f5d8920a0e8d13c17c6aaed40c6f1fe87e

                                              • C:\Users\Admin\AppData\Local\Temp\eff1401c19\Dctooux.exe

                                                Filesize

                                                763KB

                                                MD5

                                                14f7c4b98e2c837e555d030bfbe740c4

                                                SHA1

                                                695e50ac70754d449445343764d8a0c339323a04

                                                SHA256

                                                585892aac1dd2104c9dc5badf75efbc0d5f363456c084741af5e251402473de0

                                                SHA512

                                                c72065546378ea95362d370b6e5fe6aa75e197c2a156193057f6ffe0f4c010ad3a2d7b6d024b02f7aee91b97dd6740833911107bcdb8a7fae2316e0ef8228cc5

                                              • C:\Users\Admin\AppData\Local\Temp\nsg5779.tmp

                                                Filesize

                                                85KB

                                                MD5

                                                ef6ced7c8674793c749ec94b1348f68f

                                                SHA1

                                                71e369ecd7436ba84d606c595e06366788861781

                                                SHA256

                                                f2e0b6c6aba26c73ec21827f35d4411c440b8ccfc1db807df0f9106620861be1

                                                SHA512

                                                62ba3b93a9190e401adad9d4b5bf5786cafabd8e5a2142bd87c928d1e541f458f06e6ad753395591c57d015ca0445fb0275ac8f85320a7ba7883e29546ca2c89

                                              • C:\Users\Admin\AppData\Local\Temp\nsg5779.tmp

                                                Filesize

                                                102KB

                                                MD5

                                                8d086334d668e8893dae7aad3d7b7841

                                                SHA1

                                                71adf1431a988e334307cff0a3f66cc90e2781e5

                                                SHA256

                                                da5aa804363ed8e916b340fe07d8f4272d1fb2598be844daa5e583b7a36ca469

                                                SHA512

                                                4f50a17e9440f128306db587c53e7bdf55e050fcc41c848e9e078123264e46217ae99d70abdc21db87b3e347e1065615718485bbfd55fae054aabf07e595fb60

                                              • C:\Users\Admin\AppData\Local\Temp\nsv53DF.tmp\INetC.dll

                                                Filesize

                                                25KB

                                                MD5

                                                40d7eca32b2f4d29db98715dd45bfac5

                                                SHA1

                                                124df3f617f562e46095776454e1c0c7bb791cc7

                                                SHA256

                                                85e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9

                                                SHA512

                                                5fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d

                                              • C:\Users\Admin\AppData\Local\Temp\rty25.exe

                                                Filesize

                                                210KB

                                                MD5

                                                b6e24fbaf738d30b963e11683884a677

                                                SHA1

                                                e3a807617f79bdb6e9664ec8b582960206fbdd99

                                                SHA256

                                                2f623c7c5d6e47bbb68d80dd0b98630b9e3abf65d140e5ca6749dc5b69b347b6

                                                SHA512

                                                668df5aeff20636f5ae7625b88df05abb37aff50287b0c99b91592eced87c69cdde543d207746251a104e0fb6498ef0ff731f49535acb971ffaf755c98df648a

                                              • C:\Users\Admin\AppData\Local\Temp\rty25.exe

                                                Filesize

                                                184KB

                                                MD5

                                                1685a9bf9c71c192ef0bad6c72bb111a

                                                SHA1

                                                9282e6a7c2fa8e17f47cfb1717d0c2b500a2d010

                                                SHA256

                                                93ed4551852528edc7153df42b33b2bda47dfebd65ada2a57005c37f013abef7

                                                SHA512

                                                81f36889f2e9ee7004fdc15788f7aa294647f4ac8715297782d4416f39490f1ca497741ea2a2ef2ec9bdbaa3479e43a8725629c7d6ab9b918580682e0d7f173f

                                              • C:\Users\Admin\AppData\Local\Temp\rty25.exe

                                                Filesize

                                                286KB

                                                MD5

                                                7023d34f9dbd4144eb81b586268a21a7

                                                SHA1

                                                966b76c061352a8eb07bfd1a66446af0a212c918

                                                SHA256

                                                1e2bbe1dff7ee04555e7851b63f2e504461b2dda4b2d4948a247dcf4dc9ded75

                                                SHA512

                                                9e140767316ae716414b17544113d9bdb883fc6394c62f2b543ec1eefb46f6b83d369c5ab599faf1d28d391df887c1ff47e0850b5a34ab92f041cf1ee5a90578

                                              • C:\Users\Admin\AppData\Local\Temp\toolspub1.exe

                                                Filesize

                                                230KB

                                                MD5

                                                219e7425b61f8b9f627e1a4659901f2d

                                                SHA1

                                                651ef7d25f58ddcc3d71d2d43078a9112929cde9

                                                SHA256

                                                137aaf991507d90ad86343ea960b798f349504fcbdc3b004ffd9a50366b6c1b9

                                                SHA512

                                                70c20cad836330c262939882b31456c17e19c7fb120f64642910f69cdb68a4bf9a97b9fc46e337f3715b73ba7e7415ac7454b38d97124d98c626a6b6a4243694

                                              • C:\Users\Admin\AppData\Local\TraceGuard Systems\SmartTrace.pif

                                                Filesize

                                                1.0MB

                                                MD5

                                                bfa84dbde0df8f1cad3e179bd46a6e34

                                                SHA1

                                                06ae3c38d4b2f8125656268925ebde9eca6a1f9e

                                                SHA256

                                                6de412b8674ffba5d78ff9d36abffbe2cf86fd08b2231592fca2fcf41f1f2314

                                                SHA512

                                                edd4c839437570003e1cc4a04e6cb7bf8c70c0ebdae741e69782e9bdf47c42441cd8d709170898859b94b3248cccf0e9dfa5e183c110b93ded935ce69a0ff82a

                                              • C:\Users\Admin\AppData\Local\d5473b6a-447f-4deb-9b2e-3cd4d9e26941\C17C.exe

                                                Filesize

                                                21KB

                                                MD5

                                                97bd0e2442d4a0e07006be0ae0a2e99d

                                                SHA1

                                                faff74d28e929c95bbd675a016d077be6207d064

                                                SHA256

                                                827e2f8ecb648dffa6570c3785c73fe5ae1abdba80ddd9316b05111e4d97b041

                                                SHA512

                                                d69d5b082d29bb5965e787fc79479be87cda3d78e75bdddb33ea2c0a6454078092517a8b40b1159271957a28e6e51ef5cd115a6c5621855c42baab0610911b33

                                              • C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe

                                                Filesize

                                                3.9MB

                                                MD5

                                                02569a7a91a71133d4a1023bf32aa6f4

                                                SHA1

                                                0f16bcb3f3f085d3d3be912195558e9f9680d574

                                                SHA256

                                                8d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0

                                                SHA512

                                                534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322

                                              • C:\Users\Admin\AppData\Roaming\Temp\Task.bat

                                                Filesize

                                                128B

                                                MD5

                                                11bb3db51f701d4e42d3287f71a6a43e

                                                SHA1

                                                63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                                                SHA256

                                                6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                                                SHA512

                                                907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                Filesize

                                                2KB

                                                MD5

                                                3d086a433708053f9bf9523e1d87a4e8

                                                SHA1

                                                b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

                                                SHA256

                                                6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

                                                SHA512

                                                931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                Filesize

                                                19KB

                                                MD5

                                                fde1a0c3372534c4ab896954353a0aa1

                                                SHA1

                                                dec6475db21a51320ba7cb50e47c142a706a9004

                                                SHA256

                                                6d20fcaa4533883850b585216d5dabeec5e14c1bc130e5bf879420a404741de7

                                                SHA512

                                                df13c8e6b4747a7ba1fe0a510c03fec6cddd9a236299eb0df04de74df813fe7117a2815b4697fd5ab798aaebe45bb95857a62904947a1e9fcc56e32e2453dabe

                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                Filesize

                                                19KB

                                                MD5

                                                d9b9586b771060254fab47c41991c5b2

                                                SHA1

                                                cf40cc6165ce36974627565eccf98056576c4aa2

                                                SHA256

                                                0ed0b3284bd56b7923c96a1002e75017fe0b27a091d2b7f542f5ae7cd13c058f

                                                SHA512

                                                f6cb74a0ea9071d8a336204f024937fae96a168b8b62403a4d40ae2775af589b34e32ffe32f81c8bb51d0cba4f1671f5621c64368932528f9f09785d8761e6d6

                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                Filesize

                                                19KB

                                                MD5

                                                1e4d66eefd9e4205ffe3b4c39c500a97

                                                SHA1

                                                bc7e633bba35635f04eca91fdfafb55151e31124

                                                SHA256

                                                f8ba34bb4157cefcabc13bd3bedfc13eb6d7e393a72d5200604836fd24cec264

                                                SHA512

                                                2c0192e3ed3bb53c6fb5360012a9af07dd599bded3c058298485f642fc074b62c9bc7d25344acd7530d3b31e0a0da1da52af44730e0fd5fc267a908daf0164d6

                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                Filesize

                                                11KB

                                                MD5

                                                79e34fe229c8ddc3f965ab3fbe46bbfb

                                                SHA1

                                                e7a551d8d281658fedde0a59534a34810a1d7482

                                                SHA256

                                                ac4793cb0797dc819465abd9305a4ef8306df7aa4e14d99ddb033d81080cfd29

                                                SHA512

                                                3da551a1947b8f5aafc9414ecef414b28a03c3acd5a183e007f8436b22686c418d8be80716c66c9d416a10b532c8ba7a66490b195e728124ff873db2e1fb955d

                                              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                Filesize

                                                19KB

                                                MD5

                                                b2e3d81e743402f095c197f3388d2ae9

                                                SHA1

                                                dc08908e76a92227a1480fdf10e7f0582fe083fd

                                                SHA256

                                                35502b54bdeeb970d4a2d3b346e319ae212f29b9efa30a3c0bed72c1d88a6340

                                                SHA512

                                                e468c62bf33f68f921496e3f54fe73fb21a9d4a11593c12492883b92677fda14a0c90b9199a0fc571edcb5cd7f6de04947d0ddbbcf93056e6a40659393499b9c

                                              • C:\Windows\rss\csrss.exe

                                                Filesize

                                                19KB

                                                MD5

                                                e6d884994c478ed751b80739009d9171

                                                SHA1

                                                b2f41ab5a514c8099ef66bbb0a614bef52382403

                                                SHA256

                                                04bb4a04bac7c9aa88a9938fe836dc5646379b96750866ce1841d61365ccddca

                                                SHA512

                                                a54cae739e76adf3b3bacfe2f0174f7990b812c580692e35e488dd7c575f5f5a3c0846e5840cd8bc9df54c76c006de8143e7a3c83075588eeaa54bf2d52c5981

                                              • C:\Windows\windefender.exe

                                                Filesize

                                                125KB

                                                MD5

                                                9c0a3a5194bfdf87cd62c4d2d93f7422

                                                SHA1

                                                8a29a23943104e23d7479700fa333823d7857ef5

                                                SHA256

                                                adda7b28875b21fa0bba1118c2eb267a045cfad3499460a5f65984fbb88e20c4

                                                SHA512

                                                935012dbfc7fbd5cd5d694d0f14426666538103efeceacc7bf03cce609865043be41829757c2923599b066c2b5e47dff8f8c5adbff8d5f3b2ed02d3a0912f800

                                              • C:\Windows\windefender.exe

                                                Filesize

                                                113KB

                                                MD5

                                                e17a0911b10bed11e8813cceaf99a8a8

                                                SHA1

                                                548e4ce4dc66b2a597b5a786d587c76a998e56dd

                                                SHA256

                                                953d4d6d34095dc435d16aa7ab1fd7a0cff14e75079b23382e5329bbd6aa56aa

                                                SHA512

                                                64a442af33d854144a831dbeb1cde79eebd2c9cfc65dd3a43850f8cd2e1ec5867bc10b88bdf66cea8510ad9cc70602ab5ecd986051bb3be293b17e5302ffdef2

                                              • C:\Windows\windefender.exe

                                                Filesize

                                                93KB

                                                MD5

                                                8749fbc252c78aacf0215699077c4fd3

                                                SHA1

                                                3e40881d93b095dbac99a979a79068b0de6eec6d

                                                SHA256

                                                edd53c872c1033ad121b7639caf6fc6c345b7b51bcdc8cb1a8ae195ff415f9bf

                                                SHA512

                                                3eb2feb95e696a748d4bb39ed3c72e7c95399e983e17c4eaf6138a06b13517951c5efdbeeda9adb6f71d94b5dbb3e5254224d0afe2353a5fa1b187f4ee847936

                                              • memory/516-48-0x00000000753B0000-0x0000000075B60000-memory.dmp

                                                Filesize

                                                7.7MB

                                              • memory/516-0-0x00000000753B0000-0x0000000075B60000-memory.dmp

                                                Filesize

                                                7.7MB

                                              • memory/516-1-0x00000000002F0000-0x000000000095E000-memory.dmp

                                                Filesize

                                                6.4MB

                                              • memory/812-123-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                Filesize

                                                9.1MB

                                              • memory/812-235-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                Filesize

                                                9.1MB

                                              • memory/812-119-0x00000000012B0000-0x00000000016B1000-memory.dmp

                                                Filesize

                                                4.0MB

                                              • memory/816-41-0x00007FF6CB380000-0x00007FF6CB3D2000-memory.dmp

                                                Filesize

                                                328KB

                                              • memory/816-131-0x0000000003010000-0x0000000003140000-memory.dmp

                                                Filesize

                                                1.2MB

                                              • memory/816-130-0x0000000002DD0000-0x0000000002EDC000-memory.dmp

                                                Filesize

                                                1.0MB

                                              • memory/1496-501-0x0000000000400000-0x00000000008DF000-memory.dmp

                                                Filesize

                                                4.9MB

                                              • memory/1496-550-0x0000000000400000-0x00000000008DF000-memory.dmp

                                                Filesize

                                                4.9MB

                                              • memory/2320-418-0x0000000000400000-0x0000000000537000-memory.dmp

                                                Filesize

                                                1.2MB

                                              • memory/2320-422-0x0000000000400000-0x0000000000537000-memory.dmp

                                                Filesize

                                                1.2MB

                                              • memory/2320-439-0x0000000000400000-0x0000000000537000-memory.dmp

                                                Filesize

                                                1.2MB

                                              • memory/2320-420-0x0000000000400000-0x0000000000537000-memory.dmp

                                                Filesize

                                                1.2MB

                                              • memory/2528-148-0x0000000002460000-0x0000000002461000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2528-52-0x0000000002460000-0x0000000002461000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2528-219-0x0000000000400000-0x00000000008E2000-memory.dmp

                                                Filesize

                                                4.9MB

                                              • memory/2724-30-0x0000000000400000-0x000000000085C000-memory.dmp

                                                Filesize

                                                4.4MB

                                              • memory/2724-124-0x0000000000400000-0x000000000085C000-memory.dmp

                                                Filesize

                                                4.4MB

                                              • memory/2724-26-0x0000000000980000-0x000000000098B000-memory.dmp

                                                Filesize

                                                44KB

                                              • memory/2724-90-0x0000000000990000-0x0000000000A90000-memory.dmp

                                                Filesize

                                                1024KB

                                              • memory/2724-23-0x0000000000990000-0x0000000000A90000-memory.dmp

                                                Filesize

                                                1024KB

                                              • memory/3092-495-0x0000000000C30000-0x0000000000C31000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/3092-497-0x0000000000E50000-0x0000000001704000-memory.dmp

                                                Filesize

                                                8.7MB

                                              • memory/3288-365-0x0000000000400000-0x00000000008DF000-memory.dmp

                                                Filesize

                                                4.9MB

                                              • memory/3352-455-0x0000000004A00000-0x0000000004A16000-memory.dmp

                                                Filesize

                                                88KB

                                              • memory/3352-121-0x0000000002C20000-0x0000000002C36000-memory.dmp

                                                Filesize

                                                88KB

                                              • memory/3708-456-0x0000000000400000-0x000000000085F000-memory.dmp

                                                Filesize

                                                4.4MB

                                              • memory/3724-446-0x0000000000400000-0x0000000000537000-memory.dmp

                                                Filesize

                                                1.2MB

                                              • memory/3724-449-0x0000000000400000-0x0000000000537000-memory.dmp

                                                Filesize

                                                1.2MB

                                              • memory/3724-447-0x0000000000400000-0x0000000000537000-memory.dmp

                                                Filesize

                                                1.2MB

                                              • memory/3860-494-0x0000000000400000-0x000000000085F000-memory.dmp

                                                Filesize

                                                4.4MB

                                              • memory/3860-526-0x0000000000400000-0x000000000085F000-memory.dmp

                                                Filesize

                                                4.4MB

                                              • memory/3860-374-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                Filesize

                                                972KB

                                              • memory/3944-51-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                Filesize

                                                9.1MB

                                              • memory/3944-49-0x0000000002C90000-0x000000000357B000-memory.dmp

                                                Filesize

                                                8.9MB

                                              • memory/3944-50-0x00000000010F0000-0x00000000014EC000-memory.dmp

                                                Filesize

                                                4.0MB

                                              • memory/3944-120-0x0000000002C90000-0x000000000357B000-memory.dmp

                                                Filesize

                                                8.9MB

                                              • memory/3944-128-0x00000000010F0000-0x00000000014EC000-memory.dmp

                                                Filesize

                                                4.0MB

                                              • memory/3944-129-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                Filesize

                                                9.1MB

                                              • memory/4484-480-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                Filesize

                                                9.1MB

                                              • memory/4484-537-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                Filesize

                                                9.1MB

                                              • memory/4484-549-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                Filesize

                                                9.1MB

                                              • memory/4484-343-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                Filesize

                                                9.1MB

                                              • memory/4620-89-0x00000000072A0000-0x00000000072BA000-memory.dmp

                                                Filesize

                                                104KB

                                              • memory/4620-82-0x0000000005F20000-0x0000000005F6C000-memory.dmp

                                                Filesize

                                                304KB

                                              • memory/4620-57-0x00000000749F0000-0x00000000751A0000-memory.dmp

                                                Filesize

                                                7.7MB

                                              • memory/4620-59-0x0000000004910000-0x0000000004920000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4620-60-0x0000000004910000-0x0000000004920000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4620-58-0x0000000004960000-0x0000000004996000-memory.dmp

                                                Filesize

                                                216KB

                                              • memory/4620-61-0x0000000004FD0000-0x00000000055F8000-memory.dmp

                                                Filesize

                                                6.2MB

                                              • memory/4620-65-0x0000000005830000-0x0000000005896000-memory.dmp

                                                Filesize

                                                408KB

                                              • memory/4620-71-0x00000000058A0000-0x0000000005906000-memory.dmp

                                                Filesize

                                                408KB

                                              • memory/4620-77-0x0000000005A10000-0x0000000005D64000-memory.dmp

                                                Filesize

                                                3.3MB

                                              • memory/4620-62-0x0000000004F30000-0x0000000004F52000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/4620-81-0x0000000005EE0000-0x0000000005EFE000-memory.dmp

                                                Filesize

                                                120KB

                                              • memory/4620-86-0x0000000006420000-0x0000000006464000-memory.dmp

                                                Filesize

                                                272KB

                                              • memory/4620-87-0x0000000007200000-0x0000000007276000-memory.dmp

                                                Filesize

                                                472KB

                                              • memory/4620-88-0x0000000007900000-0x0000000007F7A000-memory.dmp

                                                Filesize

                                                6.5MB

                                              • memory/4620-116-0x00000000749F0000-0x00000000751A0000-memory.dmp

                                                Filesize

                                                7.7MB

                                              • memory/4620-112-0x0000000007670000-0x000000000768A000-memory.dmp

                                                Filesize

                                                104KB

                                              • memory/4620-105-0x0000000004910000-0x0000000004920000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4620-113-0x0000000007660000-0x0000000007668000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/4620-110-0x0000000007600000-0x000000000760E000-memory.dmp

                                                Filesize

                                                56KB

                                              • memory/4620-111-0x0000000007620000-0x0000000007634000-memory.dmp

                                                Filesize

                                                80KB

                                              • memory/4620-92-0x000000007F7E0000-0x000000007F7F0000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4620-91-0x0000000007460000-0x0000000007492000-memory.dmp

                                                Filesize

                                                200KB

                                              • memory/4620-93-0x00000000740B0000-0x00000000740FC000-memory.dmp

                                                Filesize

                                                304KB

                                              • memory/4620-109-0x00000000075C0000-0x00000000075D1000-memory.dmp

                                                Filesize

                                                68KB

                                              • memory/4620-108-0x00000000076C0000-0x0000000007756000-memory.dmp

                                                Filesize

                                                600KB

                                              • memory/4620-94-0x00000000719B0000-0x0000000071D04000-memory.dmp

                                                Filesize

                                                3.3MB

                                              • memory/4620-104-0x00000000074A0000-0x00000000074BE000-memory.dmp

                                                Filesize

                                                120KB

                                              • memory/4620-106-0x00000000074C0000-0x0000000007563000-memory.dmp

                                                Filesize

                                                652KB

                                              • memory/4620-107-0x00000000075B0000-0x00000000075BA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/4868-516-0x0000000000400000-0x0000000000454000-memory.dmp

                                                Filesize

                                                336KB

                                              • memory/4908-134-0x0000000004C20000-0x0000000004C30000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4908-144-0x00000000059E0000-0x0000000005D34000-memory.dmp

                                                Filesize

                                                3.3MB

                                              • memory/4908-133-0x0000000004C20000-0x0000000004C30000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4908-168-0x00000000749F0000-0x00000000751A0000-memory.dmp

                                                Filesize

                                                7.7MB

                                              • memory/4908-132-0x00000000749F0000-0x00000000751A0000-memory.dmp

                                                Filesize

                                                7.7MB

                                              • memory/4908-145-0x0000000006020000-0x000000000606C000-memory.dmp

                                                Filesize

                                                304KB

                                              • memory/4908-151-0x00000000740B0000-0x0000000074404000-memory.dmp

                                                Filesize

                                                3.3MB

                                              • memory/4908-163-0x0000000004C20000-0x0000000004C30000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4908-162-0x0000000007220000-0x00000000072C3000-memory.dmp

                                                Filesize

                                                652KB

                                              • memory/4908-161-0x0000000004C20000-0x0000000004C30000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4908-150-0x0000000072BC0000-0x0000000072C0C000-memory.dmp

                                                Filesize

                                                304KB

                                              • memory/4908-149-0x000000007F6F0000-0x000000007F700000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4908-164-0x0000000007550000-0x0000000007561000-memory.dmp

                                                Filesize

                                                68KB

                                              • memory/4908-165-0x00000000075A0000-0x00000000075B4000-memory.dmp

                                                Filesize

                                                80KB