Analysis

  • max time kernel
    150s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2024 11:01

General

  • Target

    c4580e8db0c3dbc88891842fd8a31158.exe

  • Size

    5.5MB

  • MD5

    c4580e8db0c3dbc88891842fd8a31158

  • SHA1

    744f03fcf10db1459d3f40beaea2bfe1b000582b

  • SHA256

    1f435b3a62304733dce1b9caf24cfac768db739127e8ec31d466455628ec0922

  • SHA512

    cefd412e0d5aba56d6603fdc46a056474ce387dbb220b32a9317dca0822bef9320515afacc2ab2086db46f9e01b3456c87a0dc83bd99c246550d87efd3606945

  • SSDEEP

    98304:Fs9EI6sZJrf04Hr3VvPkrcRizJ6krK4JLQaEHlXU+vG9G1jMaZQRrkp:W+I6sU4HjZkwkVJo1+G1jMaZQpk

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://habrafa.com/test1/get.php

Attributes
  • extension

    .ldhy

  • offline_id

    pIGzEr0bxHiTz7xnvNidWeqzKkxMfVdHTyCkzwt1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://habrafa.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://we.tl/t-hPAqznkJKD Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0849ASdw

rsa_pubkey.plain

Extracted

Family

vidar

Version

7.6

Botnet

1b9d7ec5a25ab9d78c31777a0016a097

C2

https://t.me/tvrugrats

https://steamcommunity.com/profiles/76561199627279110

Attributes
  • profile_id_v2

    1b9d7ec5a25ab9d78c31777a0016a097

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Fabookie payload 2 IoCs
  • Detect Vidar Stealer 4 IoCs
  • Detect ZGRat V1 1 IoCs
  • Detected Djvu ransomware 14 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Fabookie

    Fabookie is facebook account info stealer.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 11 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Windows security bypass 2 TTPs 7 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Modifies boot configuration data using bcdedit 1 TTPs 14 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Executes dropped EXE 29 IoCs
  • Loads dropped DLL 51 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4580e8db0c3dbc88891842fd8a31158.exe
    "C:\Users\Admin\AppData\Local\Temp\c4580e8db0c3dbc88891842fd8a31158.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Users\Admin\AppData\Local\Temp\InstallSetup_nine.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallSetup_nine.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Users\Admin\AppData\Local\Temp\u1s8.0.exe
        "C:\Users\Admin\AppData\Local\Temp\u1s8.0.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:352
      • C:\Users\Admin\AppData\Local\Temp\u1s8.1.exe
        "C:\Users\Admin\AppData\Local\Temp\u1s8.1.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:992
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2280
    • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe
      "C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2740
      • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe
        "C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"
        3⤵
        • Windows security bypass
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Adds Run key to start application
        • Checks for VirtualBox DLLs, possible anti-VM trick
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2400
        • C:\Windows\system32\cmd.exe
          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1016
        • C:\Windows\rss\csrss.exe
          C:\Windows\rss\csrss.exe
          4⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Manipulates WinMon driver.
          • Manipulates WinMonFS driver.
          • Drops file in Windows directory
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2648
          • C:\Windows\system32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            5⤵
            • Creates scheduled task(s)
            PID:2316
          • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
            "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            PID:1356
            • C:\Windows\system32\bcdedit.exe
              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
              6⤵
              • Modifies boot configuration data using bcdedit
              PID:2872
            • C:\Windows\system32\bcdedit.exe
              C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
              6⤵
              • Modifies boot configuration data using bcdedit
              PID:1972
            • C:\Windows\system32\bcdedit.exe
              C:\Windows\system32\bcdedit.exe -timeout 0
              6⤵
              • Modifies boot configuration data using bcdedit
              PID:1496
            • C:\Windows\system32\bcdedit.exe
              C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
              6⤵
              • Modifies boot configuration data using bcdedit
              PID:604
            • C:\Windows\system32\bcdedit.exe
              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
              6⤵
              • Modifies boot configuration data using bcdedit
              PID:2736
            • C:\Windows\system32\bcdedit.exe
              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
              6⤵
              • Modifies boot configuration data using bcdedit
              PID:1744
            • C:\Windows\system32\bcdedit.exe
              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
              6⤵
              • Modifies boot configuration data using bcdedit
              PID:2424
            • C:\Windows\system32\bcdedit.exe
              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
              6⤵
              • Modifies boot configuration data using bcdedit
              PID:1180
            • C:\Windows\system32\bcdedit.exe
              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
              6⤵
              • Modifies boot configuration data using bcdedit
              PID:1756
            • C:\Windows\system32\bcdedit.exe
              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
              6⤵
              • Modifies boot configuration data using bcdedit
              PID:2204
            • C:\Windows\system32\bcdedit.exe
              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
              6⤵
              • Modifies boot configuration data using bcdedit
              PID:2968
            • C:\Windows\system32\bcdedit.exe
              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
              6⤵
              • Modifies boot configuration data using bcdedit
              PID:2220
            • C:\Windows\system32\bcdedit.exe
              C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
              6⤵
              • Modifies boot configuration data using bcdedit
              PID:2360
          • C:\Windows\system32\schtasks.exe
            schtasks /delete /tn ScheduledUpdate /f
            5⤵
              PID:2336
            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
              C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:1112
            • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
              C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
              5⤵
              • Executes dropped EXE
              PID:1992
            • C:\Windows\system32\bcdedit.exe
              C:\Windows\Sysnative\bcdedit.exe /v
              5⤵
              • Modifies boot configuration data using bcdedit
              PID:2352
            • C:\Windows\system32\schtasks.exe
              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
              5⤵
              • Creates scheduled task(s)
              PID:480
            • C:\Windows\windefender.exe
              "C:\Windows\windefender.exe"
              5⤵
              • Executes dropped EXE
              PID:2244
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                  PID:756
                  • C:\Windows\SysWOW64\sc.exe
                    sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                    7⤵
                    • Launches sc.exe
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3012
        • C:\Users\Admin\AppData\Local\Temp\rty25.exe
          "C:\Users\Admin\AppData\Local\Temp\rty25.exe"
          2⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:2680
        • C:\Users\Admin\AppData\Local\Temp\toolspub1.exe
          "C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"
          2⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:1044
      • C:\Windows\system32\makecab.exe
        "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240205110116.log C:\Windows\Logs\CBS\CbsPersist_20240205110116.cab
        1⤵
          PID:3044
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          1⤵
          • Modifies Windows Firewall
          • Modifies data under HKEY_USERS
          PID:1360
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
          1⤵
          • Creates scheduled task(s)
          PID:1864
        • C:\Windows\SysWOW64\chcp.com
          chcp 1251
          1⤵
            PID:332
          • C:\Users\Admin\AppData\Local\Temp\78D8.exe
            C:\Users\Admin\AppData\Local\Temp\78D8.exe
            1⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            • Suspicious behavior: MapViewOfSection
            PID:288
          • C:\Users\Admin\AppData\Local\Temp\9A4D.exe
            C:\Users\Admin\AppData\Local\Temp\9A4D.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2788
            • C:\Users\Admin\AppData\Local\Temp\9A4D.exe
              C:\Users\Admin\AppData\Local\Temp\9A4D.exe
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Modifies system certificate store
              PID:2712
              • C:\Windows\SysWOW64\icacls.exe
                icacls "C:\Users\Admin\AppData\Local\e363a746-1d06-4d00-a750-973c42805e5c" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                3⤵
                • Modifies file permissions
                PID:2608
              • C:\Users\Admin\AppData\Local\Temp\9A4D.exe
                "C:\Users\Admin\AppData\Local\Temp\9A4D.exe" --Admin IsNotAutoStart IsNotTask
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                PID:2840
                • C:\Users\Admin\AppData\Local\Temp\9A4D.exe
                  "C:\Users\Admin\AppData\Local\Temp\9A4D.exe" --Admin IsNotAutoStart IsNotTask
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:2520
                  • C:\Users\Admin\AppData\Local\21a701e8-2041-4bd1-b10d-c53c5829f17c\build2.exe
                    "C:\Users\Admin\AppData\Local\21a701e8-2041-4bd1-b10d-c53c5829f17c\build2.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:268
                    • C:\Users\Admin\AppData\Local\21a701e8-2041-4bd1-b10d-c53c5829f17c\build2.exe
                      "C:\Users\Admin\AppData\Local\21a701e8-2041-4bd1-b10d-c53c5829f17c\build2.exe"
                      6⤵
                      • Executes dropped EXE
                      • Modifies system certificate store
                      PID:2784
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 1440
                        7⤵
                        • Loads dropped DLL
                        • Program crash
                        PID:2288
                  • C:\Users\Admin\AppData\Local\21a701e8-2041-4bd1-b10d-c53c5829f17c\build3.exe
                    "C:\Users\Admin\AppData\Local\21a701e8-2041-4bd1-b10d-c53c5829f17c\build3.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:696
                    • C:\Users\Admin\AppData\Local\21a701e8-2041-4bd1-b10d-c53c5829f17c\build3.exe
                      "C:\Users\Admin\AppData\Local\21a701e8-2041-4bd1-b10d-c53c5829f17c\build3.exe"
                      6⤵
                      • Executes dropped EXE
                      PID:1820
                      • C:\Windows\SysWOW64\schtasks.exe
                        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                        7⤵
                        • Creates scheduled task(s)
                        PID:2180
          • C:\Windows\system32\taskeng.exe
            taskeng.exe {081BE7A6-5F98-438E-A8B4-E13C3BC2D6A8} S-1-5-21-3601492379-692465709-652514833-1000:CALKHSYM\Admin:Interactive:[1]
            1⤵
              PID:2996
              • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:2980
                • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                  C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                  3⤵
                  • Executes dropped EXE
                  PID:840
              • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:2752
                • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                  C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                  3⤵
                  • Executes dropped EXE
                  PID:108
            • C:\Windows\SysWOW64\schtasks.exe
              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
              1⤵
              • Creates scheduled task(s)
              PID:828
            • C:\Users\Admin\AppData\Local\Temp\F6E.exe
              C:\Users\Admin\AppData\Local\Temp\F6E.exe
              1⤵
              • Executes dropped EXE
              PID:1092
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 96
                2⤵
                • Loads dropped DLL
                • Program crash
                PID:2720
            • C:\Users\Admin\AppData\Local\Temp\171C.exe
              C:\Users\Admin\AppData\Local\Temp\171C.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Drops file in Windows directory
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              PID:2652
            • C:\Users\Admin\AppData\Local\Temp\26EA.exe
              C:\Users\Admin\AppData\Local\Temp\26EA.exe
              1⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              PID:904
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                2⤵
                  PID:880
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 92
                    3⤵
                    • Program crash
                    PID:584
              • C:\Windows\windefender.exe
                C:\Windows\windefender.exe
                1⤵
                • Executes dropped EXE
                • Modifies data under HKEY_USERS
                PID:1636

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                Filesize

                1KB

                MD5

                95a94f582e52ab36e13c3acf8c351291

                SHA1

                9c2bb2f35ac04b6dec613cc8536af991894e0f0b

                SHA256

                0f7c853990dc2ed00794ce95880ada9a11a53697dcfdbcd008d226983919f316

                SHA512

                6e68bdeee605c419ecbde3e9287bb4c05ef9a5bdcc267d97790a20dd68b93a865a22d3b884b537ba8ebab74021384768eaf54a81fb1aa52b6b7424befb11f55f

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                Filesize

                724B

                MD5

                8202a1cd02e7d69597995cabbe881a12

                SHA1

                8858d9d934b7aa9330ee73de6c476acf19929ff6

                SHA256

                58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

                SHA512

                97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                Filesize

                1KB

                MD5

                a266bb7dcc38a562631361bbf61dd11b

                SHA1

                3b1efd3a66ea28b16697394703a72ca340a05bd5

                SHA256

                df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                SHA512

                0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                Filesize

                410B

                MD5

                e83a73e2c2a89e3185477f1ee44b6394

                SHA1

                6aa06b1bb7ec304ff2b00e7f2853a01b45b6d773

                SHA256

                1748691d6c4a0ec842c332efef6b39f71aaa7f0620edbc724f692b8b54851569

                SHA512

                4ebace6f032d8c2101a6deeea834f4d65cab9fe31be1cb76b234fa40bf9c5970664fd7f983ff785c17d7672295a922d9af8308368a95e24a726b51825ce7f3c4

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                cba81b8035817aa3c9680037a534b426

                SHA1

                daf612be5786e7ac193b2eceddcd0449ceda9841

                SHA256

                d85e70a92d4893ad9ba142f95372ef340fc4bcdd9280f824dc577cf3b88d24e6

                SHA512

                3ff90a93868e30ca223f3b4187270fc548c0fb435ac6a299f5db7441d2797d0e831fb5da9f90e8f5f76b9f2605f360ee86948a6cf7e59e7be74392ec8e5ca554

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                3540d053bdf9a56648c1550f3e147a74

                SHA1

                996034e7edafb11f4690ece0f5e0278e0b7f7871

                SHA256

                14f57e57e4e1e93b2f37fb022d5a233281801092c92e607d8acc1b67c07950ea

                SHA512

                00e91f956af1c215cae47a84b1b224854e7a61a3178b5b499454cfa5165fd60a8a6fb725d5b6d7e1d7c148ce102b079f69acfc988261588567be6bdfdc2593bc

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                536293abe40ecc986cd09d6d9945f5ef

                SHA1

                f8cbe29aa3be60bc382f979283dab2c1ca296f85

                SHA256

                b30131076a125199488926ba8bd7a1ab91e5fa16595673967e2183284f81477b

                SHA512

                6d789e8883dd08435481136734b993ae895ba9f2c6e80cecd6729c23acb97ed0764ba16031ffb0c5a4033250af75ed6ec877af5744ce5206d4f8f785fbbb4358

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                ba491a9dc34efcb26d8e79f536c5e8c7

                SHA1

                e00a375ed5f489b767af6b48e208bd970dc3bd5c

                SHA256

                05de3d368303a80a719c2653798dc81db64809187725108abebbf6d372f47535

                SHA512

                dd4526a0ac827162403b8ccd83a1b1e8a9b37a71223316d4b8064c255b724543d7e2fb8c3e5b9221232f8d028c265fe3ac4b336729e4c1df503e9fe06da07cff

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                Filesize

                392B

                MD5

                3b2284298a492e6ec71c414cbed6f475

                SHA1

                34ca23e1afa1aea2ef6358165c63dc90c67875b2

                SHA256

                7ed7251b5e1428b3b4afff3a2017d76fc0689966b3fb98c949a02add9b9a0fae

                SHA512

                8e096c754934de069785815642f5ff8c072750c30cdf7f6fc5fed7e35db6a0586210d6ac2d15126372a0a443f7779f1906b62171c05632b73ad685d045137987

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                Filesize

                242B

                MD5

                a5067d40bc41193da55aa122eca1c644

                SHA1

                6b5e8bdffe860c9b1796802e5500bd2dcee16bb6

                SHA256

                1d98bef14806421220cc500fc4b06c4a85552807c8f00b311b767e2130f2240b

                SHA512

                a2fc3d2599e0fa085fb13230721b4ca9a01ef0470280aa325ae4447e4024b3c443f5dd88893d3a1c8ca88cce860c1a92e9bc7cfbe477158e328b3572322019b1

              • C:\Users\Admin\AppData\Local\21a701e8-2041-4bd1-b10d-c53c5829f17c\build2.exe

                Filesize

                28KB

                MD5

                c05b0eedf6502a6013125152191a963b

                SHA1

                990dcea7a019bdeadac705e6e78a8d276dacb1c4

                SHA256

                c57d0f773b38a65a01d6fd11d39f1e996e0ad60c8158166efe73e6438dc9b082

                SHA512

                a564b007a00be8896c4049a1c0868bf59a7c510e28f49f3b39583b7bf9acbb98963cf34830a3485736c5b9d75ecdf8d87cf4f644d24feed3e841b036d42350e6

              • C:\Users\Admin\AppData\Local\21a701e8-2041-4bd1-b10d-c53c5829f17c\build2.exe

                Filesize

                64KB

                MD5

                f37662805a083070abce1e95532371fd

                SHA1

                497e59f59b3b9c9f842b17461499b5aae20fa031

                SHA256

                5df2e781b6cb430b7a98b8d3796c3061d9c1e7863f1315d899cdba6ce2ccb167

                SHA512

                f6478d5273e8aa62b4d43a7fe0693a01fbfe8a6ec064f2660f3951f4c6a58a45cb14743e595d60fb1af517de593d059387145d4534b16185ead7fa788c211c16

              • C:\Users\Admin\AppData\Local\21a701e8-2041-4bd1-b10d-c53c5829f17c\build2.exe

                Filesize

                313KB

                MD5

                9d69a4b617fde921dbe0371c0717ba7f

                SHA1

                42961dda5d208960a85af4e9a7d3860121967283

                SHA256

                3bc83cfd3a8d4c5caa9cc52be2ac2bc0b6d39e7e7ccc223e76d8082a07734df8

                SHA512

                de9155a1c4ecbf106fc292a8fb1f0db35d0543876ecbe412d3b0bcbd9af48867d612619eaf7e6cebbb21b615a6fca2c683eaa1894022282cf9a0fc77d441d791

              • C:\Users\Admin\AppData\Local\21a701e8-2041-4bd1-b10d-c53c5829f17c\build3.exe

                Filesize

                264KB

                MD5

                cb7d407a7683a975abd4eb04e8cc2abc

                SHA1

                f72d62b4cbe0d97d6ba099ffa56ce763a8b5086e

                SHA256

                13178698a1d7ed4c33ce9804fda5a9a167191a209ecef33277edd8e2bd541dec

                SHA512

                6b14796d5f11c5dd793e9878e4a13cdf6066667808892aa709e5cb0877447b489fb04d5e445b083f6f908fa88e1cb89b8c36e97bc4c97b594ee7d2f2db6bccb8

              • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                Filesize

                2.5MB

                MD5

                b1c30caedd619e8f26c16ccbc0f0a95f

                SHA1

                e1da667e9a11dea55566ebd79bba8dc3f2a0bf5d

                SHA256

                a1e3bcf29a0a23c82347e7c7b85afeaca954e72618dbae109cad8cf6c022a9e7

                SHA512

                70ae2cfef63bceaba5d07791677268df7b57846c42d6c61608943d48b69cb0b5cfa976946a5a2322c7c1e5ca12e89da7a28c9651fe9244e7763f60a88580330d

              • C:\Users\Admin\AppData\Local\Temp\78D8.exe

                Filesize

                202KB

                MD5

                ee108bdf90633df74b6ba9daf21114ab

                SHA1

                594cf0ef2d461f03ff50109bbead7e214d2622b8

                SHA256

                bdf96159dd4607365aef14e037b5276d29e63a3c7d6420bf8570ee5925f21a6b

                SHA512

                06b83a71563fb3b46c7aa8c6b1297f102035b330c10b21ceb16ca810e464677ea442d1608a191a80438ab1cafaeeee91825af5ceef99bc17e38712f06f4db2e4

              • C:\Users\Admin\AppData\Local\Temp\9A4D.exe

                Filesize

                172KB

                MD5

                14c74c470616dc437e59a0a8bb4f57e6

                SHA1

                d74d0be8218e538c6399812aa60e38eaafe31cba

                SHA256

                69c4c2b5cd76b3cac6e988686faeeefd5e511b76aec9ebdc16ea9c81ae9ce2e9

                SHA512

                afa04c48eed9ae483b2e736fc61efd4ddde20d4cf5772180c8267d0f1e9129fa1a4fdb84922f1571922dd656ca96c60e549d61cea7cfa9bf2e1dc66841c0c9a3

              • C:\Users\Admin\AppData\Local\Temp\9A4D.exe

                Filesize

                128KB

                MD5

                dce16d23bd896d5a128ecbe90404fef5

                SHA1

                af8ac04a7e78569cc6f34b3176513e0c31a5c0be

                SHA256

                00a9a8c99cfa1c0da6df6fbc2aa46fca2d2c81d341bd3dd257ff367ba2f388b2

                SHA512

                f194a02e6b72421faad925c58142e510dd0c80e8031a46f8ac9267a93d9acecf97cc8b54599376b4e1afe6050e0d3ce80e7afe9f7e47ce8abba89e750b1072f9

              • C:\Users\Admin\AppData\Local\Temp\9A4D.exe

                Filesize

                401KB

                MD5

                98882864938c594c21180954f6ec025a

                SHA1

                eb52cef059e146e2c2d2a16759f26daa7d857f34

                SHA256

                67e80ce976c5797f75a2178d5dcf0b30e2b74031433292581a8ade688186e99b

                SHA512

                2750568209ebc0acb3174c280b5a5c9f49fff11868fa5aaaaa20cf0b2b09f63622465b5d7067203875d102f90b9fad65bfb9579980f288ab144fdc732c7ac84e

              • C:\Users\Admin\AppData\Local\Temp\9A4D.exe

                Filesize

                71KB

                MD5

                afbb0a59f34d9f859bc9cfda06b311f5

                SHA1

                fef98ac181e8dcc4d482dd0a2e4caa9e65a79a0f

                SHA256

                45c03f369b0e63ee471117f75e424b5cb475eb8eedcdf3540c518e612a7e84bf

                SHA512

                2461c1b1a072f8d754c7f877a11d6d702a6b3499e5606ab670e8f1b5e068b6dee5d4abff64d2748054f784280c5ae593101ab019acaa06068c8f42178fa6026a

              • C:\Users\Admin\AppData\Local\Temp\9A4D.exe

                Filesize

                157KB

                MD5

                95d330a9484d49e8ee461f91b98cea63

                SHA1

                5503a0a7deda966a2e1af7dac5a084dc8fda3320

                SHA256

                86f705a01a582d8762c705807277d1d1bd09edac2a88ec5288c03e1fee110e52

                SHA512

                5c5916d7577a99c1a2026add04395a649b050b63a2a209f1012008d1f9d89341c0f3c70e38144fd29c9127bcbd96c998882c89066d0a6fe4a1a2dce5cbfc3124

              • C:\Users\Admin\AppData\Local\Temp\9A4D.exe

                Filesize

                39KB

                MD5

                fb3254927970f32066abba87be884000

                SHA1

                0168cad1de8cd75c8aa70002ef50571ef67acacb

                SHA256

                1c4393e71aa31d8fc17acf6f8dec3b7ae6fa8928454759553837c72d01ad511c

                SHA512

                406be60f94ddb11dbb217097cec5d4ccc140198699b29d9d247b14cc45b64325825157ac569dcd757cc1e6322b56ae9a4cc5d3c45b8c80c7ed90e16ed1d3eff0

              • C:\Users\Admin\AppData\Local\Temp\Cab2A9B.tmp

                Filesize

                65KB

                MD5

                ac05d27423a85adc1622c714f2cb6184

                SHA1

                b0fe2b1abddb97837ea0195be70ab2ff14d43198

                SHA256

                c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                SHA512

                6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

              • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

                Filesize

                8.3MB

                MD5

                fd2727132edd0b59fa33733daa11d9ef

                SHA1

                63e36198d90c4c2b9b09dd6786b82aba5f03d29a

                SHA256

                3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e

                SHA512

                3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

              • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

                Filesize

                492KB

                MD5

                fafbf2197151d5ce947872a4b0bcbe16

                SHA1

                a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020

                SHA256

                feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71

                SHA512

                acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6

              • C:\Users\Admin\AppData\Local\Temp\Tar2B59.tmp

                Filesize

                171KB

                MD5

                9c0c641c06238516f27941aa1166d427

                SHA1

                64cd549fb8cf014fcd9312aa7a5b023847b6c977

                SHA256

                4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                SHA512

                936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                Filesize

                136KB

                MD5

                b1574073149ec6427f5d213e44ce0e89

                SHA1

                c5e46f5a4c35dd77c6806685c39be59b4e1b384b

                SHA256

                a20c339cd5794a98c1a946fb1c02c5735f411b7fbc1f79dda5b3bd1d44cdaa18

                SHA512

                296544e82bdd8e7617ded5c41ce3f2d3c26308910f2d4083e9f4bba84fd0e4769ac9e2d3fb1d6d6a08f59d5100648301b487e6256c2f103db799486100faf8e0

              • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe

                Filesize

                187KB

                MD5

                3c0de0cfa49806f1f6a1c52c3061ecf1

                SHA1

                f545c3fc7eaa0ce14aa2119849250db1698ec793

                SHA256

                882cc8ba153ee9853b2ff83fb16a7bf6916be9befed179652d998766c22853dd

                SHA512

                cc694db2f070ba560fa242975cd4d5a92197a135c3c55038d20ea916dd7877c1403f5315aa5f5674d1bd1355745c831c944feba7a6322fe806ea437328ce1a15

              • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                Filesize

                1.3MB

                MD5

                763c6465ffb504096c76f8cf1102f3aa

                SHA1

                5665bd3c6a0bc83f4aac795ae1ce71b112aa84fb

                SHA256

                8d8c2baec6cb7251e0aa16babbe2bca4d666194d8cdda07ec0b7bd5ec20ce354

                SHA512

                7fc786337a4d3bb3e1c4221ec265d1a0e6122127844e8772c2ef269ac4fa00acb456807338eeff98bfed9bc4b8ab09491ffefc28724fdb50805e11f0142edc38

              • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                Filesize

                2.1MB

                MD5

                f8b98e90b8fea9474ea285ffa5da7d74

                SHA1

                60df6869c93343303056bcb21cea98da8133842d

                SHA256

                a63b2751f5531cffcccc503f469893967c8a84fd82cd85040c35d2237cd7ab36

                SHA512

                3853ba6d749b6e61b110da080a5fc6dcd865bd7526f540a5f2a3d198e3c8e4be194dedc8a866f5951b9a11b6b11c0a1a8d54a612c58ea41a4c07b8153d44b729

              • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                Filesize

                1.7MB

                MD5

                1cc93c4375dd275e828b499f38d019fb

                SHA1

                44a4f93ceb7ee62f0f2482664b3e07dfa9d3c946

                SHA256

                c857f60aee41a09fa6156be2a682fa153508e2f162110af098c0d89347cdb025

                SHA512

                507f1543b860f970f92bc8eb5b10066a06a99965b47132013ffb7554fe242f43786c6508134de25a6bc4b0f07a0b1db4886e70b13c2b9fa3fd53c653630b389c

              • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                Filesize

                1009KB

                MD5

                a0d0e4a177967fc4fe5741b0feb7fb77

                SHA1

                4eea5bb9f8010cd3c678196271c4ad7b9c36d61b

                SHA256

                075dc6bc940dc6ad63c865ce8472bd8fe734d631686430a4434565008aaa7b37

                SHA512

                f5645a57afe76c649aec934719a80e865a0975b069c37da0f944d91e22305b3c78d184f224741761abf074bb738e732b4f2a8441b69291a2584eef39f37fe8c2

              • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                Filesize

                150KB

                MD5

                599fa52f87e65330120846e1d2e08966

                SHA1

                d22e618dec4c967a5db2889c9c20e3124376db10

                SHA256

                2cb209191b38acc326be716274f5c344303fac2e633dc7c00df9325b8c7f9d39

                SHA512

                43f9400ff38ea84dfdd8ce6002ced345fd5171f76fdce7cb448ef0a21c38d2e52e770293ecbe5a8638e828aa69d7502eabbf5a449d30555523c190151d1cc936

              • C:\Users\Admin\AppData\Local\Temp\osloader.exe

                Filesize

                591KB

                MD5

                e2f68dc7fbd6e0bf031ca3809a739346

                SHA1

                9c35494898e65c8a62887f28e04c0359ab6f63f5

                SHA256

                b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

                SHA512

                26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

              • C:\Users\Admin\AppData\Local\Temp\rty25.exe

                Filesize

                715KB

                MD5

                8dc1f88ae1fcedeb3983c5f5c3d486b0

                SHA1

                d40e67ba5558d90cb11eeca04d213322159336fc

                SHA256

                4a15d91920a4da9a64935248c126fb60e8302198df8e5759da8129ac1841beca

                SHA512

                0b2263fe049e280af1178fd396a06a04e6b99f7c971839207ae225161257ed9d9b7eaa8d0ceb1f14d3aa2094b53ce91dd045ebc169102e707ea7285f91432ac1

              • C:\Users\Admin\AppData\Local\Temp\toolspub1.exe

                Filesize

                238KB

                MD5

                8c20d9745afb54a1b59131314c15d61c

                SHA1

                1975f997e2db1e487c1caf570263a6a3ba135958

                SHA256

                a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1

                SHA512

                580021850dfc90647854dd9f8124418abffbe261e3d7f2e1d355dd3a40f31be24f1b9df77ad52f7fa63503a5ee857e270c156e5575e3a32387335018296128d7

              • C:\Users\Admin\AppData\Local\Temp\toolspub1.exe

                Filesize

                143KB

                MD5

                e6afdddd5151f05c46cbe40ddf54028b

                SHA1

                3d60ffdb4d26d318ccffe8d854f0c2e2d81b4761

                SHA256

                eb0258a9665f7b9f874f2ebe749a093753864a4b228d30544dbc528bcecc7624

                SHA512

                6287cb49675165cfc47a192881736ef9084f991203c9659d8a15460cfe7eb776a0d7240c810945d1bade191a4b8ac30f27d7295b65916d0bcb60718348639f90

              • C:\Users\Admin\AppData\Local\Temp\u1s8.0.exe

                Filesize

                320KB

                MD5

                7c0b88535c506fc8bec1510f08f3329c

                SHA1

                026965f027f53725e0e93d069a7143d12badd35c

                SHA256

                7f2b4169d20bb191467b02abcae4dbc05e80bb5a20aece8e3d04aac7f05b0382

                SHA512

                3e5d80f017b99e556a2ce8ac1849ac52e5e1ec38812d015e1dd8e4c276c45e3b5462ca0961d3c806113266b130b350fc993f6734a07a093a5a50bccc7c5f160b

              • C:\Users\Admin\AppData\Local\Temp\u1s8.1.exe

                Filesize

                82KB

                MD5

                d960954ec7facb297c73996139c650a5

                SHA1

                446ad6574e506940b20dfc909a96bb3694c8837c

                SHA256

                faf5b4646dd2b88ffcf5208ccd58e6e75caf1db82c6487d8863c3d7027ed4afb

                SHA512

                85476cca06569986664a4f089274cc1ba35a665fc61fc84ec227b5416142866d293430bea468e0dad6eaf8b146b6f2e6c616dd32ab6dcd6983dd09b900c8af09

              • C:\Users\Admin\AppData\Local\Temp\u1s8.1.exe

                Filesize

                161KB

                MD5

                0c95c638937cf3914066e80a7ad1a89d

                SHA1

                3e6c7579dce87c90306a9efac466e531e5142258

                SHA256

                863687bbec26faf86b0082b19f83ecf0d7364b0efe9ebcae783ece8ed3d5d4fa

                SHA512

                4a52215e98a2e7a97e2b960d179e74bc1d70fc979122a4453f1d1c005d47bdaa2f7c8ba96d75720fb8e27b380d3a5d1237d5a82bd9b3b7b1f8d01b38d783d439

              • C:\Users\Admin\AppData\Local\e363a746-1d06-4d00-a750-973c42805e5c\9A4D.exe

                Filesize

                192KB

                MD5

                fe8a21b7d7e9efb4ab0939a32718bc5a

                SHA1

                0cae9b8cb846c60d4c2997593e6d8b4d2391487d

                SHA256

                5c107309884f19fe336b7fa6550b0a3d8846fe85ac42987b76c3eb3c97425c80

                SHA512

                da7f7bc8a66c9b50f07be9ba2267da33e1fe8ef18cefc8e9b03f33b56df4038d522537a3113dbe764e545283b12c9d6c425102a5d9801f5c66cd7500699ef0f6

              • C:\Users\Admin\AppData\Roaming\Temp\Task.bat

                Filesize

                128B

                MD5

                11bb3db51f701d4e42d3287f71a6a43e

                SHA1

                63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                SHA256

                6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                SHA512

                907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

              • C:\Windows\rss\csrss.exe

                Filesize

                147KB

                MD5

                68fed58cf0a6c59b82f3506e9b9633e8

                SHA1

                8ef1f91e5d0b2e81ec7d38f68c6dbb7797dd7256

                SHA256

                0b9577b3c00d87b684bbabc01e2446e593bdd2543a0a1008b868f89f3b4baa04

                SHA512

                43b1315b67cea7e8d06fe599d93d71a2f239c170d093418937c6e1dc465f3eb54ec6ea00207e0c3ffea5585367fbef9ebfbb72919bbeb8a4093c43db915858eb

              • C:\Windows\rss\csrss.exe

                Filesize

                1KB

                MD5

                be35f9eeb45308cf54f8a9448acb6de7

                SHA1

                e8096e6db97b063ad4c4fa5122ae22e61085cb7a

                SHA256

                94474e1e84009fe5f3ef14d61c478e05fdcf27a70ed652e8fb97d16102e5d78c

                SHA512

                0b729f0f70c100462a3d5d1df20f2727ab25b2c0807b3b9b6a50fd0e49378f70da200450148f7d329a1ce08f78cd45ac7c64ec673077fbf8636fb9af752656df

              • \ProgramData\mozglue.dll

                Filesize

                72KB

                MD5

                5d11d04f8d7f47a35309e4f3e9a6dda2

                SHA1

                b3c66b71ac9b4e706132706950b61b5355ee9aad

                SHA256

                788d164d30efe7eeae163e3a83453011c56253c25c45c8dcd684f298d7cb5556

                SHA512

                090a136b9685b4793a450a2647a6a32c61ac00629f0c1a4f6ededca4b2619b41500412a567b88cf4a909a5872a8dd23f62ba7220a082269207a690e047e9f41e

              • \ProgramData\nss3.dll

                Filesize

                77KB

                MD5

                ef69faa6d08e2f139db58c69de95b43f

                SHA1

                bbe5a40456acc24ea88e22a02d8b19ea8a9d845a

                SHA256

                82059fe1a71f310a99a32586b8f8c252c1de4fe1d396a87392189db98a1fd6e1

                SHA512

                d875a367e9ba1528cbd6d6de5e15b1be0c0306121b083da6474f6fc13d99498cf361ab1f7b4ccc2481c0c9a8692e0b9bf6e4b7d8d47c62415f5ad2a2461596e0

              • \Users\Admin\AppData\Local\21a701e8-2041-4bd1-b10d-c53c5829f17c\build2.exe

                Filesize

                135KB

                MD5

                59d2775d967e20b9278ceac0cf7423fc

                SHA1

                f0e96ceb6f643b9fee896412b9094cdfcf66a238

                SHA256

                d66edfb2ffb423cfb8f09735e76900516a5108cbaee4fb013311a7551ed92cae

                SHA512

                f92a5b6189676f1090946a92510141087cb1d4ec9310f96eb37c25934dd85d41937db5c31497977801228a45cc3225b42da6f1684e9713e9a06602442488a8ec

              • \Users\Admin\AppData\Local\21a701e8-2041-4bd1-b10d-c53c5829f17c\build2.exe

                Filesize

                187KB

                MD5

                6292675059a55367969ce812fdceff06

                SHA1

                ab802a2cbe0fe26a8fd0bdfaaf336fd89334b190

                SHA256

                e6c797997f6819d3d31fb6f273f634c0f9c8d81e6cbe87b4ef074a868bb059aa

                SHA512

                518155f9ca2ce827d1a262903f992c8ffee1f3382ac2c2d972ed0f2bbaeb25c79a77ee016fa263bb20508400fd931bfa06584a5349a1678fc0a829d3f2dd375e

              • \Users\Admin\AppData\Local\Temp\9A4D.exe

                Filesize

                380KB

                MD5

                63e2c771eae3ace454683aea5f74a37d

                SHA1

                724a83202fd6223256fa3bb12626fc5ff9b6ae21

                SHA256

                2a5414ff3f920c6f0b6a28fb8175351bcca24bcc91be0ae6d197290895d2f1a0

                SHA512

                2d91a3767a9d4132692b1cd9db759e98142bc5bc6a272e1b25106bfad4dde9ad491c3e3843f5536fc33018bb74eb5d715ee3c97db3fe91ba525cc185f45ccb4a

              • \Users\Admin\AppData\Local\Temp\9A4D.exe

                Filesize

                149KB

                MD5

                ede9ab9f4bc2264e879eae9cdfb11c9d

                SHA1

                925fa4141187eacacf6aef9a3be1c6c7323ab5c1

                SHA256

                0d22fff36086a22a0727dd6c9e5b0f9c738cbda970cf187a54e79c9fb6626e5a

                SHA512

                c56897b1b7a0541addb3552bb7b61cb7c4fdcb89d89592a1901132f7b96f360c6ffb347bc20816ea3232202b4e0742eec4e67cb22d161d7edcace6cd279da18d

              • \Users\Admin\AppData\Local\Temp\9A4D.exe

                Filesize

                95KB

                MD5

                00b1c78fc49c03644d12bf3b56fd3f92

                SHA1

                c39faba9a633484150c8d2c5e839bb433fc20fb1

                SHA256

                b00168a109159612d033bb2cdfc6f0ed7a83449fc2e98dc57c1197002f4a7ed6

                SHA512

                1eda87da7ac0d9bcb019c93bfc5c1196c1dfb940d8589f2b0470e6aa21f5ab4c7793f73cb8b9b23cf78f22099218d2958a039dea783dbaed740ab03e05c25f8f

              • \Users\Admin\AppData\Local\Temp\9A4D.exe

                Filesize

                71KB

                MD5

                f1096fd68ab5be443cac00197512cc6d

                SHA1

                dcbc1166f4b3f0c2977a3d4e73cd67c929fec338

                SHA256

                7af00cc0a448cecda29630081fa24b57aee775f0a59e136c65e330113054c354

                SHA512

                d006dd7bd8c900f3359e3d263efc05c1105cb2b13caee691e6b29fb60d17cecebbc0a3b0578856469ef32d1b6b84ef6992baa00d888c7cdf5076af0b68d66720

              • \Users\Admin\AppData\Local\Temp\InstallSetup_nine.exe

                Filesize

                419KB

                MD5

                654abe1db0f972272b5b012914d9e5d6

                SHA1

                1ac7b42167369dcfa528837f13a2c80de7bcc161

                SHA256

                5f2bdf7f83ab075f7dafaf7493cbf4ab08d2e79b95cd3382621acfe73ba96094

                SHA512

                18823ab8a9a160ac169052ec210e6adb356190dc0644c8b5fd6f5ccbc8de2666c5e9d44ef90c954d5b6e948c81ef2666900c0fe40b7d5e4b644a39e8b93c1a12

              • \Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                Filesize

                125KB

                MD5

                1dc33d6661152ed97ec94c5689283071

                SHA1

                6923ed1538179afa6f44d7da934d7ff40e77c219

                SHA256

                f81c9d984e7ea026709a2df9773246345fbfb7022bfe5c38f190add96e63d253

                SHA512

                f61e4bf41461fdac450c4d5c6ef4fcd50a62ac01bcf28b6d7450681b4f918b0ed66bf435a24412da4d6e488d7538e4a623641077ac7817517ba8cafdfe29c6eb

              • \Users\Admin\AppData\Local\Temp\csrss\patch.exe

                Filesize

                331KB

                MD5

                245580f7f5a27d24148f80c75e72f07e

                SHA1

                b93d98721034aab7020c4c75fbe127e192676351

                SHA256

                684e2037e245208a1e2ae434844a829ffa134910f101c3ca7c0e09fb041410ce

                SHA512

                63ec397b809478454cd12069d043b0c26ce9013cde02e210e2d0cbe504d3d81803ed492f8eed6b20a8f3bf9dc18a02edcab2e9f3b1a5cafa87dd22e3c24e76a0

              • \Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                Filesize

                1.7MB

                MD5

                de78fad33563f1ab364b19ed1d696695

                SHA1

                4d304e703f6143793297c9e02a95a2334f7d4853

                SHA256

                1642bb4a0c8c687856f7a2a2009defbce7f95fe78db8593d9402a9e8aadbd285

                SHA512

                141ace22c067864229c8cacba179f826d67a4ca40d8df18589f614ea83b4c924d60640fc3880e10e8ce9723598b07eef4cc0bc260201eeddfada340cd1cb3221

              • \Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                Filesize

                2.4MB

                MD5

                9377be5d112ee71b6d58117dec934390

                SHA1

                4bbcb259e68959a6eafe6043cc3947c2a42991cf

                SHA256

                01c6b6d01a028779a7fcda15841e1c251c32365bd8f186e02cf6e8f358400d57

                SHA512

                90400a1d6d77e637751044b380341b5609e6f63d739d48c597343164e01ed1dcd17a8c93f3f4945ebc5c9544028e40c23f966f2989ffcfb063b178fbea64eff6

              • \Users\Admin\AppData\Local\Temp\dbghelp.dll

                Filesize

                157KB

                MD5

                cd1b17ee0a4542795f58535a8e006230

                SHA1

                c5e413c3f00241fc9689fb21c56d531e302224be

                SHA256

                eab17cef64705b883d32587e0d29e6e982d5dbce55f695207da55480c1395be6

                SHA512

                e823fcb3d812fa12d424a0f8d340da5b64a08a240a7330513c7a6a0d30f037f79d0bec1acb68a1a3e717cec0440d8abf788afb7b7db033e604fc84a4b2c5c41c

              • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                Filesize

                204KB

                MD5

                ad8807768b247102878098fb1f5bfab2

                SHA1

                095316ba4271438b334970374f514779ed0f90ba

                SHA256

                536d2688049419af7ed4d8fd8c987e24a8b1855cf9295873b3e4a6a2434750fa

                SHA512

                25cc0d6e4bbb9fc862666dbf21d428d252cf1885a86a1e9313de1f625a12733b3921d34ebbe1489bc60b84e35fd1a6d3bf1cf7245b33eae252d96bc92c4f7baf

              • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                Filesize

                64KB

                MD5

                03e03703fe5fc79e7f1d5e44e3c27b1e

                SHA1

                8f25ba10b5e479ae63c4c3867475502e1a6499fa

                SHA256

                504111bf8fb1386663a5f92bab46dc7b1171fb9c9a8b8cd100945a6c6bde311e

                SHA512

                1926c83c1f301800c289b16458ae30bc0927b231a5b11b12663d8a608c5ded27d8d73987ec6af46011e2f2b4e7e4c65fa7cfd50e5370d00e47784982874b88fa

              • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                Filesize

                129KB

                MD5

                fb3597f1026b4c0d0d785480800d9165

                SHA1

                213a5c2d56e28f34caed4ed04c397349bed21714

                SHA256

                be4a3d54642018303aee0fdc9f2a13da1c9850e8a34eda88e22511d736f9ed1f

                SHA512

                5a3a65a1771995c1e96f3d4c05e0c787949fdbaec3698286aaf28c66cf8eac2f703f317aa3403291bf2aa46d4c5b39ad7885a292c098cfc665fea1809b5648bf

              • \Users\Admin\AppData\Local\Temp\symsrv.dll

                Filesize

                136KB

                MD5

                0aee413a9a03650cc0e710d783c2cd67

                SHA1

                196854c914a57e028ea75f569881b4dce10f0c7a

                SHA256

                1de8416c4dbe020046618970f8151ea385d1023eaf0f01ed4050b6c1994d5b48

                SHA512

                9478b826acea0dacfa39b8578c7c276a2ba873e7d657b7ec37ce3f8b25195356f064ef229223ad6aefb51317707d9dd370bf2f61b0e64d2a577baeaefeb3145a

              • \Users\Admin\AppData\Local\Temp\u1s8.0.exe

                Filesize

                213KB

                MD5

                92360b43bae5d3ee178de5689975a601

                SHA1

                4694f39c836a3bc1c7d3cc4982edfb0e3a5cc00f

                SHA256

                3a6582a04dbd6b97bb935ab3f5a680eb4f19d315b70851ab99357e9b29f2f8f4

                SHA512

                c8cf91fa56caa5ef222c5de85334cdb5bd27d1efe2b689fd35a9202967c21a344d325efd2c22fb0b1b414419eee499f34121afba2972f7f8805c86b379abe404

              • \Users\Admin\AppData\Local\Temp\u1s8.1.exe

                Filesize

                168KB

                MD5

                aa706c42a2fe0f9de11191c800d5b8dc

                SHA1

                99d4b9cc8ef028aa397bcddcd61dc060932331b9

                SHA256

                d1d3c08663a321398fbee52fae7914805abfab0a2a1830f1aaef890eb9c44543

                SHA512

                24c293a61da9bfe6bbff6c1d8d28fe4068a45cc290e07a27bf6ae91b3d4da5180df6c2fb647e03f732027e3fe650b5177a94caa770b0252274d9d8bb89be5145

              • \Users\Admin\AppData\Local\Temp\u1s8.1.exe

                Filesize

                216KB

                MD5

                b82ffc4a446b8f96e6904b3eab388db5

                SHA1

                4fd2bba5b67c6f612195a4c8cc94c345951f3803

                SHA256

                1b828f3a5f6bf5e7485a28007116115994e81d16f1c10303493b76a3830642e7

                SHA512

                c9f11d85fc59292a665df64c6dedbf93b58ccd44d3a248d0f6a46918222804f0a863e82cfeffa3e1b1e1ce97243e4f6b1c8fd023cb36cef8d82259da52382874

              • \Users\Admin\AppData\Local\Temp\u1s8.1.exe

                Filesize

                61KB

                MD5

                dec1015ee3e0d160624f0c0e303ef180

                SHA1

                1d36cb1913e7145de642b36a6aba2784bfb736df

                SHA256

                320b8474b55bec40f99401af09a3ad55c8974e0a287fa39782f31da2e62e4ba8

                SHA512

                a85b97686782e7f28da84043a7210490bc1f0708ce2f9f87a16cf88ed9406083639f0af43a2ab76d09f27ef92a67ae7dbbe68feabb19682d1003d429fc16813c

              • \Users\Admin\AppData\Local\Temp\u1s8.1.exe

                Filesize

                96KB

                MD5

                8de0c63aa8506f394e71c3b7e17b7852

                SHA1

                c021effef1664b20f670a2db4e6159a0b201c265

                SHA256

                0572eabe203182341e20333a19fedfa324f8f096271f14b7df3cd5104256ef13

                SHA512

                bdf95dc3886ad72ccd1941ff2ffac15a7a9bd236bc12e036843b15314b733e96e6f65f9ee7bbc609376e308dee546134bed7d9f20e9b501df24421079392e24b

              • \Windows\rss\csrss.exe

                Filesize

                212KB

                MD5

                31711a3e10b045bb416ff91cff80ac51

                SHA1

                3f58a8aca1acf2d2cdf1bcbd3695de443ea7df97

                SHA256

                4ae3eef8cf637d6fb228484c710a4df8c1011f6d9d9a12c5b9b6193a29e99e08

                SHA512

                ecc50c7e4f344918403b67110bd9a8ed599500517c44160287092b93e13e3dbbdaf0d85213ce9910e41e83cf539c4e5c8d0d22ac142c224d772c2f4931e3a851

              • \Windows\rss\csrss.exe

                Filesize

                283KB

                MD5

                f1c10afd83c85e11224e0f5401d99650

                SHA1

                caa0cc6af0e1703264245d527f3bdffd61399e0f

                SHA256

                20f8f686e0ba5e6ffccfcdf4ea9741e87328c5ff4c7667aec1f0b3998aeb8297

                SHA512

                dce2745df48cda831e83352739d8eb04aec595c2432ee3d3b4b68396337fe121e517cd83f4f8e2faf68d62dca8617d4efc318436e355110a984b825714723edd

              • memory/268-497-0x0000000000520000-0x0000000000620000-memory.dmp

                Filesize

                1024KB

              • memory/268-498-0x0000000000230000-0x0000000000260000-memory.dmp

                Filesize

                192KB

              • memory/288-392-0x0000000000400000-0x000000000044A000-memory.dmp

                Filesize

                296KB

              • memory/288-391-0x00000000005C0000-0x00000000006C0000-memory.dmp

                Filesize

                1024KB

              • memory/288-401-0x0000000000400000-0x000000000044A000-memory.dmp

                Filesize

                296KB

              • memory/352-89-0x00000000007D0000-0x00000000008D0000-memory.dmp

                Filesize

                1024KB

              • memory/352-398-0x0000000000400000-0x0000000000647000-memory.dmp

                Filesize

                2.3MB

              • memory/352-100-0x0000000000400000-0x0000000000647000-memory.dmp

                Filesize

                2.3MB

              • memory/352-360-0x0000000000400000-0x0000000000647000-memory.dmp

                Filesize

                2.3MB

              • memory/352-196-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                Filesize

                972KB

              • memory/352-371-0x00000000007D0000-0x00000000008D0000-memory.dmp

                Filesize

                1024KB

              • memory/352-92-0x0000000000220000-0x0000000000254000-memory.dmp

                Filesize

                208KB

              • memory/352-399-0x00000000007D0000-0x00000000008D0000-memory.dmp

                Filesize

                1024KB

              • memory/352-380-0x0000000000400000-0x0000000000647000-memory.dmp

                Filesize

                2.3MB

              • memory/696-643-0x0000000000290000-0x0000000000390000-memory.dmp

                Filesize

                1024KB

              • memory/696-644-0x00000000001B0000-0x00000000001B4000-memory.dmp

                Filesize

                16KB

              • memory/904-793-0x0000000002380000-0x000000000239A000-memory.dmp

                Filesize

                104KB

              • memory/904-791-0x00000000000E0000-0x0000000000736000-memory.dmp

                Filesize

                6.3MB

              • memory/904-792-0x0000000072060000-0x000000007274E000-memory.dmp

                Filesize

                6.9MB

              • memory/904-794-0x00000000023A0000-0x00000000023A8000-memory.dmp

                Filesize

                32KB

              • memory/992-381-0x0000000000400000-0x00000000008E2000-memory.dmp

                Filesize

                4.9MB

              • memory/992-412-0x00000000001C0000-0x00000000001C1000-memory.dmp

                Filesize

                4KB

              • memory/992-347-0x00000000001C0000-0x00000000001C1000-memory.dmp

                Filesize

                4KB

              • memory/1044-255-0x0000000000400000-0x000000000044A000-memory.dmp

                Filesize

                296KB

              • memory/1044-45-0x0000000000400000-0x000000000044A000-memory.dmp

                Filesize

                296KB

              • memory/1044-43-0x00000000005C0000-0x00000000006C0000-memory.dmp

                Filesize

                1024KB

              • memory/1044-44-0x0000000000220000-0x000000000022B000-memory.dmp

                Filesize

                44KB

              • memory/1092-755-0x0000000000290000-0x0000000000291000-memory.dmp

                Filesize

                4KB

              • memory/1092-722-0x0000000000980000-0x00000000014DB000-memory.dmp

                Filesize

                11.4MB

              • memory/1140-400-0x0000000003D10000-0x0000000003D26000-memory.dmp

                Filesize

                88KB

              • memory/1140-253-0x0000000002D30000-0x0000000002D46000-memory.dmp

                Filesize

                88KB

              • memory/1356-192-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1356-191-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1820-649-0x0000000000400000-0x0000000000406000-memory.dmp

                Filesize

                24KB

              • memory/2312-41-0x0000000000400000-0x0000000000478000-memory.dmp

                Filesize

                480KB

              • memory/2312-28-0x0000000000320000-0x0000000000387000-memory.dmp

                Filesize

                412KB

              • memory/2312-181-0x0000000000320000-0x0000000000387000-memory.dmp

                Filesize

                412KB

              • memory/2312-27-0x0000000000550000-0x0000000000650000-memory.dmp

                Filesize

                1024KB

              • memory/2312-174-0x0000000000550000-0x0000000000650000-memory.dmp

                Filesize

                1024KB

              • memory/2312-342-0x0000000000400000-0x0000000000478000-memory.dmp

                Filesize

                480KB

              • memory/2312-301-0x0000000000400000-0x0000000000478000-memory.dmp

                Filesize

                480KB

              • memory/2400-70-0x0000000000400000-0x0000000000D1C000-memory.dmp

                Filesize

                9.1MB

              • memory/2400-136-0x0000000000400000-0x0000000000D1C000-memory.dmp

                Filesize

                9.1MB

              • memory/2400-68-0x0000000002790000-0x0000000002B88000-memory.dmp

                Filesize

                4.0MB

              • memory/2400-69-0x0000000002B90000-0x000000000347B000-memory.dmp

                Filesize

                8.9MB

              • memory/2400-48-0x0000000002790000-0x0000000002B88000-memory.dmp

                Filesize

                4.0MB

              • memory/2516-37-0x0000000074A40000-0x000000007512E000-memory.dmp

                Filesize

                6.9MB

              • memory/2516-1-0x0000000074A40000-0x000000007512E000-memory.dmp

                Filesize

                6.9MB

              • memory/2516-0-0x0000000000340000-0x00000000008D0000-memory.dmp

                Filesize

                5.6MB

              • memory/2520-459-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2520-683-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2520-478-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2520-460-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2520-482-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2520-480-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2520-481-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2520-474-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2520-473-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2648-390-0x0000000000400000-0x0000000000D1C000-memory.dmp

                Filesize

                9.1MB

              • memory/2648-369-0x0000000000400000-0x0000000000D1C000-memory.dmp

                Filesize

                9.1MB

              • memory/2648-449-0x0000000000400000-0x0000000000D1C000-memory.dmp

                Filesize

                9.1MB

              • memory/2648-139-0x00000000026D0000-0x0000000002AC8000-memory.dmp

                Filesize

                4.0MB

              • memory/2648-168-0x00000000026D0000-0x0000000002AC8000-memory.dmp

                Filesize

                4.0MB

              • memory/2648-170-0x0000000000400000-0x0000000000D1C000-memory.dmp

                Filesize

                9.1MB

              • memory/2648-382-0x0000000000400000-0x0000000000D1C000-memory.dmp

                Filesize

                9.1MB

              • memory/2648-370-0x00000000026D0000-0x0000000002AC8000-memory.dmp

                Filesize

                4.0MB

              • memory/2652-770-0x0000000000C60000-0x0000000001680000-memory.dmp

                Filesize

                10.1MB

              • memory/2652-769-0x0000000000C10000-0x0000000000C11000-memory.dmp

                Filesize

                4KB

              • memory/2652-760-0x0000000000C60000-0x0000000001680000-memory.dmp

                Filesize

                10.1MB

              • memory/2652-762-0x0000000077C50000-0x0000000077C51000-memory.dmp

                Filesize

                4KB

              • memory/2652-761-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

                Filesize

                3.8MB

              • memory/2680-348-0x0000000003890000-0x00000000039BC000-memory.dmp

                Filesize

                1.2MB

              • memory/2680-307-0x0000000002BE0000-0x0000000002CEA000-memory.dmp

                Filesize

                1.0MB

              • memory/2680-308-0x0000000003890000-0x00000000039BC000-memory.dmp

                Filesize

                1.2MB

              • memory/2680-25-0x00000000FF2E0000-0x00000000FF397000-memory.dmp

                Filesize

                732KB

              • memory/2712-418-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2712-415-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                Filesize

                4KB

              • memory/2712-445-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2712-423-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2712-422-0x0000000000400000-0x0000000000537000-memory.dmp

                Filesize

                1.2MB

              • memory/2740-39-0x0000000002960000-0x000000000324B000-memory.dmp

                Filesize

                8.9MB

              • memory/2740-40-0x0000000000400000-0x0000000000D1C000-memory.dmp

                Filesize

                9.1MB

              • memory/2740-47-0x0000000000400000-0x0000000000D1C000-memory.dmp

                Filesize

                9.1MB

              • memory/2740-49-0x0000000002960000-0x000000000324B000-memory.dmp

                Filesize

                8.9MB

              • memory/2740-18-0x0000000002560000-0x0000000002958000-memory.dmp

                Filesize

                4.0MB

              • memory/2740-38-0x0000000002560000-0x0000000002958000-memory.dmp

                Filesize

                4.0MB

              • memory/2784-503-0x0000000000400000-0x0000000000643000-memory.dmp

                Filesize

                2.3MB

              • memory/2784-689-0x0000000000400000-0x0000000000643000-memory.dmp

                Filesize

                2.3MB

              • memory/2784-496-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                Filesize

                4KB

              • memory/2784-500-0x0000000000400000-0x0000000000643000-memory.dmp

                Filesize

                2.3MB

              • memory/2788-410-0x0000000001C70000-0x0000000001D01000-memory.dmp

                Filesize

                580KB

              • memory/2788-648-0x0000000001D90000-0x0000000001EAB000-memory.dmp

                Filesize

                1.1MB

              • memory/2788-419-0x0000000001D90000-0x0000000001EAB000-memory.dmp

                Filesize

                1.1MB

              • memory/2788-417-0x0000000001C70000-0x0000000001D01000-memory.dmp

                Filesize

                580KB

              • memory/2840-451-0x0000000000330000-0x00000000003C1000-memory.dmp

                Filesize

                580KB

              • memory/2840-447-0x0000000000330000-0x00000000003C1000-memory.dmp

                Filesize

                580KB

              • memory/2980-680-0x0000000000A02000-0x0000000000A12000-memory.dmp

                Filesize

                64KB