Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    89s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 17:09

General

  • Target

    48586ad6d444978aac4736f05bef2751d49929ce24b187da39ddc4d0c8979521.exe

  • Size

    1.9MB

  • MD5

    40ec0e62856036983be04f31ce670fb9

  • SHA1

    0d04b8139fe71a1736a8168fbf072df61d7d7bd6

  • SHA256

    48586ad6d444978aac4736f05bef2751d49929ce24b187da39ddc4d0c8979521

  • SHA512

    1094d49d3fcb757fe2d1c49d1e441ab086f4cff80ffd8572b0017546350838dcba83f102796009d811a360f6825928c13e3697b7dd462627bb83fb92534fc806

  • SSDEEP

    192:z/TeYoeb67sc8+otH8SESePujd2kTCMZehZtzMuuQzBLerxA/GWeGMEd022XbTFi:z/yYoebe5JotHESxjuM63KI

Malware Config

Extracted

Path

C:\Program Files\7-Zip\readme-warning.txt

Family

makop

Ransom Note
::: Greetings ::: Little FAQ: .1. Q: Whats Happen? A: Your files have been encrypted and now have the "makop" extension. The file structure was not damaged, we did everything possible so that this could not happen. .2. Q: How to recover files? A: If you wish to decrypt your files you will need to pay in bitcoins. .3. Q: What about guarantees? A: Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will cooperate with us. Its not in our interests. To check the ability of returning files, you can send to us any 2 files with SIMPLE extensions(jpg,xls,doc, etc... not databases!) and low sizes(max 1 mb), we will decrypt them and send back to you. That is our guarantee. .4. Q: How to contact with you? A: You can write us to our mailbox: [email protected] .5. Q: How will the decryption process proceed after payment? A: After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files. .6. Q: If I don�t want to pay bad people like you? A: If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause only we have the private key. In practice - time is much more valuable than money. :::BEWARE::: DON'T try to change encrypted files by yourself! If you will try to use any third party software for restoring your data or antivirus solutions - please make a backup for all encrypted files! Any changes in encrypted files may entail damage of the private key and, as result, the loss all data.

Signatures

  • Makop

    Ransomware family discovered by @VK_Intel in early 2020.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Turns off Windows Defender SpyNet reporting 2 TTPs
  • Windows security bypass 2 TTPs 2 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF 1 IoCs
  • Detects executables containing artifacts associated with disabling Widnows Defender 1 IoCs
  • Detects executables embedding command execution via IExecuteCommand COM object 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Detects executables potentially checking for WinJail sandbox window 2 IoCs
  • Nirsoft 1 IoCs
  • Renames multiple (8024) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 10 IoCs
  • Enumerates connected drives 3 TTPs 9 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Launches sc.exe 22 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 57 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\48586ad6d444978aac4736f05bef2751d49929ce24b187da39ddc4d0c8979521.exe
    "C:\Users\Admin\AppData\Local\Temp\48586ad6d444978aac4736f05bef2751d49929ce24b187da39ddc4d0c8979521.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Windows security bypass
    • Checks computer location settings
    • Windows security modification
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Users\Admin\AppData\Local\Temp\76541d97-945f-4d78-b491-730d1899467b\AdvancedRun.exe
      "C:\Users\Admin\AppData\Local\Temp\76541d97-945f-4d78-b491-730d1899467b\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\76541d97-945f-4d78-b491-730d1899467b\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Users\Admin\AppData\Local\Temp\76541d97-945f-4d78-b491-730d1899467b\AdvancedRun.exe
        "C:\Users\Admin\AppData\Local\Temp\76541d97-945f-4d78-b491-730d1899467b\AdvancedRun.exe" /SpecialRun 4101d8 2256
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:972
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\48586ad6d444978aac4736f05bef2751d49929ce24b187da39ddc4d0c8979521.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1360
    • C:\Users\Admin\AppData\Local\Temp\48586ad6d444978aac4736f05bef2751d49929ce24b187da39ddc4d0c8979521.exe
      "C:\Users\Admin\AppData\Local\Temp\48586ad6d444978aac4736f05bef2751d49929ce24b187da39ddc4d0c8979521.exe"
      2⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Users\Admin\AppData\Local\Temp\48586ad6d444978aac4736f05bef2751d49929ce24b187da39ddc4d0c8979521.exe
        "C:\Users\Admin\AppData\Local\Temp\48586ad6d444978aac4736f05bef2751d49929ce24b187da39ddc4d0c8979521.exe" n1072
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4352
        • C:\Users\Admin\AppData\Local\Temp\0adc2e09-eb6e-4d47-b4eb-a0b67373577c\AdvancedRun.exe
          "C:\Users\Admin\AppData\Local\Temp\0adc2e09-eb6e-4d47-b4eb-a0b67373577c\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\0adc2e09-eb6e-4d47-b4eb-a0b67373577c\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1224
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0adc2e09-eb6e-4d47-b4eb-a0b67373577c\test.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4604
            • C:\Windows\system32\sc.exe
              sc stop windefend
              6⤵
              • Launches sc.exe
              PID:2936
            • C:\Windows\system32\sc.exe
              sc config windefend start= disabled
              6⤵
              • Launches sc.exe
              PID:1844
            • C:\Windows\system32\sc.exe
              sc stop Sense
              6⤵
              • Launches sc.exe
              PID:4476
            • C:\Windows\system32\sc.exe
              sc config Sense start= disabled
              6⤵
              • Launches sc.exe
              PID:3308
            • C:\Windows\system32\sc.exe
              sc stop wuauserv
              6⤵
              • Launches sc.exe
              PID:5040
            • C:\Windows\system32\sc.exe
              sc config wuauserv start= disabled
              6⤵
              • Launches sc.exe
              PID:1028
            • C:\Windows\system32\sc.exe
              sc stop usosvc
              6⤵
              • Launches sc.exe
              PID:4776
            • C:\Windows\system32\sc.exe
              sc stop WaasMedicSvc
              6⤵
              • Launches sc.exe
              PID:3372
            • C:\Windows\system32\sc.exe
              sc config WaasMedicSvc start= disabled
              6⤵
              • Launches sc.exe
              PID:2092
            • C:\Windows\system32\sc.exe
              sc config SecurityHealthService start= disabled
              6⤵
              • Launches sc.exe
              PID:2008
            • C:\Windows\system32\sc.exe
              sc stop SDRSVC
              6⤵
              • Launches sc.exe
              PID:4176
            • C:\Windows\system32\sc.exe
              sc stop SecurityHealthService
              6⤵
              • Launches sc.exe
              PID:1848
            • C:\Windows\system32\sc.exe
              sc config usosvc start= disabled
              6⤵
              • Launches sc.exe
              PID:5020
            • C:\Windows\system32\sc.exe
              sc stop wscsvc
              6⤵
              • Launches sc.exe
              PID:4944
            • C:\Windows\system32\sc.exe
              sc config WdiServiceHost start= disabled
              6⤵
              • Launches sc.exe
              PID:2288
            • C:\Windows\system32\sc.exe
              sc config InstallService Start= disabled
              6⤵
              • Launches sc.exe
              PID:2404
            • C:\Windows\system32\sc.exe
              sc stop InstallService
              6⤵
              • Launches sc.exe
              PID:3304
            • C:\Windows\system32\sc.exe
              sc config WdiSystemHost start= disabled
              6⤵
              • Launches sc.exe
              PID:1852
            • C:\Windows\system32\sc.exe
              sc stop WdiSystemHost
              6⤵
              • Launches sc.exe
              PID:4144
            • C:\Windows\system32\sc.exe
              sc stop WdiServiceHost
              6⤵
              • Launches sc.exe
              PID:4364
            • C:\Windows\system32\sc.exe
              sc config wscsvc start= disabled
              6⤵
              • Launches sc.exe
              PID:544
            • C:\Windows\system32\sc.exe
              sc config SDRSVC start= disabled
              6⤵
              • Launches sc.exe
              PID:4828
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\48586ad6d444978aac4736f05bef2751d49929ce24b187da39ddc4d0c8979521.exe" -Force
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1156
        • C:\Users\Admin\AppData\Local\Temp\48586ad6d444978aac4736f05bef2751d49929ce24b187da39ddc4d0c8979521.exe
          "C:\Users\Admin\AppData\Local\Temp\48586ad6d444978aac4736f05bef2751d49929ce24b187da39ddc4d0c8979521.exe"
          4⤵
            PID:4288
          • C:\Users\Admin\AppData\Local\Temp\48586ad6d444978aac4736f05bef2751d49929ce24b187da39ddc4d0c8979521.exe
            "C:\Users\Admin\AppData\Local\Temp\48586ad6d444978aac4736f05bef2751d49929ce24b187da39ddc4d0c8979521.exe"
            4⤵
              PID:3576
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2944
            • C:\Windows\system32\vssadmin.exe
              vssadmin delete shadows /all /quiet
              4⤵
              • Interacts with shadow copies
              PID:2980
            • C:\Windows\system32\wbadmin.exe
              wbadmin delete catalog -quiet
              4⤵
              • Deletes backup catalog
              PID:1524
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic shadowcopy delete
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2904
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3648
      • C:\Windows\system32\wbengine.exe
        "C:\Windows\system32\wbengine.exe"
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4284
      • C:\Windows\System32\vds.exe
        C:\Windows\System32\vds.exe
        1⤵
        • Checks SCSI registry key(s)
        PID:1708
      • C:\Windows\System32\vdsldr.exe
        C:\Windows\System32\vdsldr.exe -Embedding
        1⤵
          PID:232
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Modifies Installed Components in the registry
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2140
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:2052
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Modifies Installed Components in the registry
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2244
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:2488
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Modifies Installed Components in the registry
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:3592
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:4012
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:2316
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Modifies Installed Components in the registry
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of SendNotifyMessage
          PID:2952
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:3688
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:1564
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:1276
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:2344
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:1196
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:3424
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:3504
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                        PID:4352
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                          PID:4076
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                            PID:3892
                          • C:\Windows\explorer.exe
                            explorer.exe
                            1⤵
                              PID:4160
                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                              1⤵
                                PID:4028
                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                1⤵
                                  PID:5056
                                • C:\Windows\explorer.exe
                                  explorer.exe
                                  1⤵
                                    PID:3160
                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                    1⤵
                                      PID:5088
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      1⤵
                                        PID:3644
                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                        1⤵
                                          PID:232
                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                          1⤵
                                            PID:3116
                                          • C:\Windows\explorer.exe
                                            explorer.exe
                                            1⤵
                                              PID:4876
                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                              1⤵
                                                PID:2604
                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                1⤵
                                                  PID:4244
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  1⤵
                                                    PID:3516
                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                    1⤵
                                                      PID:1196
                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                      1⤵
                                                        PID:3820
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                          PID:2852
                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                          1⤵
                                                            PID:4052
                                                          • C:\Windows\explorer.exe
                                                            explorer.exe
                                                            1⤵
                                                              PID:2880
                                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                              1⤵
                                                                PID:1084
                                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                1⤵
                                                                  PID:3320
                                                                • C:\Windows\explorer.exe
                                                                  explorer.exe
                                                                  1⤵
                                                                    PID:1016
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                    1⤵
                                                                      PID:4684
                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                      1⤵
                                                                        PID:3856
                                                                      • C:\Windows\explorer.exe
                                                                        explorer.exe
                                                                        1⤵
                                                                          PID:4344
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                          1⤵
                                                                            PID:4084
                                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                            1⤵
                                                                              PID:4600
                                                                            • C:\Windows\explorer.exe
                                                                              explorer.exe
                                                                              1⤵
                                                                                PID:1116
                                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                1⤵
                                                                                  PID:3440
                                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                  1⤵
                                                                                    PID:4792

                                                                                  Network

                                                                                  MITRE ATT&CK Enterprise v15

                                                                                  Replay Monitor

                                                                                  Loading Replay Monitor...

                                                                                  Downloads

                                                                                  • C:\Program Files\7-Zip\readme-warning.txt

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    e217e139ef30c6b01a891a46abdfdfdb

                                                                                    SHA1

                                                                                    b7fcffce07cbdc0408c8156f22ac6ab0a8c742c9

                                                                                    SHA256

                                                                                    cb631d734d62dce1742744b81cccd7418c27fa6da089d366378b43c00186598e

                                                                                    SHA512

                                                                                    a22208a2537138f0b70087b1f0f10972e2ed2feb3ea8ea2f7bc0f7668a4fc1b807aaa7173d04ff04d415c043e1278357d39c7f539b4037ebbc6926e21863d117

                                                                                  • C:\USERS\ADMIN\DESKTOP\ADDGRANT.RTF.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    684KB

                                                                                    MD5

                                                                                    2246ecf88a70679ff6c5f1215e1ff9f8

                                                                                    SHA1

                                                                                    ea3148c849c141aac9d6a877d01e125d737a0140

                                                                                    SHA256

                                                                                    261098d64620dc98423c433fdcb88322291be375c483bbfade6a9a57d9a17132

                                                                                    SHA512

                                                                                    7c2558c663b467146e849a1c85d5ac12f91e4bd90124674fb59914821beca9b2d0ef10d3d0758b05f3ee3bdc9df8b3d981d4baf43238138f7e5e58f4c7cfb86e

                                                                                  • C:\USERS\ADMIN\DESKTOP\COMPAREMOUNT.WAV.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    1.1MB

                                                                                    MD5

                                                                                    5f6d0dbc5aeeb91b8ee2068156fef027

                                                                                    SHA1

                                                                                    bedd96b46e05b5b196eaad2687ac37c3154f5086

                                                                                    SHA256

                                                                                    900a808634ef279604226d71b89f6155ae54789ffc12fa7a5e9200367d89e9cf

                                                                                    SHA512

                                                                                    a6c0dacf7bcfb0d5cfd9f524f38151183d94972ec97125f006cad2918f2ccf11032adbc046aecc4cbaa0271db93b0b9cc9176bc6c36c2f50e719db7bea2142f0

                                                                                  • C:\USERS\ADMIN\DESKTOP\COMPLETEFORMAT.AIF.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    1.0MB

                                                                                    MD5

                                                                                    1af4e40e22d8e8f70bccddfa7d607630

                                                                                    SHA1

                                                                                    231fd14c8318d08144348c7f34103558dedbd065

                                                                                    SHA256

                                                                                    e804d889e16c83c2e7eea1833f94e0501031e4cab8933b47ffde340bceed48b3

                                                                                    SHA512

                                                                                    6d0a9d9a3b21beed387ba99cb8d368ca0f798fe7e62d4fdb4504f6138247ae245c11dbe5ad1a07993b4db56ecd1e014e41f6072bab44b16fe1f992d5be1eef8d

                                                                                  • C:\USERS\ADMIN\DESKTOP\CONNECTBACKUP.MP2V.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    772KB

                                                                                    MD5

                                                                                    c6c56533fdb77e4dfb5f5eca40a3c1ed

                                                                                    SHA1

                                                                                    5d3f26964d30adb1b6c42635c8562d06193d60b3

                                                                                    SHA256

                                                                                    1d25ebf0eae5078e8795757851b8ca7e2a307221bf2a34db7df6a5a379b39683

                                                                                    SHA512

                                                                                    b75b8d3407ed9341ee0f21e2aa17e20f38b08d6f20a89bbfcfc46434ab62e6c50574d7a161932b6307c90b4dd68a85173cecbc9e86e38feaa833412293adff1b

                                                                                  • C:\USERS\ADMIN\DESKTOP\CONVERTTORESIZE.RAW.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    816KB

                                                                                    MD5

                                                                                    7c3bb8f30ef5c17731d8eaef4db34263

                                                                                    SHA1

                                                                                    137ed10ca873cc2c304478598f4393ba9fc2873e

                                                                                    SHA256

                                                                                    f17b0c613b6a8604a53986dae81dc400f2425f8e084a94b6f8563365e6d322d4

                                                                                    SHA512

                                                                                    b64bf8efba5e88d60a31af7a9816149379521c3424feab6193610e96eee50bb8b2141f5bd8d8655598e1df17f9bc01064d12fa53b89d99c9a87d2685294a06cd

                                                                                  • C:\USERS\ADMIN\DESKTOP\DEBUGCONNECT.DOT.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    860KB

                                                                                    MD5

                                                                                    88e8364bfee5da80fef8e36cab3ed174

                                                                                    SHA1

                                                                                    4a98bfc5750f79e155576d34c17be66f11ef9e75

                                                                                    SHA256

                                                                                    63c9f93b4bb575ee958729f2cc253168b254627e78d585baaa3e613c1abd181c

                                                                                    SHA512

                                                                                    27f8494b6a7f225c486c763edaf8fa167c03319b514b72aae63cd80e71b41436cb7fc376f999bee2d475b81540e6dad80a2966a8eebe7f80f03869a9d3e57bc1

                                                                                  • C:\USERS\ADMIN\DESKTOP\DISABLEINITIALIZE.EPRTX.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    1.1MB

                                                                                    MD5

                                                                                    d4ba9f5f719eda79b64fc0dbb5424841

                                                                                    SHA1

                                                                                    3365474dcfc1aae896b25281c9462bb8fcd9c6c1

                                                                                    SHA256

                                                                                    6976be73b769fc056906253b16a8643b80c94b4d83abe9132e974bab1f37ffe5

                                                                                    SHA512

                                                                                    e368a706e66f904d0ca09eceb62855543768bdf4c576a0b26e5d98ca71b043e33085f872f237d23f797daca0c630e5a79e9ea96ae41e527ab7e358a4cb39a3be

                                                                                  • C:\USERS\ADMIN\DESKTOP\DISMOUNTCLOSE.WAV.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    904KB

                                                                                    MD5

                                                                                    44a92cb32b85d4e205fca4715e487da6

                                                                                    SHA1

                                                                                    d86c52dd53f241d391b3373a6b17e4a7479fa4ba

                                                                                    SHA256

                                                                                    87860245b84b0c8f9b7b2d29b5304d4aa6df36c4c17274fed87a5779b7d9cb8b

                                                                                    SHA512

                                                                                    aee7a3e7de147c3644c6c0750e6101ee28a2a1ad468377ba49d5fba4053ec2c3e08d185956bbf4c226d95f4d4cb40989c323f94e728b54f41a99862da7a66801

                                                                                  • C:\USERS\ADMIN\DESKTOP\DISMOUNTSAVE.VSW.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    948KB

                                                                                    MD5

                                                                                    b77b37c9a1a6d15a68d578da75ea0241

                                                                                    SHA1

                                                                                    a3e52305523f1ea642acc600307434c2ecb44e55

                                                                                    SHA256

                                                                                    d24c3985ce19d0b7c5ae91bfb4bd0186ccfd14f4e83dc234872d1b1de2ac6d32

                                                                                    SHA512

                                                                                    d858bb418280587481988360c958fd8f6c84c297fb5fb6e49fd91cddc446fbcf6a8a5589bce01032abf93a12078a33e78b371c77b31ab13f405bf5de6203689e

                                                                                  • C:\USERS\ADMIN\DESKTOP\ENTERINSTALL.VSDX.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    1.3MB

                                                                                    MD5

                                                                                    1f3e2d4264d3e2acf5f1040146c9cd4c

                                                                                    SHA1

                                                                                    8c1511b9cfdf07cfeae6a66d2b9ddb3e84575ab1

                                                                                    SHA256

                                                                                    bbda1a317d6800f2bff515ef780ec9c1f2f5fb5f3babb2942d92d6d4e3ab7f63

                                                                                    SHA512

                                                                                    761cc2d31552d1727736881de7ff9d4ea747250dcc9203d3c4bc210a3211018f55a3b4c8a19aba0186f0afc638739052397bf9e9f360bf9d1678f248fc4f56eb

                                                                                  • C:\USERS\ADMIN\DESKTOP\IMPORTOUT.EPS.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    728KB

                                                                                    MD5

                                                                                    e9b1c89adc1135152c7146ab9d1a438f

                                                                                    SHA1

                                                                                    a42c8f11ebc1a3c01aecd5f60cea61ea30e4a90d

                                                                                    SHA256

                                                                                    a77df4ed8f9675615e40a67d03a474fe40da992bd74a2cb24e7fa24c26424752

                                                                                    SHA512

                                                                                    103a367bbf5f84cabaf6a1612edb2ab9aeb4d0fb98f017eb645b03ff5b0ad90b69f396ddd2545b828c43b826ae579039e519c9c2263e33bb9d60b5de00014f3e

                                                                                  • C:\USERS\ADMIN\DESKTOP\INITIALIZEUNPUBLISH.EPS.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    551KB

                                                                                    MD5

                                                                                    22e2b2bb5e18bc08f4e4d3d8735fc418

                                                                                    SHA1

                                                                                    184a58695857185d2b79350d44f1cee8cf17e608

                                                                                    SHA256

                                                                                    71b0e964f63c04e9caf9dd302c72ed98cb810a7ec997b2e64375aef1b1f2c526

                                                                                    SHA512

                                                                                    2e1ceac36bda3abb438bf86a1c28fd1ca2a6c803077eb42852821a301934a286ec243247ce80a1b902daf6517b11b82042c7aaedd91ce69bd94cc156531afde9

                                                                                  • C:\USERS\ADMIN\DESKTOP\MICROSOFT EDGE.LNK.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    2KB

                                                                                    MD5

                                                                                    1611dc95297b9f0905fc4f6a2a70afad

                                                                                    SHA1

                                                                                    8bba7310cb001ee6ca730d1ae2a6689b95870466

                                                                                    SHA256

                                                                                    732d4bb9e83d874ad07a063156d5a7987b638fe2e6ceee635b4088af52945a62

                                                                                    SHA512

                                                                                    fb2260726913222347869845a72a6f1f542ceb3aeaacc2db8b7c4304fb81de296e2263177c180a364947c8831d6346b3f7e9cdde020c2f1860dcf2677cf84266

                                                                                  • C:\USERS\ADMIN\DESKTOP\MOUNTDEBUG.AIF.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    507KB

                                                                                    MD5

                                                                                    c9034733e9333fa851426b7c602b5532

                                                                                    SHA1

                                                                                    41eb4322e0b7b8df401c0c95367a73abaca7bf65

                                                                                    SHA256

                                                                                    c0d4457dbff2e15748737a03905dc64d1a7c8652b39f01ab707152755f85005f

                                                                                    SHA512

                                                                                    df2f056e8994b596a56325167757780564054ba4451040347954ffb3a5f5476f2df026d68432f3616f68c18d5181d3483f609b653fcf3a9ca0a91e6afc976985

                                                                                  • C:\USERS\ADMIN\DESKTOP\OPENPING.WPL.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    1.1MB

                                                                                    MD5

                                                                                    8e6794f2cdafd81e7c17abcbfb572bda

                                                                                    SHA1

                                                                                    a2e22450db9eae8be53f12cae618b3b91bd70dcd

                                                                                    SHA256

                                                                                    9ae1cfcd074711e203043e7fba74304323e27b107bc3aeb434c2541b854f502c

                                                                                    SHA512

                                                                                    7a879c78843a78af0d5098ef4046889046f1cfe8b2b21222515ded905b1c675f60db6cc8d774921026bcc1f26dc3151dbee86d94ae81a13935b3ba8859efc040

                                                                                  • C:\USERS\ADMIN\DESKTOP\SAVEAPPROVE.AIF.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    1.8MB

                                                                                    MD5

                                                                                    3e2ac33010cb8803f073034fd6010751

                                                                                    SHA1

                                                                                    d0eabbfa98e771fd868ca6326aebfbc224b268d7

                                                                                    SHA256

                                                                                    ca12f03cb5c2632ce40ce4641326679b46293c1a3d4f2701d451451fad0eb70b

                                                                                    SHA512

                                                                                    97febb2b46b660ddbc3d66103117ad1a715939ec275fc7a1bceb652d1f384d2661e704624ab0a3262e7b7b8e7d4556586cfc3308634c5aa4bda7f4855550034c

                                                                                  • C:\USERS\ADMIN\DESKTOP\SUSPENDUNBLOCK.EPS.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    639KB

                                                                                    MD5

                                                                                    aad84e7c97f1893f57582839b09baf6c

                                                                                    SHA1

                                                                                    f727eba7fa630112f5ef63e222cf807aa2dac378

                                                                                    SHA256

                                                                                    482a392f9212397ab9141377e891afbe8b65c64fa862e5c98eee478f18bb86e1

                                                                                    SHA512

                                                                                    65c259876ae0050a5f2fc7e53ffbbda7a05a8c1bf441db891fcd9923eee9eab159d50c771a6bd649ebc75cddfe4304d5775e45978cf3217f5c2e69f982205577

                                                                                  • C:\USERS\ADMIN\DESKTOP\SYNCBACKUP.SQL.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    595KB

                                                                                    MD5

                                                                                    8d8072a14aff41b20ab53788acfcd813

                                                                                    SHA1

                                                                                    7b19ddc278680570199471b0c098d897ca0b951c

                                                                                    SHA256

                                                                                    cb2fbca7aac4a8bca9413a1b9a7a958da6dd9e2683566f3a86153188c16571a8

                                                                                    SHA512

                                                                                    5ca29d03ff47a2e2c658a0757d95cede560ef311ed4614b61dbb034414a64948e92a1ef5f983db845dbb1c7a03530c8bb3e45a196020e657def3a19777664e0b

                                                                                  • C:\USERS\ADMIN\DESKTOP\TRACEDISMOUNT.HTM.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    960KB

                                                                                    MD5

                                                                                    556e9d9720c1c73e49b8520cabd31728

                                                                                    SHA1

                                                                                    a2ce2230bff1d60a2c7dacf8ead3a0601abb131c

                                                                                    SHA256

                                                                                    8c2c19328d84c3b7b8450b21128d42931d33fc70ec75ae84c48d609282bf32a7

                                                                                    SHA512

                                                                                    a5e0425c6ed6c95ff4600d981f108b0f4b5bb444a2b58f16246743e0bf667f355e29a517dd08520306e44c0b5f67c1099b84a7190c061c88a618944c7485e4b6

                                                                                  • C:\USERS\ADMIN\DESKTOP\UNBLOCKCONNECT.KIX.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    576KB

                                                                                    MD5

                                                                                    dbfb51d79caca7c722e05c22d8e81f63

                                                                                    SHA1

                                                                                    079b6bd5a2965a763a9707d7dd56742abcdfc563

                                                                                    SHA256

                                                                                    f05eb0dd2035fda4d945a79e01e87725cac14436ca06c74104c56c121fd77e4d

                                                                                    SHA512

                                                                                    e326973ea80d06ecfa4d667f8c346fea4be87bc4c9c43e055792a8be298ebd358c2a5b700bb3f16ff09c54b428bb41d23c5f4f706f756046821a7ff97d84f330

                                                                                  • C:\USERS\ADMIN\DESKTOP\UNBLOCKRESIZE.CSV.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    512KB

                                                                                    MD5

                                                                                    24a80a777f62b2b837d8b58d934ef711

                                                                                    SHA1

                                                                                    07a02207bb5686d63c37569c07ab314a8a80f026

                                                                                    SHA256

                                                                                    e927051f48d54d384705dcc006e884e95df0f85dba058d70f013c1421ef58480

                                                                                    SHA512

                                                                                    cf3c9cc8d754ff60af2758cd94ddf23ea2b3d73721d86b93eb8986eeebeefd8f8ef0ea9d970ab51fbba2165155838be1979709180ab22cee49a0cebc709cb03d

                                                                                  • C:\USERS\ADMIN\DESKTOP\UPDATEDISMOUNT.MID.[62687D04].[[email protected]].MAKOP

                                                                                    Filesize

                                                                                    463KB

                                                                                    MD5

                                                                                    7cdd56cf5213cb0ae83d2ff92006ba0f

                                                                                    SHA1

                                                                                    3aff90127836f421516bbe971fcb7fb6aad80d2b

                                                                                    SHA256

                                                                                    7b5ca9d48483c97128e578ce3620130f31d1520fcf6c9b3825cf3dbd377acd25

                                                                                    SHA512

                                                                                    d5c1595559ff98ef3757732a77b850df5ed03bd5dda3871ad96eea2e34ca8b78771d63de2de1b21db180fcddc62d20edd7e22a6ac2d8848766b62af509651d5e

                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                                    Filesize

                                                                                    471B

                                                                                    MD5

                                                                                    dab29f0ff85749876aaa834e6c1b5918

                                                                                    SHA1

                                                                                    d514aa16346e208e62e1289a82af2ca16c5e64d9

                                                                                    SHA256

                                                                                    808cb554c37d8021989c5d145588c2bec772f12b9260dddf8c4d55b3babe65b3

                                                                                    SHA512

                                                                                    ffc6db04dee3b901eafb3a8f0234679694bfd66ced092917a4586f62bf8cbfdca6e6eeae3563a0f7ac7ee530d698aa9e36112cf7a0a483ccdfcafc58085056a3

                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                                    Filesize

                                                                                    412B

                                                                                    MD5

                                                                                    6a141ceaf201104c1e99c0812eccd123

                                                                                    SHA1

                                                                                    47da40dcd127b7c7ca17d80d76e6850b28573a24

                                                                                    SHA256

                                                                                    b9f35034867f5c12570d406d07ccec58aac1885c6cabe03effa3517b2fd05ca1

                                                                                    SHA512

                                                                                    bd62691e7e710d200a0aed631013288de6d752e02d1e2e6803290d25cd2a725ccfe8d195cc440ed9e1a4f4ed299d9af0b0bda676b912fe0c5cf9ba7cf3cf5311

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\48586ad6d444978aac4736f05bef2751d49929ce24b187da39ddc4d0c8979521.exe.log

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    c8ba28b4adef1e31506663447c4fb877

                                                                                    SHA1

                                                                                    ab07929915ab927500c2fb32757f0512a0fa050e

                                                                                    SHA256

                                                                                    589ddf313adbbe748a1d83d08ff4ec49b7cc6d6ca9d756ae38a779efe331add2

                                                                                    SHA512

                                                                                    1778691f90f45240ba9460f0eb06c8ab72f845f2b841fdfdeb0da3e8c4e293fb11f40c858369cb7c8f5ea5fe45891b8cf1c968849fc3ce2251f517e0c519906d

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                    Filesize

                                                                                    2KB

                                                                                    MD5

                                                                                    968cb9309758126772781b83adb8a28f

                                                                                    SHA1

                                                                                    8da30e71accf186b2ba11da1797cf67f8f78b47c

                                                                                    SHA256

                                                                                    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                                                                    SHA512

                                                                                    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\1033\StructuredQuerySchema.bin

                                                                                    Filesize

                                                                                    384KB

                                                                                    MD5

                                                                                    279ab88726777d53c803ff11ba926536

                                                                                    SHA1

                                                                                    8b9d8dab9c1dd4f2bbdc034846ccdaf3d52696a3

                                                                                    SHA256

                                                                                    959c246d8717953b8336b535dabfecb223155b46c5722ad34770f3a3f79568ca

                                                                                    SHA512

                                                                                    1c254db607a38cdf2524b23987dffd75fa47055419276358b427689442a7118f9a4c4a9aa2ea3b692b1f9f49873b059a0c044019f181855d0c5fa89338e29105

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Caches\cversions.3.db

                                                                                    Filesize

                                                                                    16KB

                                                                                    MD5

                                                                                    b5096b60ed8b733cb4e69d84464ba1e9

                                                                                    SHA1

                                                                                    fde559e06a01d311a092e6f03306b438072cfa6e

                                                                                    SHA256

                                                                                    871bf5db0a6c16b69568cdf618a799f273d4dd6cd884a4e0b477384411f6c717

                                                                                    SHA512

                                                                                    70c4af06eb8e4e67187526d6b517beaac0aa44b8bc418989a9cf5c9be72d44ababdc7eeb49c31297474191fd682359556a78d2a6135775753a2ea71c7edbe762

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Caches\{03BA58C4-B905-4D30-88C9-B63C603DA134}.3.ver0x0000000000000001.db.[62687D04].[[email protected]].makop

                                                                                    Filesize

                                                                                    414KB

                                                                                    MD5

                                                                                    628021c7050222854ecdc372c8a9eae7

                                                                                    SHA1

                                                                                    f924dea112317340e8c24e677a5a5f413ef7b313

                                                                                    SHA256

                                                                                    ede875e5cc7695bd12324cb4cc6a6c4cf968574af7165ee143b56ec540dafd6f

                                                                                    SHA512

                                                                                    bd6fcb681eea95b55fa7b8f04fc0b0237b9ad027d70812f8159a3c9d2447552d5fbeca85a3272e03db5fbbf9650996c2f5e059747b0508a54a16b294cc31dfba

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_16.db

                                                                                    Filesize

                                                                                    448KB

                                                                                    MD5

                                                                                    650a10efee0ad59f7676fea76802f6c2

                                                                                    SHA1

                                                                                    b986123d7b466df45800dcc39e8c48c1bdaa8a75

                                                                                    SHA256

                                                                                    c1cbaa6a0d0e00efd3a0210af0e2cadec1645db7fdab81353e5db0989d059aa1

                                                                                    SHA512

                                                                                    bbca0e9eaeadb5b418e527abc10313a42b83f5d40877573955ea3f6520d539bcb7f408b338d869d4ee436c4d8899c16f160488187bf91cff29c58b33a75e9efc

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_32.db

                                                                                    Filesize

                                                                                    960KB

                                                                                    MD5

                                                                                    738d7d3a7d686e190c6a5948649dd2ac

                                                                                    SHA1

                                                                                    a919b7e74bfb2817715503a6afdd7a6309e32a04

                                                                                    SHA256

                                                                                    eaeaea68cff9a1c728b62ee90db33037221bec1f4b09c007d3fa5f5db58704eb

                                                                                    SHA512

                                                                                    3400322bb0ad6f835f0713e1c1624bf0d8cca41732102c7634aaa229c5ffd809d12cfd3a12f8b3deeb16846412b8b17219e2b7d20c0a6bef2f8c3cdfac6707da

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_48.db

                                                                                    Filesize

                                                                                    1024KB

                                                                                    MD5

                                                                                    30ce05521c028924888c31f6722c14b9

                                                                                    SHA1

                                                                                    bcae50c2ab7ccbf71c9b4e2923a6cb54b0bc1a96

                                                                                    SHA256

                                                                                    da3d078ea6543bb8c36afc1abe19e902c74cb167ba77e7b04652a22edac48dfd

                                                                                    SHA512

                                                                                    f8d43b49bf721658ab7549cd7cc7ce8e3ad4cba53dd963b2a55aa8c612eccc0e75bb3b15f6959f3b35890fcaf9fb2164617007d5d4d982e1833467844fe56691

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_48.db

                                                                                    Filesize

                                                                                    1024KB

                                                                                    MD5

                                                                                    31b9f63933adeba13a033496c6721e0d

                                                                                    SHA1

                                                                                    e387757ef4dbec94755a5b27e266cb00edc2a2f5

                                                                                    SHA256

                                                                                    40c2db6c9c5d62804bef06993aa2f521000c59c85fd32a395907afb8c8880cc2

                                                                                    SHA512

                                                                                    44878f27e2db4744812dadd3a28d40e77eb36e16b798c081bddcf1fda7ed4e60f1bb0b50179dd078397b0ec269e282064ae89e41bfcc06730026280823b09da7

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    740ab836f98f3b212cdcff92802903ea

                                                                                    SHA1

                                                                                    0e6bf875be22f848a38c6d92272e99b69ae45ae1

                                                                                    SHA256

                                                                                    1dcd999aa76a3a588ff89bdfa6b1e505c6d41225c5e8d1ad285c3186c098001a

                                                                                    SHA512

                                                                                    61a008fc78023904664039402081f1fefb1a65f10c1f1906817b74bbffbaeccaa7a372fcfa28475c01895745b97746afd727d8c8c57e3f1a4c7b52ffed9626b8

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    3dc4e92dad8cc60a9abebe802a8d4acf

                                                                                    SHA1

                                                                                    c9624798cd2a879657e85956ffed47d65ad39141

                                                                                    SHA256

                                                                                    cb13c07a3bf4e0f844b12817fb6f6bb5a1c77b77c1da0d8a498af170dfa1f18e

                                                                                    SHA512

                                                                                    95859a84db32f78827b0d97f29e9c31d78f154bfe7634bc0c43bac8dd9589b02ddc7d79a6e3cc393c7fb4269768415695fd3961ce8b6492c49bcdd82d0251c6a

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_16.db

                                                                                    Filesize

                                                                                    1024KB

                                                                                    MD5

                                                                                    bddc325dff21d9decad95a7eb8a354c1

                                                                                    SHA1

                                                                                    f0582bbe97de5f7efe3897dcaa173f7ce27e5bd3

                                                                                    SHA256

                                                                                    d6cab2c2e1bf2c74b07cce610f903db4ad626245030287051c37fd984f17b002

                                                                                    SHA512

                                                                                    fe2d25a5cc86a6edb9c0f82d4c7cd283e914b0bc819569d7a64c39b83ad01c7bd6cfe5a37c2dd36a19c9ee04beacfa8bcbc01936a932eb72ce806fdf4c410c9a

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_48.db

                                                                                    Filesize

                                                                                    24B

                                                                                    MD5

                                                                                    ae6fbded57f9f7d048b95468ddee47ca

                                                                                    SHA1

                                                                                    c4473ea845be2fb5d28a61efd72f19d74d5fc82e

                                                                                    SHA256

                                                                                    d3c9d1ff7b54b653c6a1125cac49f52070338a2dd271817bba8853e99c0f33a9

                                                                                    SHA512

                                                                                    f119d5ad9162f0f5d376e03a9ea15e30658780e18dd86e81812dda8ddf59addd1daa0706b2f5486df8f17429c2c60aa05d4f041a2082fd2ec6ea8cc9469fade3

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    efc4b305f5cef4e37aa388439b55066f

                                                                                    SHA1

                                                                                    76b68a010d1bca2e3b8c58fae542515e5d96a5f4

                                                                                    SHA256

                                                                                    c7890efd34711b18e4839700dd60402df3257db670df71315d393755f0131bb8

                                                                                    SHA512

                                                                                    1acb5f900a6fe1905ee1a3c9a45b113e38d68cc20104b8e368551f9033fa98feddf22e1236659a81e279cb8bec0115a23417f6d9f0d9b602507edeb239f4f154

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    ffcf7d3f0ca48d0b41c76c6e417bbcbb

                                                                                    SHA1

                                                                                    63b42ed0d4f8d76425aa4d364841e760a35c4870

                                                                                    SHA256

                                                                                    01fde96abf891f07cba37840f4bd9d1f99822bc4b58caae84c034d7dca671c57

                                                                                    SHA512

                                                                                    d2fc7307b9ece013191cc9816c2abb75351239a9358c14cd0f320ff89a82def1ff8bc88462f52cb77a25bf932eaaf1cbfd2f7ff0dbf3d5d3fb101585406b879b

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                    Filesize

                                                                                    18KB

                                                                                    MD5

                                                                                    a93955ed9790bd1de1f364ea63af234a

                                                                                    SHA1

                                                                                    0a8a44742a6782072b400a4672deabd4f3d29f9e

                                                                                    SHA256

                                                                                    f7e5031a0f3ae19741d39a176beb56ac0acad63d5e6ae52ee7d0c6a468acd32f

                                                                                    SHA512

                                                                                    bf6395e24ed2308a21c38d20c002b5c76a0c28c1b8e79f2b380ccd4348ba6f2bfd4c971f9f861e8ebb14bbd21d5f9a4b204ceaf5443ae1854f55ef939332b2ca

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                    Filesize

                                                                                    18KB

                                                                                    MD5

                                                                                    f3b1497e1fd588d43ad2130a7e0b4fe8

                                                                                    SHA1

                                                                                    625fefbf89917add9eb1eabc1c12246a6bc624b1

                                                                                    SHA256

                                                                                    de454b0c5dcbb22a036b4bc4768ddf22ccc9c0c574472aa9ab930158a4f52e48

                                                                                    SHA512

                                                                                    438b4a7754079c3e44132bcada929a0815d0d428a76d7d1a288730532afabca387e8af3438ba0b6ff6752f069392d91a67093181b15acce92f6e541136eb3d93

                                                                                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat

                                                                                    Filesize

                                                                                    5KB

                                                                                    MD5

                                                                                    92304d017f8dbc4571b00b3b42cc82bc

                                                                                    SHA1

                                                                                    862fa82bfefeb8a260b897435c923371e1ef5785

                                                                                    SHA256

                                                                                    c759550062cfae223e9a5c3974db81af53f043034eb1da634f579e17e70dc2a2

                                                                                    SHA512

                                                                                    f621ccfd7402442038644de2ba133cb1cc9d1f54e4bf4b1af450c5faca5ef8b8fcb7fef646693839569d4ed2ea0487fbdd4d89521f2e9552ee26a4f1642fddbc

                                                                                  • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\HVCJPK60\microsoft.windows[1].xml

                                                                                    Filesize

                                                                                    97B

                                                                                    MD5

                                                                                    72bf25ac6d3c8077e265f7625887105b

                                                                                    SHA1

                                                                                    51b52bc669e01811e9261069b4e6c703160f3b90

                                                                                    SHA256

                                                                                    760a918c3a9caefe1573ab926c6e3c703b0d0ce7cb3db83e018241bd5c72cad1

                                                                                    SHA512

                                                                                    f4d5a1a1b044a22f85cca274419fa6b4bf6debe41689305a642696de8858c10ace5312b95795d2e4a6ae9d3df3130a203294008879fc87a4b81e3d2e99684160

                                                                                  • C:\Users\Admin\AppData\Local\Temp\0adc2e09-eb6e-4d47-b4eb-a0b67373577c\test.bat

                                                                                    Filesize

                                                                                    8KB

                                                                                    MD5

                                                                                    b2a5ef7d334bdf866113c6f4f9036aae

                                                                                    SHA1

                                                                                    f9027f2827b35840487efd04e818121b5a8541e0

                                                                                    SHA256

                                                                                    27426aa52448e564b5b9dff2dbe62037992ada8336a8e36560cee7a94930c45e

                                                                                    SHA512

                                                                                    8ed39ed39e03fa6d4e49167e8ca4823e47a221294945c141b241cfd1eb7d20314a15608da3fafc3c258ae2cfc535d3e5925b56caceee87acfb7d4831d267189e

                                                                                  • C:\Users\Admin\AppData\Local\Temp\0adc2e09-eb6e-4d47-b4eb-a0b67373577c\test.bat.[62687D04].[[email protected]].makop

                                                                                    Filesize

                                                                                    8KB

                                                                                    MD5

                                                                                    73a6a205500b702b474f0b79f602d66e

                                                                                    SHA1

                                                                                    1bace1f130dbba8e19dc63deb703cccbfbd78718

                                                                                    SHA256

                                                                                    f7103f70d0719186b4f499ff026d5671dc6ec07be11262a4879c4ef5b34e5303

                                                                                    SHA512

                                                                                    52a444d2111fd723c32573bad06236a583043981c1e6042f7bc32cd81be799124aefcb8666221f83a7f268026734058e658d8290ba65bad8ce79c9abb0643f44

                                                                                  • C:\Users\Admin\AppData\Local\Temp\76541d97-945f-4d78-b491-730d1899467b\AdvancedRun.exe

                                                                                    Filesize

                                                                                    88KB

                                                                                    MD5

                                                                                    17fc12902f4769af3a9271eb4e2dacce

                                                                                    SHA1

                                                                                    9a4a1581cc3971579574f837e110f3bd6d529dab

                                                                                    SHA256

                                                                                    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                                                                                    SHA512

                                                                                    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ldz2rmzu.uik.ps1

                                                                                    Filesize

                                                                                    60B

                                                                                    MD5

                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                    SHA1

                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                    SHA256

                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                    SHA512

                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.jpg

                                                                                    Filesize

                                                                                    51KB

                                                                                    MD5

                                                                                    bd74a3c50fd08981e89d96859e176d68

                                                                                    SHA1

                                                                                    0a98b96aefe60b96722d587b7c3aabcd15927618

                                                                                    SHA256

                                                                                    ab305218ee0e95fa553885fa52f3a25dcc13b4deade8b7993ccb9f230a272837

                                                                                    SHA512

                                                                                    0704243904abc3691177e34606fe2741945f69cf7ecb898655d98e81b145bf707d20cfa0af01fb3aa1cd170e2f3ce8f625b1612e0fcf5eba01f770617ffc9f1e

                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\TranscodedWallpaper

                                                                                    Filesize

                                                                                    71KB

                                                                                    MD5

                                                                                    6d7960a52b61551fed5ae46fc1f475aa

                                                                                    SHA1

                                                                                    68424a542d1d8b2ba26486753c9fa63d733172eb

                                                                                    SHA256

                                                                                    9fcc5fc179dc359ce73e4ba4b7730a5ce57fb6575ad9b26171970812de25c5db

                                                                                    SHA512

                                                                                    61a65528964576ea79e9f75b2e39d7562c0f4bf730b605fe6cd67fed41ffae40abe2ece54e277ed3346dff951d59902d5fe4329374e11f813dd571ffaf3c94d9

                                                                                  • memory/1016-18832-0x0000000004D40000-0x0000000004D41000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/1072-85-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/1072-60-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/1072-62-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/1072-15089-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/1072-58-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/1072-18580-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/1116-18875-0x00000000047C0000-0x00000000047C1000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/1156-758-0x0000000075270000-0x0000000075A20000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/1156-759-0x00000000021A0000-0x00000000021B0000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/1156-1277-0x0000000075270000-0x0000000075A20000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/1156-760-0x00000000021A0000-0x00000000021B0000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/1156-774-0x00000000054D0000-0x0000000005824000-memory.dmp

                                                                                    Filesize

                                                                                    3.3MB

                                                                                  • memory/1156-800-0x00000000021A0000-0x00000000021B0000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/1156-932-0x000000007F6F0000-0x000000007F700000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/1156-933-0x0000000070820000-0x000000007086C000-memory.dmp

                                                                                    Filesize

                                                                                    304KB

                                                                                  • memory/1196-18684-0x0000019D9C720000-0x0000019D9C740000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/1196-18682-0x0000019D9C320000-0x0000019D9C340000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/1196-18679-0x0000019D9C360000-0x0000019D9C380000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/1276-18671-0x0000000004C80000-0x0000000004C81000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/1360-69-0x0000000007A40000-0x0000000007A48000-memory.dmp

                                                                                    Filesize

                                                                                    32KB

                                                                                  • memory/1360-25-0x00000000054D0000-0x0000000005536000-memory.dmp

                                                                                    Filesize

                                                                                    408KB

                                                                                  • memory/1360-19-0x0000000002AD0000-0x0000000002B06000-memory.dmp

                                                                                    Filesize

                                                                                    216KB

                                                                                  • memory/1360-20-0x0000000075270000-0x0000000075A20000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/1360-84-0x0000000075270000-0x0000000075A20000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/1360-21-0x00000000050A0000-0x00000000050B0000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/1360-22-0x00000000050A0000-0x00000000050B0000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/1360-66-0x0000000007A60000-0x0000000007A7A000-memory.dmp

                                                                                    Filesize

                                                                                    104KB

                                                                                  • memory/1360-65-0x0000000007960000-0x0000000007974000-memory.dmp

                                                                                    Filesize

                                                                                    80KB

                                                                                  • memory/1360-23-0x00000000056E0000-0x0000000005D08000-memory.dmp

                                                                                    Filesize

                                                                                    6.2MB

                                                                                  • memory/1360-63-0x0000000007950000-0x000000000795E000-memory.dmp

                                                                                    Filesize

                                                                                    56KB

                                                                                  • memory/1360-24-0x0000000005430000-0x0000000005452000-memory.dmp

                                                                                    Filesize

                                                                                    136KB

                                                                                  • memory/1360-57-0x0000000007920000-0x0000000007931000-memory.dmp

                                                                                    Filesize

                                                                                    68KB

                                                                                  • memory/1360-56-0x00000000079A0000-0x0000000007A36000-memory.dmp

                                                                                    Filesize

                                                                                    600KB

                                                                                  • memory/1360-55-0x0000000007790000-0x000000000779A000-memory.dmp

                                                                                    Filesize

                                                                                    40KB

                                                                                  • memory/1360-54-0x0000000007720000-0x000000000773A000-memory.dmp

                                                                                    Filesize

                                                                                    104KB

                                                                                  • memory/1360-53-0x0000000007D60000-0x00000000083DA000-memory.dmp

                                                                                    Filesize

                                                                                    6.5MB

                                                                                  • memory/1360-52-0x0000000007600000-0x00000000076A3000-memory.dmp

                                                                                    Filesize

                                                                                    652KB

                                                                                  • memory/1360-51-0x00000000069B0000-0x00000000069CE000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/1360-41-0x0000000070820000-0x000000007086C000-memory.dmp

                                                                                    Filesize

                                                                                    304KB

                                                                                  • memory/1360-40-0x0000000006A00000-0x0000000006A32000-memory.dmp

                                                                                    Filesize

                                                                                    200KB

                                                                                  • memory/1360-39-0x00000000050A0000-0x00000000050B0000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/1360-38-0x00000000066F0000-0x000000000673C000-memory.dmp

                                                                                    Filesize

                                                                                    304KB

                                                                                  • memory/1360-37-0x0000000006420000-0x000000000643E000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/1360-36-0x0000000005E10000-0x0000000006164000-memory.dmp

                                                                                    Filesize

                                                                                    3.3MB

                                                                                  • memory/1360-26-0x0000000005540000-0x00000000055A6000-memory.dmp

                                                                                    Filesize

                                                                                    408KB

                                                                                  • memory/1564-18658-0x000001D761070000-0x000001D761090000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/1564-18656-0x000001D7610B0000-0x000001D7610D0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/1564-18660-0x000001D761480000-0x000001D7614A0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/2316-18633-0x00000143E80E0000-0x00000143E8100000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/2316-18635-0x00000143E80A0000-0x00000143E80C0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/2316-18637-0x00000143E84B0000-0x00000143E84D0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/2880-18809-0x0000000002C00000-0x0000000002C01000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/2952-18648-0x0000000004DA0000-0x0000000004DA1000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/3116-18747-0x000001329F5C0000-0x000001329F5E0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/3116-18749-0x000001329F580000-0x000001329F5A0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/3116-18751-0x000001329F990000-0x000001329F9B0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/3320-18820-0x000002B450210000-0x000002B450230000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/3320-18818-0x000002B44FE00000-0x000002B44FE20000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/3320-18816-0x000002B44FE40000-0x000002B44FE60000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/3516-18786-0x0000000002B20000-0x0000000002B21000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/3576-1691-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/3592-18626-0x00000000031D0000-0x00000000031D1000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/3644-18739-0x0000000004520000-0x0000000004521000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/3820-18799-0x000001E35BDE0000-0x000001E35BE00000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/3820-18796-0x000001E35B7D0000-0x000001E35B7F0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/3820-18793-0x000001E35BA20000-0x000001E35BA40000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/3856-18838-0x000002117B430000-0x000002117B450000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/3856-18840-0x000002117B3F0000-0x000002117B410000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/3856-18845-0x000002117B800000-0x000002117B820000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/3892-18707-0x0000026CB7590000-0x0000026CB75B0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/3892-18703-0x0000026CB71C0000-0x0000026CB71E0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/3892-18705-0x0000026CB7180000-0x0000026CB71A0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/4160-18715-0x0000000002A60000-0x0000000002A61000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/4244-18775-0x0000026AA4280000-0x0000026AA42A0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/4244-18771-0x0000026AA3CB0000-0x0000026AA3CD0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/4244-18773-0x0000026AA3C70000-0x0000026AA3C90000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/4344-18853-0x0000000002C10000-0x0000000002C11000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/4352-64-0x0000000075270000-0x0000000075A20000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/4352-18695-0x0000000003E60000-0x0000000003E61000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/4352-1837-0x0000000075270000-0x0000000075A20000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/4352-761-0x0000000006F20000-0x0000000006F30000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4600-18865-0x000001EF99FD0000-0x000001EF99FF0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/4600-18863-0x000001EF999C0000-0x000001EF999E0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/4600-18860-0x000001EF99C00000-0x000001EF99C20000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/4632-2-0x0000000004E40000-0x0000000004EDC000-memory.dmp

                                                                                    Filesize

                                                                                    624KB

                                                                                  • memory/4632-4-0x0000000006A10000-0x0000000006FB4000-memory.dmp

                                                                                    Filesize

                                                                                    5.6MB

                                                                                  • memory/4632-71-0x0000000075270000-0x0000000075A20000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/4632-61-0x0000000075270000-0x0000000075A20000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/4632-3-0x00000000048D0000-0x000000000492E000-memory.dmp

                                                                                    Filesize

                                                                                    376KB

                                                                                  • memory/4632-0-0x0000000075270000-0x0000000075A20000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/4632-1-0x0000000000270000-0x0000000000464000-memory.dmp

                                                                                    Filesize

                                                                                    2.0MB

                                                                                  • memory/4876-18763-0x00000000028B0000-0x00000000028B1000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/5056-18723-0x0000025C47F80000-0x0000025C47FA0000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/5056-18725-0x0000025C47F40000-0x0000025C47F60000-memory.dmp

                                                                                    Filesize

                                                                                    128KB

                                                                                  • memory/5056-18728-0x0000025C48350000-0x0000025C48370000-memory.dmp

                                                                                    Filesize

                                                                                    128KB