Analysis

  • max time kernel
    153s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2024 18:03

General

  • Target

    tmp.exe

  • Size

    6.3MB

  • MD5

    c67cb967230036816fd0cbbfd96959c6

  • SHA1

    d2fe988a302dce4bc0f34a1003a623f96a06b250

  • SHA256

    d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76

  • SHA512

    2f51046e44bdfa470f676071c69da8c05d50d8f79e748748f25ac13ec53d346f1c3988148000fea3ece38623fd629d1b3dcc943006e80b7bee95da7f1f42920c

  • SSDEEP

    196608:GHqO3grg0lAc4G+JCJjsP8BXkf/hmzJzFYngA13jvHKvj4:GHzCOc4G+oB0BmdFY31zq

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

stealc

C2

http://185.172.128.79

Attributes
  • url_path

    /3886d2276f6914c4.php

rc4.plain

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://habrafa.com/test1/get.php

Attributes
  • extension

    .cdcc

  • offline_id

    LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://habrafa.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@freshingmail.top Reserve e-mail address to contact us: datarestorehelpyou@airmail.cc Your personal ID: 0846ASdw

rsa_pubkey.plain

Extracted

Family

redline

Botnet

Exodus

C2

93.123.39.68:1334

Signatures

  • DcRat 4 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detected Djvu ransomware 7 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 13 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 23 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • DcRat
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe
      "C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5060
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5016
      • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe
        "C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks for VirtualBox DLLs, possible anti-VM trick
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:2784
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:656
        • C:\Windows\system32\cmd.exe
          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3756
          • C:\Windows\system32\netsh.exe
            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
            5⤵
            • Modifies Windows Firewall
            PID:3676
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:4660
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:5096
        • C:\Windows\rss\csrss.exe
          C:\Windows\rss\csrss.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Manipulates WinMonFS driver.
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          PID:4988
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            5⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:208
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            5⤵
            • DcRat
            • Creates scheduled task(s)
            PID:2024
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /delete /tn ScheduledUpdate /f
            5⤵
              PID:4116
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious use of AdjustPrivilegeToken
              PID:3740
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious use of AdjustPrivilegeToken
              PID:1052
            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
              C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
              5⤵
              • Executes dropped EXE
              PID:3236
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
              5⤵
              • DcRat
              • Creates scheduled task(s)
              PID:4376
            • C:\Windows\windefender.exe
              "C:\Windows\windefender.exe"
              5⤵
              • Executes dropped EXE
              PID:2436
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                  PID:2184
                  • C:\Windows\SysWOW64\sc.exe
                    sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                    7⤵
                    • Launches sc.exe
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1896
        • C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe
          "C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:3164
          • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
            C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1528
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2352
              • C:\Windows\SysWOW64\chcp.com
                chcp 1251
                5⤵
                  PID:2628
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                  5⤵
                  • DcRat
                  • Creates scheduled task(s)
                  PID:4352
            • C:\Users\Admin\AppData\Local\Temp\nsxF1B5.tmp
              C:\Users\Admin\AppData\Local\Temp\nsxF1B5.tmp
              3⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks processor information in registry
              • Suspicious use of WriteProcessMemory
              PID:4496
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nsxF1B5.tmp" & del "C:\ProgramData\*.dll"" & exit
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2912
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 5
                  5⤵
                  • Delays execution with timeout.exe
                  PID:3760
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 2232
                4⤵
                • Program crash
                PID:940
          • C:\Users\Admin\AppData\Local\Temp\toolspub1.exe
            "C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"
            2⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            PID:1360
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4496 -ip 4496
          1⤵
            PID:4464
          • C:\Users\Admin\AppData\Local\Temp\752B.exe
            C:\Users\Admin\AppData\Local\Temp\752B.exe
            1⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            • Suspicious behavior: MapViewOfSection
            PID:3444
          • C:\Users\Admin\AppData\Local\Temp\8E71.exe
            C:\Users\Admin\AppData\Local\Temp\8E71.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4104
            • C:\Users\Admin\AppData\Local\Temp\8E71.exe
              C:\Users\Admin\AppData\Local\Temp\8E71.exe
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:1736
              • C:\Windows\SysWOW64\icacls.exe
                icacls "C:\Users\Admin\AppData\Local\449ef933-f517-4d7f-8de2-db3b65fec0bd" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                3⤵
                • Modifies file permissions
                PID:3788
              • C:\Users\Admin\AppData\Local\Temp\8E71.exe
                "C:\Users\Admin\AppData\Local\Temp\8E71.exe" --Admin IsNotAutoStart IsNotTask
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:388
                • C:\Users\Admin\AppData\Local\Temp\8E71.exe
                  "C:\Users\Admin\AppData\Local\Temp\8E71.exe" --Admin IsNotAutoStart IsNotTask
                  4⤵
                  • Executes dropped EXE
                  PID:2276
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 592
                    5⤵
                    • Program crash
                    PID:1992
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2276 -ip 2276
            1⤵
              PID:656
            • C:\Windows\windefender.exe
              C:\Windows\windefender.exe
              1⤵
              • Executes dropped EXE
              • Modifies data under HKEY_USERS
              PID:1808
            • C:\Users\Admin\AppData\Local\Temp\6431.exe
              C:\Users\Admin\AppData\Local\Temp\6431.exe
              1⤵
              • Executes dropped EXE
              PID:4512
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 340
                2⤵
                • Program crash
                PID:3392
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 1072
                2⤵
                • Program crash
                PID:3304
            • C:\Users\Admin\AppData\Local\Temp\B2CF.exe
              C:\Users\Admin\AppData\Local\Temp\B2CF.exe
              1⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              PID:464
            • C:\Users\Admin\AppData\Local\Temp\C1A4.exe
              C:\Users\Admin\AppData\Local\Temp\C1A4.exe
              1⤵
              • Executes dropped EXE
              PID:2000
              • C:\Users\Admin\AppData\Local\Temp\is-KRQ7L.tmp\C1A4.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-KRQ7L.tmp\C1A4.tmp" /SL5="$80242,7448198,54272,C:\Users\Admin\AppData\Local\Temp\C1A4.exe"
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of FindShellTrayWindow
                PID:1084
                • C:\Users\Admin\AppData\Local\Py Object Serialization\pyobjserialization.exe
                  "C:\Users\Admin\AppData\Local\Py Object Serialization\pyobjserialization.exe" -i
                  3⤵
                  • Executes dropped EXE
                  PID:4432
                • C:\Users\Admin\AppData\Local\Py Object Serialization\pyobjserialization.exe
                  "C:\Users\Admin\AppData\Local\Py Object Serialization\pyobjserialization.exe" -s
                  3⤵
                  • Executes dropped EXE
                  PID:64
            • C:\Users\Admin\AppData\Local\Temp\C762.exe
              C:\Users\Admin\AppData\Local\Temp\C762.exe
              1⤵
              • Executes dropped EXE
              PID:1900
            • C:\Users\Admin\AppData\Local\Temp\CA22.exe
              C:\Users\Admin\AppData\Local\Temp\CA22.exe
              1⤵
              • Executes dropped EXE
              PID:3620
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4512 -ip 4512
              1⤵
                PID:392
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4512 -ip 4512
                1⤵
                  PID:752

                Network

                MITRE ATT&CK Matrix ATT&CK v13

                Execution

                Scheduled Task/Job

                1
                T1053

                Persistence

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Scheduled Task/Job

                1
                T1053

                Privilege Escalation

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Scheduled Task/Job

                1
                T1053

                Defense Evasion

                Virtualization/Sandbox Evasion

                2
                T1497

                Impair Defenses

                1
                T1562

                Disable or Modify System Firewall

                1
                T1562.004

                File and Directory Permissions Modification

                1
                T1222

                Modify Registry

                1
                T1112

                Credential Access

                Unsecured Credentials

                3
                T1552

                Credentials In Files

                3
                T1552.001

                Discovery

                Query Registry

                8
                T1012

                Virtualization/Sandbox Evasion

                2
                T1497

                System Information Discovery

                6
                T1082

                Peripheral Device Discovery

                1
                T1120

                Collection

                Data from Local System

                3
                T1005

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\ProgramData\Are.docx
                  Filesize

                  11KB

                  MD5

                  a33e5b189842c5867f46566bdbf7a095

                  SHA1

                  e1c06359f6a76da90d19e8fd95e79c832edb3196

                  SHA256

                  5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                  SHA512

                  f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                • C:\ProgramData\mozglue.dll
                  Filesize

                  593KB

                  MD5

                  c8fd9be83bc728cc04beffafc2907fe9

                  SHA1

                  95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                  SHA256

                  ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                  SHA512

                  fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                • C:\ProgramData\nss3.dll
                  Filesize

                  2.0MB

                  MD5

                  1cc453cdf74f31e4d913ff9c10acdde2

                  SHA1

                  6e85eae544d6e965f15fa5c39700fa7202f3aafe

                  SHA256

                  ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                  SHA512

                  dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                • C:\Users\Admin\AppData\Local\Py Object Serialization\pyobjserialization.exe
                  Filesize

                  3.4MB

                  MD5

                  ba811fe25f8e5534df6b031c9495bde7

                  SHA1

                  6de3c0086c1111f0df27e0ccbeac359775e85882

                  SHA256

                  e8029529c028b6ab56767445d22619d084b2cdf7ecaafa7d765f58b20451eb5b

                  SHA512

                  c1fb7ec79883ebfd0d5a8af5a63c9a9c00aba7834816fcc107c33be2c473daa4352a0d28af28857915bb53348256894f8d0c3053eaf46d9b9e9595e6a0f4d8ad

                • C:\Users\Admin\AppData\Local\Temp\6431.exe
                  Filesize

                  5.6MB

                  MD5

                  978adeacb862253023f9c296c12ea083

                  SHA1

                  576fc339b8437045c2a34e568f2aae67f720d333

                  SHA256

                  4c917b7d4291d22d757f2bb707513c6e85c51fd268f1518eeba92128b1a0d673

                  SHA512

                  6b5049e46235b2d0d7d29fdef1f6977f03b670a822cc200dbb634352894b702624fb201b795e135d4b72e5c6456c24c8fae16a37d8454cdcf86fd25e85205561

                • C:\Users\Admin\AppData\Local\Temp\752B.exe
                  Filesize

                  238KB

                  MD5

                  8c20d9745afb54a1b59131314c15d61c

                  SHA1

                  1975f997e2db1e487c1caf570263a6a3ba135958

                  SHA256

                  a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1

                  SHA512

                  580021850dfc90647854dd9f8124418abffbe261e3d7f2e1d355dd3a40f31be24f1b9df77ad52f7fa63503a5ee857e270c156e5575e3a32387335018296128d7

                • C:\Users\Admin\AppData\Local\Temp\8E71.exe
                  Filesize

                  736KB

                  MD5

                  adb72c7dec5dd45c7f172f4d2d01e1ae

                  SHA1

                  9a375b6d4a413807e7775b87722b3f10ce1fe511

                  SHA256

                  81bc674ece66294d98951305f4734f6ef520d3331901586efb895abf353b3be3

                  SHA512

                  e9da509a506028ee72cfb986bba23a158ee40f58f516b423b1cc7d20472299fc0791b7faf86ed13c94db7a98791a4bae63c783013793012dec43951783001c3c

                • C:\Users\Admin\AppData\Local\Temp\B2CF.exe
                  Filesize

                  2.2MB

                  MD5

                  47e5023667587217287379ac372ca4f8

                  SHA1

                  ad61e6666e7cc5f332298e0adb161a52f8b4e202

                  SHA256

                  9490a39a72a9a5d01bf638566021a758e01f7ebb1c038115a9c6a4697d106324

                  SHA512

                  27254912682ac3101398abbc4e2daa5c54408f69cf4e4b0420892957df3f6df15f35701880d56fe531e1b6263d35a3284c0e9408ee3dfa44d83104a1ad0c6da1

                • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
                  Filesize

                  2.3MB

                  MD5

                  70b05ac593ba4afd847436f2dbd542a3

                  SHA1

                  d8adc1ea4f762639a79f2f2ce2f3dece4a067e27

                  SHA256

                  dd24bebe073f6d912f3661a5944814beb824e7a655fecccb2245d768eda51a5a

                  SHA512

                  829eb47e34d72785857b964357edfcfd2e7121ed6292fed5f490a11bc8c3990902b960c7f8a4597c26b1a909befaf5cf3133f274540842d6e8b0d0c9e8fe03b7

                • C:\Users\Admin\AppData\Local\Temp\C1A4.exe
                  Filesize

                  7.3MB

                  MD5

                  9481f9c5cee80717b5bbca52d7180bfd

                  SHA1

                  95fb1288273f73275e72f7940830b04dbb0d3f9e

                  SHA256

                  13ec065be98fe2d9aa71006f8f3d0c1b519959fc66d36a3e9f6e7fcdd49d27ff

                  SHA512

                  f5bbf02f274bcfe9e0852c315692c06b0362911b769964e014dbebdee66bfbd69ea605efda7840e9dd47787b17e9381279cb1e7d27566a7adfd8725d3031bdf1

                • C:\Users\Admin\AppData\Local\Temp\C762.exe
                  Filesize

                  173KB

                  MD5

                  7e20aa23f67127f4cb8068045efe69b9

                  SHA1

                  05a2cf7984fde6ba5776f8b4b4b1e1e25d94bfc1

                  SHA256

                  e1fa577ef8003809c87669e2577463d7c1b1873e0b6300524b1f782687969d83

                  SHA512

                  6b7c545aefb536f14f1b020331832045675b70701da2568ef178144116e2e14001231384cab0c610ae98bc7c551fe90c558951fbf21d71634ff1819d044def9d

                • C:\Users\Admin\AppData\Local\Temp\CA22.exe
                  Filesize

                  95KB

                  MD5

                  57935225dcb95b6ed9894d5d5e8b46a8

                  SHA1

                  1daf36a8db0b79be94a41d27183e4904a1340990

                  SHA256

                  79d7b0f170471f44ed6c07ddb4c4c9bb20c97235aef23ac052e692cb558a156d

                  SHA512

                  1b6362bdb7f6b177773357f5fe8e7d7ee44716fd8e63e663e446f4e204af581491d05345c12cd9cca91fd249383817da21ef2241011cdc251b7e299560ea48c0

                • C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe
                  Filesize

                  2.0MB

                  MD5

                  c7dfcf13b0dc4dd685114a6a2f0233ac

                  SHA1

                  ade01a01ce38e49de0136340333aa26f92a6f43f

                  SHA256

                  3786f3f45f703b7faa2b971ac1d9cddfa14115b1926a874a294809bf747355dc

                  SHA512

                  ff5769daa32508b261d807eaa2a70ff5e942f02b1903523d6cc280ce8c07c0bc58dcc2e555e5d24ddf240570da5f821ba01540904350804dea6eafa7131f9d29

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cbuz050o.g1l.ps1
                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                  Filesize

                  281KB

                  MD5

                  d98e33b66343e7c96158444127a117f6

                  SHA1

                  bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                  SHA256

                  5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                  SHA512

                  705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe
                  Filesize

                  4.1MB

                  MD5

                  0f396cc0dba8c2ef01e51ffa06bd2f93

                  SHA1

                  05bab98b65b1211b1207936f9e23626c7fd4eeee

                  SHA256

                  17dfd514df0d171e7d96202740cdb98cc71444c580f5b317712b58bc8e74be1a

                  SHA512

                  4685fb04d756177b28c9b8dd7cac28503d68d72d205869d25d2d8cacc50a2b9c973d2194942f5de1bd4e43e2d543904b0667c57dc9000eb2c1c43bbd47217128

                • C:\Users\Admin\AppData\Local\Temp\is-KRQ7L.tmp\C1A4.tmp
                  Filesize

                  692KB

                  MD5

                  280f907fe09b532583474aea8a15205d

                  SHA1

                  165193945f3827df99147f688d0f9ad46b39f207

                  SHA256

                  6da0c231bf78d66091086c1d6d54aa18a58b9b11146656437eda3b3a2e84ee8d

                  SHA512

                  9225e327f8a7d8ec11eed15fb82a4b83c6c4f6f2d16542f4b102baa3dfd09b7edf0b7634aec69a925197e871042207a999491af662b2de3f83f8c2cc0f208699

                • C:\Users\Admin\AppData\Local\Temp\is-TFR1S.tmp\_isetup\_iscrypt.dll
                  Filesize

                  2KB

                  MD5

                  a69559718ab506675e907fe49deb71e9

                  SHA1

                  bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                  SHA256

                  2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                  SHA512

                  e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                • C:\Users\Admin\AppData\Local\Temp\nsuEB4B.tmp\INetC.dll
                  Filesize

                  25KB

                  MD5

                  40d7eca32b2f4d29db98715dd45bfac5

                  SHA1

                  124df3f617f562e46095776454e1c0c7bb791cc7

                  SHA256

                  85e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9

                  SHA512

                  5fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d

                • C:\Users\Admin\AppData\Local\Temp\nsxF1B5.tmp
                  Filesize

                  238KB

                  MD5

                  14a0bb0b90ac5ca064a42f889dd0492d

                  SHA1

                  119a3338e0814e9071b762d8bd5fff6ea2fda28c

                  SHA256

                  d0a6076bc23382609a958b7d4d50a54b01d719e24bad56fa10d9da0b083349b6

                  SHA512

                  024697eb4e1708781467396169c65e62fef5b8d65b7c1d434d28428ee7adf7628a92c1fe29c856fc1fde443337d2c48fdd42f304b350ee9d550e377e8e7d0a74

                • C:\Users\Admin\AppData\Local\Temp\tmpFE5C.tmp
                  Filesize

                  46KB

                  MD5

                  02d2c46697e3714e49f46b680b9a6b83

                  SHA1

                  84f98b56d49f01e9b6b76a4e21accf64fd319140

                  SHA256

                  522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                  SHA512

                  60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                • C:\Users\Admin\AppData\Local\Temp\tmpFEFE.tmp
                  Filesize

                  92KB

                  MD5

                  ec564f686dd52169ab5b8535e03bb579

                  SHA1

                  08563d6c547475d11edae5fd437f76007889275a

                  SHA256

                  43c07a345be732ff337e3826d82f5e220b9474b00242e335c0abb9e3fcc03433

                  SHA512

                  aa9e3cb1ae365fd5a20439bca6f7c79331a08d2f7660a36c5b8b4f57a0e51c2392b8e00f3d58af479134531dc0e6b4294210b3633f64723abd7f4bc4db013df9

                • C:\Users\Admin\AppData\Local\Temp\tmpFF49.tmp
                  Filesize

                  48KB

                  MD5

                  349e6eb110e34a08924d92f6b334801d

                  SHA1

                  bdfb289daff51890cc71697b6322aa4b35ec9169

                  SHA256

                  c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                  SHA512

                  2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                • C:\Users\Admin\AppData\Local\Temp\tmpFF6E.tmp
                  Filesize

                  20KB

                  MD5

                  49693267e0adbcd119f9f5e02adf3a80

                  SHA1

                  3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                  SHA256

                  d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                  SHA512

                  b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                • C:\Users\Admin\AppData\Local\Temp\tmpFF73.tmp
                  Filesize

                  116KB

                  MD5

                  f70aa3fa04f0536280f872ad17973c3d

                  SHA1

                  50a7b889329a92de1b272d0ecf5fce87395d3123

                  SHA256

                  8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                  SHA512

                  30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                • C:\Users\Admin\AppData\Local\Temp\tmpFFBE.tmp
                  Filesize

                  96KB

                  MD5

                  d367ddfda80fdcf578726bc3b0bc3e3c

                  SHA1

                  23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

                  SHA256

                  0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

                  SHA512

                  40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

                • C:\Users\Admin\AppData\Local\Temp\tmpFFC0.tmp
                  Filesize

                  1000KB

                  MD5

                  682a7f133ba88c8f1187e35c5f634f0a

                  SHA1

                  ad224531f313bdfcc9a7573b4c8693be2c1b283a

                  SHA256

                  f804500d24302f9f1045446ed74ca2e3990ae4fbb1ce47786440885300c5f746

                  SHA512

                  f4e7669920fbd89ccd4a2a232b85cd1ca1112787c313241cf00d709230f116ea42682a810990db4ede791a01b94ec0c4909dc44bab8864abe35be75c30d516e3

                • C:\Users\Admin\AppData\Local\Temp\toolspub1.exe
                  Filesize

                  171KB

                  MD5

                  4d1a4b3096f4a39f3a91df2f6efd43c6

                  SHA1

                  af7b52300363fa6f5ce8b5f99f753a9b1e0af94f

                  SHA256

                  ca5b5e71addd8a56460eefad5cd368a5f6aca71b7a2d6dcfb312f45d1ae6e20b

                  SHA512

                  d7cc6cf36fa0da5c22b531f7b3f58cbbcc206aaa47d40ebc0256fa5ede758fa7f636f9b70fa8077664067c8cbd3b38633ef2ca1e2e8e349b3b05c3cec1f8afd7

                • C:\Users\Admin\AppData\Roaming\Temp\Task.bat
                  Filesize

                  128B

                  MD5

                  11bb3db51f701d4e42d3287f71a6a43e

                  SHA1

                  63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                  SHA256

                  6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                  SHA512

                  907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                  Filesize

                  2KB

                  MD5

                  3d086a433708053f9bf9523e1d87a4e8

                  SHA1

                  b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

                  SHA256

                  6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

                  SHA512

                  931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                  Filesize

                  19KB

                  MD5

                  a4b7b7705d73382f2ca51df2aa268b08

                  SHA1

                  1ab95c9d122e222397466e1eb83b2ab82ef6c45c

                  SHA256

                  a1cc115f0f56651f83ff82c481993c4367b651f0cc295e7ef48d178a43bfcc78

                  SHA512

                  783a37780502890677a8e656198fc0a1559fd31c858ce95f5da4ba53e21f77e3220ff3214c590073748891759b39919179fbdaa39f3b3d3f8f71d21f3bed0bc0

                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                  Filesize

                  19KB

                  MD5

                  a8046f185ac7e91975dbb780427d8df4

                  SHA1

                  77063923f0e36fe8364c64e6c5ee967e0275f938

                  SHA256

                  c3af84bfcb1d93d70365815424c78a72d0dfb66ce9c4c49bf19a0fea5d917296

                  SHA512

                  1627e5680dab4251eca801d9abe763ad3a4ee645acb5deeac33f186891c4ebc9463cdcdd4692cd9908ab4988a68611dc999efbc4ce3c4f52fcbc565feeceeabc

                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                  Filesize

                  19KB

                  MD5

                  77c4e5923c56dfe36a8a62d8f6e62d94

                  SHA1

                  e237545d4bc1ecf8f432b1dfabc7d9ebc32c91a4

                  SHA256

                  73bdf74c1ab2b77544dd246a7c3b9742c5c6a633bb96c9171cfbd6148a7e01b4

                  SHA512

                  74f43fca9376c2fe409a8ef3dbf2018cdc2e913d36f1c552ac60e6b4fa076f4342057a47709e4a89c54a62644dbae7718cc26c41626978a5c534f761222e9f83

                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                  Filesize

                  19KB

                  MD5

                  48c6757e8a4eb6dee1002d1cf242e3e1

                  SHA1

                  f947f466d46c6239a4346ecd19f9cef77c005e11

                  SHA256

                  f9f10af3f3bffc4d7a4e20224423b1aad193b15b4d4d7f4ba0cf094cab8716f3

                  SHA512

                  f2f7bc03a09932db3cd2a6228eb808134f20f64adb11f430760bbc1e7ac8d0fb49543295f81e34d3c590f9c9cc307c0275496b0f6b0c55202742795688ec3639

                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                  Filesize

                  19KB

                  MD5

                  d8243b0fff76ede75781c3897da5de9d

                  SHA1

                  dd7998086dae18c8626bec54e59f67e4e4e14d6a

                  SHA256

                  e8da621dd934becab05822a27fc0c54a1548db59612a426ec671274d8ca256b5

                  SHA512

                  d337d29df0bebf4259f6be673c6ec9394cc3129e78ce2cf143bcc7c80b4aab412be0526ae98977a57b0b7e81704a8165f88e1821782be9a1258a5cc670e6da49

                • C:\Windows\windefender.exe
                  Filesize

                  2.0MB

                  MD5

                  8e67f58837092385dcf01e8a2b4f5783

                  SHA1

                  012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                  SHA256

                  166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                  SHA512

                  40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                • memory/656-211-0x0000000005480000-0x0000000005490000-memory.dmp
                  Filesize

                  64KB

                • memory/656-242-0x0000000007EB0000-0x0000000007EC1000-memory.dmp
                  Filesize

                  68KB

                • memory/656-210-0x0000000005480000-0x0000000005490000-memory.dmp
                  Filesize

                  64KB

                • memory/656-209-0x0000000072AC0000-0x0000000073270000-memory.dmp
                  Filesize

                  7.7MB

                • memory/656-246-0x0000000007F20000-0x0000000007F34000-memory.dmp
                  Filesize

                  80KB

                • memory/656-249-0x0000000072AC0000-0x0000000073270000-memory.dmp
                  Filesize

                  7.7MB

                • memory/656-240-0x000000007FC50000-0x000000007FC60000-memory.dmp
                  Filesize

                  64KB

                • memory/656-241-0x00000000079C0000-0x0000000007A63000-memory.dmp
                  Filesize

                  652KB

                • memory/656-221-0x0000000006ED0000-0x0000000006F1C000-memory.dmp
                  Filesize

                  304KB

                • memory/656-230-0x00000000710F0000-0x0000000071444000-memory.dmp
                  Filesize

                  3.3MB

                • memory/656-229-0x0000000071C30000-0x0000000071C7C000-memory.dmp
                  Filesize

                  304KB

                • memory/656-227-0x0000000005480000-0x0000000005490000-memory.dmp
                  Filesize

                  64KB

                • memory/1360-63-0x00000000006A0000-0x00000000006AB000-memory.dmp
                  Filesize

                  44KB

                • memory/1360-45-0x00000000006D0000-0x00000000007D0000-memory.dmp
                  Filesize

                  1024KB

                • memory/1360-49-0x00000000006A0000-0x00000000006AB000-memory.dmp
                  Filesize

                  44KB

                • memory/1360-50-0x0000000000400000-0x0000000000439000-memory.dmp
                  Filesize

                  228KB

                • memory/1360-61-0x0000000000400000-0x0000000000439000-memory.dmp
                  Filesize

                  228KB

                • memory/1528-85-0x0000000000400000-0x00000000008E2000-memory.dmp
                  Filesize

                  4.9MB

                • memory/1528-37-0x0000000000AD0000-0x0000000000AD1000-memory.dmp
                  Filesize

                  4KB

                • memory/1528-68-0x0000000000AD0000-0x0000000000AD1000-memory.dmp
                  Filesize

                  4KB

                • memory/1628-1-0x0000000000DD0000-0x000000000141A000-memory.dmp
                  Filesize

                  6.3MB

                • memory/1628-28-0x00000000743F0000-0x0000000074BA0000-memory.dmp
                  Filesize

                  7.7MB

                • memory/1628-0-0x00000000743F0000-0x0000000074BA0000-memory.dmp
                  Filesize

                  7.7MB

                • memory/1736-323-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/1736-351-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/1736-327-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/1736-325-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/2276-368-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/2276-366-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/2276-365-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/2436-494-0x0000000000400000-0x00000000008DF000-memory.dmp
                  Filesize

                  4.9MB

                • memory/2784-251-0x0000000000400000-0x0000000000D1C000-memory.dmp
                  Filesize

                  9.1MB

                • memory/2784-204-0x0000000000400000-0x0000000000D1C000-memory.dmp
                  Filesize

                  9.1MB

                • memory/2784-319-0x0000000000400000-0x0000000000D1C000-memory.dmp
                  Filesize

                  9.1MB

                • memory/2784-201-0x00000000029C0000-0x0000000002DBC000-memory.dmp
                  Filesize

                  4.0MB

                • memory/2784-388-0x0000000000400000-0x0000000000D1C000-memory.dmp
                  Filesize

                  9.1MB

                • memory/3444-314-0x0000000000400000-0x000000000044A000-memory.dmp
                  Filesize

                  296KB

                • memory/3580-310-0x00000000029D0000-0x00000000029E6000-memory.dmp
                  Filesize

                  88KB

                • memory/3580-60-0x0000000002A60000-0x0000000002A76000-memory.dmp
                  Filesize

                  88KB

                • memory/4496-203-0x0000000000400000-0x000000000062E000-memory.dmp
                  Filesize

                  2.2MB

                • memory/4496-250-0x0000000000400000-0x000000000062E000-memory.dmp
                  Filesize

                  2.2MB

                • memory/4496-54-0x0000000000920000-0x0000000000A20000-memory.dmp
                  Filesize

                  1024KB

                • memory/4496-55-0x0000000000780000-0x000000000079C000-memory.dmp
                  Filesize

                  112KB

                • memory/4496-88-0x0000000061E00000-0x0000000061EF3000-memory.dmp
                  Filesize

                  972KB

                • memory/4496-196-0x0000000000400000-0x000000000062E000-memory.dmp
                  Filesize

                  2.2MB

                • memory/4496-202-0x0000000000920000-0x0000000000A20000-memory.dmp
                  Filesize

                  1024KB

                • memory/4496-56-0x0000000000400000-0x000000000062E000-memory.dmp
                  Filesize

                  2.2MB

                • memory/4496-103-0x0000000000400000-0x000000000062E000-memory.dmp
                  Filesize

                  2.2MB

                • memory/4660-258-0x0000000072750000-0x0000000072F00000-memory.dmp
                  Filesize

                  7.7MB

                • memory/4660-259-0x00000000051A0000-0x00000000051B0000-memory.dmp
                  Filesize

                  64KB

                • memory/4988-484-0x0000000000400000-0x0000000000D1C000-memory.dmp
                  Filesize

                  9.1MB

                • memory/4988-490-0x0000000000400000-0x0000000000D1C000-memory.dmp
                  Filesize

                  9.1MB

                • memory/4988-408-0x0000000000400000-0x0000000000D1C000-memory.dmp
                  Filesize

                  9.1MB

                • memory/5016-72-0x0000000005540000-0x00000000055A6000-memory.dmp
                  Filesize

                  408KB

                • memory/5016-131-0x0000000006F70000-0x0000000006F8A000-memory.dmp
                  Filesize

                  104KB

                • memory/5016-188-0x0000000072AB0000-0x0000000073260000-memory.dmp
                  Filesize

                  7.7MB

                • memory/5016-184-0x0000000007330000-0x0000000007338000-memory.dmp
                  Filesize

                  32KB

                • memory/5016-183-0x0000000007340000-0x000000000735A000-memory.dmp
                  Filesize

                  104KB

                • memory/5016-182-0x00000000072F0000-0x0000000007304000-memory.dmp
                  Filesize

                  80KB

                • memory/5016-181-0x00000000072E0000-0x00000000072EE000-memory.dmp
                  Filesize

                  56KB

                • memory/5016-65-0x0000000072AB0000-0x0000000073260000-memory.dmp
                  Filesize

                  7.7MB

                • memory/5016-66-0x0000000002610000-0x0000000002620000-memory.dmp
                  Filesize

                  64KB

                • memory/5016-67-0x00000000025A0000-0x00000000025D6000-memory.dmp
                  Filesize

                  216KB

                • memory/5016-161-0x0000000007270000-0x0000000007281000-memory.dmp
                  Filesize

                  68KB

                • memory/5016-157-0x0000000007370000-0x0000000007406000-memory.dmp
                  Filesize

                  600KB

                • memory/5016-156-0x0000000007260000-0x000000000726A000-memory.dmp
                  Filesize

                  40KB

                • memory/5016-152-0x0000000007170000-0x0000000007213000-memory.dmp
                  Filesize

                  652KB

                • memory/5016-151-0x0000000007110000-0x000000000712E000-memory.dmp
                  Filesize

                  120KB

                • memory/5016-141-0x00000000710F0000-0x0000000071444000-memory.dmp
                  Filesize

                  3.3MB

                • memory/5016-140-0x0000000071C20000-0x0000000071C6C000-memory.dmp
                  Filesize

                  304KB

                • memory/5016-139-0x0000000007130000-0x0000000007162000-memory.dmp
                  Filesize

                  200KB

                • memory/5016-138-0x000000007F9B0000-0x000000007F9C0000-memory.dmp
                  Filesize

                  64KB

                • memory/5016-69-0x0000000004C70000-0x0000000005298000-memory.dmp
                  Filesize

                  6.2MB

                • memory/5016-130-0x00000000075B0000-0x0000000007C2A000-memory.dmp
                  Filesize

                  6.5MB

                • memory/5016-112-0x0000000006E70000-0x0000000006EE6000-memory.dmp
                  Filesize

                  472KB

                • memory/5016-105-0x0000000002610000-0x0000000002620000-memory.dmp
                  Filesize

                  64KB

                • memory/5016-87-0x0000000006110000-0x0000000006154000-memory.dmp
                  Filesize

                  272KB

                • memory/5016-86-0x0000000005C60000-0x0000000005CAC000-memory.dmp
                  Filesize

                  304KB

                • memory/5016-70-0x0000000004BE0000-0x0000000004C02000-memory.dmp
                  Filesize

                  136KB

                • memory/5016-83-0x0000000005BB0000-0x0000000005BCE000-memory.dmp
                  Filesize

                  120KB

                • memory/5016-82-0x00000000055B0000-0x0000000005904000-memory.dmp
                  Filesize

                  3.3MB

                • memory/5016-71-0x00000000054D0000-0x0000000005536000-memory.dmp
                  Filesize

                  408KB

                • memory/5060-84-0x0000000000400000-0x0000000000D1C000-memory.dmp
                  Filesize

                  9.1MB

                • memory/5060-193-0x0000000000400000-0x0000000000D1C000-memory.dmp
                  Filesize

                  9.1MB

                • memory/5060-178-0x0000000000400000-0x0000000000D1C000-memory.dmp
                  Filesize

                  9.1MB

                • memory/5060-179-0x00000000029A0000-0x0000000002DA4000-memory.dmp
                  Filesize

                  4.0MB

                • memory/5060-180-0x0000000002DB0000-0x000000000369B000-memory.dmp
                  Filesize

                  8.9MB

                • memory/5060-53-0x0000000000400000-0x0000000000D1C000-memory.dmp
                  Filesize

                  9.1MB

                • memory/5060-52-0x0000000002DB0000-0x000000000369B000-memory.dmp
                  Filesize

                  8.9MB

                • memory/5060-51-0x00000000029A0000-0x0000000002DA4000-memory.dmp
                  Filesize

                  4.0MB