Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-02-2024 21:38

General

  • Target

    d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe

  • Size

    6.3MB

  • MD5

    c67cb967230036816fd0cbbfd96959c6

  • SHA1

    d2fe988a302dce4bc0f34a1003a623f96a06b250

  • SHA256

    d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76

  • SHA512

    2f51046e44bdfa470f676071c69da8c05d50d8f79e748748f25ac13ec53d346f1c3988148000fea3ece38623fd629d1b3dcc943006e80b7bee95da7f1f42920c

  • SSDEEP

    196608:GHqO3grg0lAc4G+JCJjsP8BXkf/hmzJzFYngA13jvHKvj4:GHzCOc4G+oB0BmdFY31zq

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://habrafa.com/test1/get.php

Attributes
  • extension

    .ldhy

  • offline_id

    pIGzEr0bxHiTz7xnvNidWeqzKkxMfVdHTyCkzwt1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://habrafa.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://we.tl/t-hPAqznkJKD Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0849ASdw

rsa_pubkey.plain

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detected Djvu ransomware 7 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 11 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Detect binaries embedding considerable number of MFA browser extension IDs. 3 IoCs
  • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 3 IoCs
  • Detects Windows executables referencing non-Windows User-Agents 8 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
  • Detects executables Discord URL observed in first stage droppers 8 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 8 IoCs
  • Detects executables containing artifacts associated with disabling Widnows Defender 8 IoCs
  • Detects executables referencing many varying, potentially fake Windows User-Agents 8 IoCs
  • UPX dump on OEP (original entry point) 3 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe
    "C:\Users\Admin\AppData\Local\Temp\d2682ee0fe9e5bf429b7bea89d32cf417c3b684429dbff5e060b07e7335aaa76.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe
      "C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1124
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4136
      • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe
        "C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks for VirtualBox DLLs, possible anti-VM trick
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:4092
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:3672
        • C:\Windows\system32\cmd.exe
          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3984
          • C:\Windows\system32\netsh.exe
            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
            5⤵
            • Modifies Windows Firewall
            PID:660
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:1092
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:4292
        • C:\Windows\rss\csrss.exe
          C:\Windows\rss\csrss.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Manipulates WinMonFS driver.
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4824
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            5⤵
              PID:1268
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
              5⤵
              • Creates scheduled task(s)
              PID:3392
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /delete /tn ScheduledUpdate /f
              5⤵
                PID:2784
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:2432
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:4776
              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                5⤵
                • Executes dropped EXE
                PID:3252
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                5⤵
                • Creates scheduled task(s)
                PID:4896
              • C:\Windows\windefender.exe
                "C:\Windows\windefender.exe"
                5⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:1268
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                  6⤵
                    PID:3548
                    • C:\Windows\SysWOW64\sc.exe
                      sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                      7⤵
                      • Launches sc.exe
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1196
          • C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe
            "C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:3372
            • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
              C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4504
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
                4⤵
                  PID:2424
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                    5⤵
                    • Creates scheduled task(s)
                    PID:3748
                  • C:\Windows\SysWOW64\chcp.com
                    chcp 1251
                    5⤵
                      PID:1040
                • C:\Users\Admin\AppData\Local\Temp\nsz853F.tmp
                  C:\Users\Admin\AppData\Local\Temp\nsz853F.tmp
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5012
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 2356
                    4⤵
                    • Program crash
                    PID:5076
              • C:\Users\Admin\AppData\Local\Temp\toolspub1.exe
                "C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"
                2⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:3476
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5012 -ip 5012
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:2424
            • C:\Users\Admin\AppData\Local\Temp\F405.exe
              C:\Users\Admin\AppData\Local\Temp\F405.exe
              1⤵
                PID:4524
              • C:\Users\Admin\AppData\Local\Temp\905.exe
                C:\Users\Admin\AppData\Local\Temp\905.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1544
                • C:\Users\Admin\AppData\Local\Temp\905.exe
                  C:\Users\Admin\AppData\Local\Temp\905.exe
                  2⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Adds Run key to start application
                  PID:4736
                  • C:\Windows\SysWOW64\icacls.exe
                    icacls "C:\Users\Admin\AppData\Local\3f05755e-c4a2-4c90-9d8a-58c689a7a9c3" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                    3⤵
                    • Modifies file permissions
                    PID:3756
                  • C:\Users\Admin\AppData\Local\Temp\905.exe
                    "C:\Users\Admin\AppData\Local\Temp\905.exe" --Admin IsNotAutoStart IsNotTask
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:3812
                    • C:\Users\Admin\AppData\Local\Temp\905.exe
                      "C:\Users\Admin\AppData\Local\Temp\905.exe" --Admin IsNotAutoStart IsNotTask
                      4⤵
                      • Executes dropped EXE
                      PID:532
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 568
                        5⤵
                        • Program crash
                        PID:4692
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 532 -ip 532
                1⤵
                  PID:4580
                • C:\Windows\windefender.exe
                  C:\Windows\windefender.exe
                  1⤵
                  • Executes dropped EXE
                  • Modifies data under HKEY_USERS
                  PID:2152
                • C:\Users\Admin\AppData\Local\Temp\8DB6.exe
                  C:\Users\Admin\AppData\Local\Temp\8DB6.exe
                  1⤵
                  • Executes dropped EXE
                  PID:1864
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 1172
                    2⤵
                    • Program crash
                    PID:4836
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1864 -ip 1864
                  1⤵
                  • Executes dropped EXE
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: MapViewOfSection
                  PID:4524
                • C:\Users\Admin\AppData\Roaming\euuffsa
                  C:\Users\Admin\AppData\Roaming\euuffsa
                  1⤵
                  • Executes dropped EXE
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: MapViewOfSection
                  PID:4336
                • C:\Users\Admin\AppData\Local\Temp\EC23.exe
                  C:\Users\Admin\AppData\Local\Temp\EC23.exe
                  1⤵
                  • Checks computer location settings
                  • Drops startup file
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2568
                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:1820
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 2316
                    2⤵
                    • Program crash
                    PID:648
                • C:\Users\Admin\AppData\Local\Temp\F145.exe
                  C:\Users\Admin\AppData\Local\Temp\F145.exe
                  1⤵
                  • Executes dropped EXE
                  PID:820
                • C:\Users\Admin\AppData\Local\Temp\F9D1.exe
                  C:\Users\Admin\AppData\Local\Temp\F9D1.exe
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:3244
                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    2⤵
                      PID:4280
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 616
                        3⤵
                        • Program crash
                        PID:4452
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4280 -ip 4280
                    1⤵
                      PID:792
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2568 -ip 2568
                      1⤵
                        PID:3280

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\ProgramData\Are.docx

                        Filesize

                        11KB

                        MD5

                        a33e5b189842c5867f46566bdbf7a095

                        SHA1

                        e1c06359f6a76da90d19e8fd95e79c832edb3196

                        SHA256

                        5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                        SHA512

                        f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                      • C:\ProgramData\mozglue.dll

                        Filesize

                        593KB

                        MD5

                        c8fd9be83bc728cc04beffafc2907fe9

                        SHA1

                        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                        SHA256

                        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                        SHA512

                        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                      • C:\ProgramData\nss3.dll

                        Filesize

                        1.1MB

                        MD5

                        8a78157e59dbe3153bc4a49b22c75013

                        SHA1

                        0ac3ea2a8001648f7e07bf499ae3e3885da6c0ae

                        SHA256

                        a8f68e83eece64f3f0bd55e6e2a967fca72e66648d2c6a59dbbb76ed08f7e7db

                        SHA512

                        a64ed84fd1430ca7b8639f2d83a8ce724ecbf3b047ba5d4562a8fa9e0be0756942882def4f4a4109c2a30c81f91c91511eb739361222a7257636169a635b616a

                      • C:\Users\Admin\AppData\Local\Temp\8DB6.exe

                        Filesize

                        797KB

                        MD5

                        716e02298e8fb35cd001abfec9bab229

                        SHA1

                        1e2298f1f2fcde255a700f80c61f5229d4f73593

                        SHA256

                        d63f2b24501bb15e0b8a5a6bc0c602461bafbd6a7402f71ed42f8c1123c3cd13

                        SHA512

                        8f4aef250ee8dbf14902eddf9a9eaf26e10a50ca150407aec19dceaa89d1e6396670fa97948f9f5118132b195d793fca357654537578d23aae44af581e10db0d

                      • C:\Users\Admin\AppData\Local\Temp\8DB6.exe

                        Filesize

                        929KB

                        MD5

                        44b2e76f7b568f3726392e8093283081

                        SHA1

                        a8728ee5efb344e44863ba74608a901e2ac0fa1f

                        SHA256

                        bf0771194b1537da6cd845d93f0541e23a96781d3e940bdbfc14155c0e4c7cec

                        SHA512

                        000e93e486477c685e8581c274279cf5234b06160680f36f1393262adcd27a9e3d56e52df1cc47ba61d74dd0a3b0695a86356d746f695c0336bcc007783610f7

                      • C:\Users\Admin\AppData\Local\Temp\905.exe

                        Filesize

                        733KB

                        MD5

                        87c9f29baaf99fbb589a35656083ee11

                        SHA1

                        8cf90e5ddb110ea99094d38dcf7128afe22f59a5

                        SHA256

                        7de9c2b4d366ffa1b0d90ceea2c25e6639a9cba23972b7f82d44a8acb1fb6e5a

                        SHA512

                        ec35e2f770f762bb4fa1a697accd1b82e17d90b5d5245ff9cac54b3b8225e89d3cdd76fd1ebf630d02835513a26bd3e9f175baf1c975e6acd9112db5170662b5

                      • C:\Users\Admin\AppData\Local\Temp\905.exe

                        Filesize

                        495KB

                        MD5

                        9c5f0db9c84e20b74c6aee34ae16ea43

                        SHA1

                        def67dd79ad4dd06682fba50a6a9ecca351648ca

                        SHA256

                        31ec6b8a2a16827b787a00dadb19476bff55183e45cb61dffe3e6b72a9344635

                        SHA512

                        d0606b57e5ee689ba528af57428355c9980b5fb5b48f6d6815063735094e79ac2427e080a3715fc39e37d39271be2da576ea3d99fa998769f59f6c39cd7327b5

                      • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe

                        Filesize

                        4.7MB

                        MD5

                        5e94f0f6265f9e8b2f706f1d46bbd39e

                        SHA1

                        d0189cba430f5eea07efe1ab4f89adf5ae2453db

                        SHA256

                        50a46b3120da828502ef0caba15defbad004a3adb88e6eacf1f9604572e2d503

                        SHA512

                        473dfa66a36feed9b29a43245074141478327ce22ba7cce512599379dcb783b4d665e2d65c5e9750b988c7ed8f6c3349a7a12d4b8b57c89840eee6ca6e1a30cd

                      • C:\Users\Admin\AppData\Local\Temp\EC23.exe

                        Filesize

                        649KB

                        MD5

                        35ffefa212414c2538df410e5ad3afa7

                        SHA1

                        e7721fbb85e400c74c7f4de95f1c27b6318caabd

                        SHA256

                        9217999518147c602f16ed7d80c9b95dec621f442192ce49192736a27e73847f

                        SHA512

                        7bf9ffe99588a1e6e01a6c84fee7bd998b337653c908e33d3c10f1aa9abc7af925ca9d86a884099824133947614aa070181c973b220163dd99dde87765152a25

                      • C:\Users\Admin\AppData\Local\Temp\F145.exe

                        Filesize

                        824KB

                        MD5

                        82d7425c9f8297a3ca6dd38b2ed71920

                        SHA1

                        911bc54e20cd1f31cfa436a321862dd33df606eb

                        SHA256

                        2c842e8a9e3ab59cd6d22f252ac5ec9647585fd522c4df7d09422c80a9990777

                        SHA512

                        769f0c1bca2f0a3c5ff6d9e9327f32211d66364d900b3345017abc76065988ee1ffcbfc1fc8e691c21e4af7ad11de809d3870eb6d1676181f09f3510b4eea9c0

                      • C:\Users\Admin\AppData\Local\Temp\F405.exe

                        Filesize

                        170KB

                        MD5

                        bbe17beb5322cc197cece72e5988f2fd

                        SHA1

                        45741111a6aba5044cc5a113f5a41a607f54b1d0

                        SHA256

                        1551739422761204577406d511108a62afb653aaed9353b405fee25ad14c19eb

                        SHA512

                        d525b4e28f1aadad80e9fa825fce51b7964cbdbbd3f3abab2d54668021a5a2df7ae398ab0e2690279e04bfd9fc86a8b9d9ccbf5bb8294f1b1cf7e0ddb4f084ab

                      • C:\Users\Admin\AppData\Local\Temp\F9D1.exe

                        Filesize

                        4.4MB

                        MD5

                        276e222938520cbb4c543f45e65e463f

                        SHA1

                        96a78a7dbee03dce0748ea8fb1a295232e7d027b

                        SHA256

                        bd546aa016fc5a48c8c613816af6b0fdf4403ad2dcae86ab8a891d200448365f

                        SHA512

                        137dddf225fc1514652d90b2eacda201329b350e7ef088ecb40ebd083ac657dcd9846beb64347f455c3072e725dfe61f738bb58969854802e515fdb84199c046

                      • C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe

                        Filesize

                        2.0MB

                        MD5

                        c7dfcf13b0dc4dd685114a6a2f0233ac

                        SHA1

                        ade01a01ce38e49de0136340333aa26f92a6f43f

                        SHA256

                        3786f3f45f703b7faa2b971ac1d9cddfa14115b1926a874a294809bf747355dc

                        SHA512

                        ff5769daa32508b261d807eaa2a70ff5e942f02b1903523d6cc280ce8c07c0bc58dcc2e555e5d24ddf240570da5f821ba01540904350804dea6eafa7131f9d29

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3kijxdqk.mzr.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                        Filesize

                        199KB

                        MD5

                        da0f27d0be65c3a609833eba0d5e1994

                        SHA1

                        2aca9500ab37844a9d68aff90b6230d1023e0d51

                        SHA256

                        405f810724804026572d50b3feccae023b077f1b17d8d33cb4aaab2a65260bac

                        SHA512

                        efb0a3be93b6c69182fa3deb0a3e699ccd2fece482481754a7ba710b238dfe9ab03cb5a814e001d74a03cb5aa236085d9ebb331b4a058bce280fc9fff6a28e6c

                      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                        Filesize

                        281KB

                        MD5

                        d98e33b66343e7c96158444127a117f6

                        SHA1

                        bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                        SHA256

                        5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                        SHA512

                        705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                      • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                        Filesize

                        620KB

                        MD5

                        96ceebe6e8910ff53893045bd67dbbf6

                        SHA1

                        2b689676edbfc399f34056a42202723aefd363b1

                        SHA256

                        f8b4029224cbc6de20ec168fa0fa63b5bc563a4285a829cfb0c2b69a1c3cb840

                        SHA512

                        fadbe70800278991088499b87aaa5212adbfe83027369342e96a24af61eb54d13dae7e26ea4e4b12eac5ab8d5d30bb214f6da7b389a0f29930550fb644352710

                      • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                        Filesize

                        4.1MB

                        MD5

                        0f396cc0dba8c2ef01e51ffa06bd2f93

                        SHA1

                        05bab98b65b1211b1207936f9e23626c7fd4eeee

                        SHA256

                        17dfd514df0d171e7d96202740cdb98cc71444c580f5b317712b58bc8e74be1a

                        SHA512

                        4685fb04d756177b28c9b8dd7cac28503d68d72d205869d25d2d8cacc50a2b9c973d2194942f5de1bd4e43e2d543904b0667c57dc9000eb2c1c43bbd47217128

                      • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                        Filesize

                        3.8MB

                        MD5

                        d8d19613fc043e59754238eec3a1f6c3

                        SHA1

                        727e6d46f99d20cb12662b4346c9dfe0f70b23b3

                        SHA256

                        738bce797b1777dbb6116be10b29373bdb339855b4db9b5bb30947d38b54f811

                        SHA512

                        c0ecb0eb03429923d879b7f2e5328c223e323598a8ad0ffb79958903f2ec6c9a7f42da5b9bb5b03d994323c4a460a856f8513d705120b4e07bcefdaeadc18992

                      • C:\Users\Admin\AppData\Local\Temp\nsx7F24.tmp\INetC.dll

                        Filesize

                        25KB

                        MD5

                        40d7eca32b2f4d29db98715dd45bfac5

                        SHA1

                        124df3f617f562e46095776454e1c0c7bb791cc7

                        SHA256

                        85e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9

                        SHA512

                        5fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d

                      • C:\Users\Admin\AppData\Local\Temp\nsz853F.tmp

                        Filesize

                        246KB

                        MD5

                        3244c06695ef5135a8af748ee200eef9

                        SHA1

                        67a29f86fe53905448a7c72328464c8af3a85b61

                        SHA256

                        54e08a1eca7dec78755da1bc1075471945e0cc5a2baa0050c9a6341d242024c3

                        SHA512

                        af2d25e50533ea1b7ab25d6e7e08dad3f2aad144bef69ffbd26f7ec184846dc2a69c8c158cba2aaf32d96e623e3dc91109ee4174e1ee3cc2257aa29160c64d73

                      • C:\Users\Admin\AppData\Local\Temp\toolspub1.exe

                        Filesize

                        171KB

                        MD5

                        4d1a4b3096f4a39f3a91df2f6efd43c6

                        SHA1

                        af7b52300363fa6f5ce8b5f99f753a9b1e0af94f

                        SHA256

                        ca5b5e71addd8a56460eefad5cd368a5f6aca71b7a2d6dcfb312f45d1ae6e20b

                        SHA512

                        d7cc6cf36fa0da5c22b531f7b3f58cbbcc206aaa47d40ebc0256fa5ede758fa7f636f9b70fa8077664067c8cbd3b38633ef2ca1e2e8e349b3b05c3cec1f8afd7

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe

                        Filesize

                        4KB

                        MD5

                        a5ce3aba68bdb438e98b1d0c70a3d95c

                        SHA1

                        013f5aa9057bf0b3c0c24824de9d075434501354

                        SHA256

                        9b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a

                        SHA512

                        7446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79

                      • C:\Users\Admin\AppData\Roaming\Temp\Task.bat

                        Filesize

                        128B

                        MD5

                        11bb3db51f701d4e42d3287f71a6a43e

                        SHA1

                        63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                        SHA256

                        6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                        SHA512

                        907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                        Filesize

                        2KB

                        MD5

                        3d086a433708053f9bf9523e1d87a4e8

                        SHA1

                        b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

                        SHA256

                        6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

                        SHA512

                        931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                        Filesize

                        19KB

                        MD5

                        89046794f52bb3bfa7c051c98f957831

                        SHA1

                        3b85fe69446c93433566c5b6a7611110eba39b29

                        SHA256

                        35c258c617f486a22257c18218bc42d3ec527420ff323835acdc02f7dd2de983

                        SHA512

                        c7934173a2dd935bfe79ef9fde23379dcb530aa46514e9d205fc4b51dc71c20136c0d9f3b37285cfcf906faef1a14769694571c446cb806a392a82d7757f9b68

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                        Filesize

                        19KB

                        MD5

                        82b5e0d0e926bc2c4185a8797cbf4f7d

                        SHA1

                        55d93406803bdbc1e3869dbe363f768e1076e0ae

                        SHA256

                        4b6846f53325be2306352959f3227b6697818ad15f42c711f27d79eeca1ffbf7

                        SHA512

                        f1465bc5ff83a6b4caa64388a2ffb2c36acc755f5b987eb61daf4aaab313952a1fcbe0f99722e2cbcd8821daff84048249a0bf168f4276d307491cfa8e3052b7

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                        Filesize

                        19KB

                        MD5

                        4f1d9beff3fb471963df5c4c8cfd88f0

                        SHA1

                        5b4214f3451cd42ac2bafa14d5dba1b5bcc8f1e5

                        SHA256

                        8ea844bfc9a349703373f1eb7bfb4be4f48c178a033a474b1d0746ee2945ef39

                        SHA512

                        c1c46545cc63edb5dbae6be9cb599bb952fd6b4281a4226d391eccf3c9b7ff5f600e1af262091fcc52af6a5bfb41dbd76f424e0fa994c3bbecb85a9124cb488d

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                        Filesize

                        19KB

                        MD5

                        cf37e5c29774bea3f568b350a2fdca69

                        SHA1

                        9394a34f197d7dd05a4b1cacab87b4722b94f555

                        SHA256

                        e5ab0a21a9aebf1943a0e26e051f1cd234a916d85f985d783d325b9e475ef7ed

                        SHA512

                        4668afd6574100f5977fdb56516aa2c97d4d4afeb30710a381c09a112c00b17f0d1ed91d74f502d62b09865b0e4aab7b4f080bcb9a76216009ef4dddc2636f70

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                        Filesize

                        19KB

                        MD5

                        bc9b122542aebccf84afef18b786dffa

                        SHA1

                        d61c2f5defa95379b5d6fdaafb4a4e5eb52d2b9f

                        SHA256

                        94e6194efc6e74f96de79fc61d70c328877420b992af4ed8344811afa466f0d1

                        SHA512

                        9fd23d42f45268f4d1ec1bfbe9f028a0784d448ecd7c9703fa503d517a7c0766c92f2b7a6f66c73b18fa67a5348319d477b7b647498e91b13de5f7481c809d95

                      • C:\Windows\rss\csrss.exe

                        Filesize

                        3.2MB

                        MD5

                        471ce98cd3576984522e66a66364cd95

                        SHA1

                        bd254c8c0fc000ff59d9005340f379fa01de7549

                        SHA256

                        728c2599a73678275e5053fc10cad742e8b82dfe5f40596e5d08ce824883a266

                        SHA512

                        a7a4031f7ee52cc20828c039f6b74b01e959326eaa8c59d020465f3190b62a9d61f7cdf3c837ae99e2a2c6a5676e6beb246fe098f4f0f35bae7d4859a77d0ff3

                      • C:\Windows\windefender.exe

                        Filesize

                        2.0MB

                        MD5

                        8e67f58837092385dcf01e8a2b4f5783

                        SHA1

                        012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                        SHA256

                        166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                        SHA512

                        40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                      • memory/532-452-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/532-453-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/532-455-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/1092-229-0x0000000073010000-0x00000000737C0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/1092-230-0x0000000002640000-0x0000000002650000-memory.dmp

                        Filesize

                        64KB

                      • memory/1092-231-0x0000000002640000-0x0000000002650000-memory.dmp

                        Filesize

                        64KB

                      • memory/1124-187-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/1124-196-0x00000000029B0000-0x0000000002DAC000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/1124-55-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/1124-54-0x00000000029B0000-0x0000000002DAC000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/1124-53-0x0000000002DB0000-0x000000000369B000-memory.dmp

                        Filesize

                        8.9MB

                      • memory/1268-469-0x0000000000400000-0x00000000008DF000-memory.dmp

                        Filesize

                        4.9MB

                      • memory/2152-475-0x0000000000400000-0x00000000008DF000-memory.dmp

                        Filesize

                        4.9MB

                      • memory/2592-28-0x0000000074960000-0x0000000075110000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2592-0-0x0000000074960000-0x0000000075110000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2592-1-0x0000000000850000-0x0000000000E9A000-memory.dmp

                        Filesize

                        6.3MB

                      • memory/3464-402-0x0000000003400000-0x0000000003416000-memory.dmp

                        Filesize

                        88KB

                      • memory/3464-125-0x0000000003470000-0x0000000003486000-memory.dmp

                        Filesize

                        88KB

                      • memory/3476-127-0x0000000000400000-0x0000000000439000-memory.dmp

                        Filesize

                        228KB

                      • memory/3476-52-0x0000000000400000-0x0000000000439000-memory.dmp

                        Filesize

                        228KB

                      • memory/3476-51-0x00000000005A0000-0x00000000005AB000-memory.dmp

                        Filesize

                        44KB

                      • memory/3476-48-0x0000000000650000-0x0000000000750000-memory.dmp

                        Filesize

                        1024KB

                      • memory/3672-207-0x0000000004890000-0x00000000048A0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3672-224-0x0000000007110000-0x0000000007124000-memory.dmp

                        Filesize

                        80KB

                      • memory/3672-227-0x0000000073010000-0x00000000737C0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/3672-223-0x00000000070C0000-0x00000000070D1000-memory.dmp

                        Filesize

                        68KB

                      • memory/3672-222-0x0000000006DD0000-0x0000000006E73000-memory.dmp

                        Filesize

                        652KB

                      • memory/3672-212-0x0000000071660000-0x00000000719B4000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/3672-211-0x0000000072170000-0x00000000721BC000-memory.dmp

                        Filesize

                        304KB

                      • memory/3672-210-0x000000007FBE0000-0x000000007FBF0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3672-209-0x0000000004890000-0x00000000048A0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3672-208-0x0000000005F40000-0x0000000005F8C000-memory.dmp

                        Filesize

                        304KB

                      • memory/3672-195-0x0000000004890000-0x00000000048A0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3672-194-0x0000000073010000-0x00000000737C0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4092-190-0x00000000028C0000-0x0000000002CC8000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/4092-369-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/4092-260-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/4092-193-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/4092-191-0x0000000002DD0000-0x00000000036BB000-memory.dmp

                        Filesize

                        8.9MB

                      • memory/4136-107-0x0000000005B80000-0x0000000005B9E000-memory.dmp

                        Filesize

                        120KB

                      • memory/4136-67-0x00000000054F0000-0x0000000005556000-memory.dmp

                        Filesize

                        408KB

                      • memory/4136-159-0x00000000073C0000-0x00000000073D4000-memory.dmp

                        Filesize

                        80KB

                      • memory/4136-133-0x0000000007060000-0x000000000707A000-memory.dmp

                        Filesize

                        104KB

                      • memory/4136-163-0x0000000007410000-0x000000000742A000-memory.dmp

                        Filesize

                        104KB

                      • memory/4136-124-0x0000000006FE0000-0x0000000007056000-memory.dmp

                        Filesize

                        472KB

                      • memory/4136-164-0x0000000007400000-0x0000000007408000-memory.dmp

                        Filesize

                        32KB

                      • memory/4136-180-0x0000000073010000-0x00000000737C0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4136-123-0x0000000002640000-0x0000000002650000-memory.dmp

                        Filesize

                        64KB

                      • memory/4136-119-0x0000000006240000-0x0000000006284000-memory.dmp

                        Filesize

                        272KB

                      • memory/4136-108-0x0000000005BC0000-0x0000000005C0C000-memory.dmp

                        Filesize

                        304KB

                      • memory/4136-60-0x00000000046B0000-0x00000000046E6000-memory.dmp

                        Filesize

                        216KB

                      • memory/4136-152-0x0000000007350000-0x000000000735A000-memory.dmp

                        Filesize

                        40KB

                      • memory/4136-153-0x0000000007460000-0x00000000074F6000-memory.dmp

                        Filesize

                        600KB

                      • memory/4136-78-0x0000000005730000-0x0000000005A84000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/4136-158-0x00000000073A0000-0x00000000073AE000-memory.dmp

                        Filesize

                        56KB

                      • memory/4136-66-0x0000000005480000-0x00000000054E6000-memory.dmp

                        Filesize

                        408KB

                      • memory/4136-65-0x0000000004CB0000-0x0000000004CD2000-memory.dmp

                        Filesize

                        136KB

                      • memory/4136-151-0x0000000007260000-0x0000000007303000-memory.dmp

                        Filesize

                        652KB

                      • memory/4136-64-0x0000000004D20000-0x0000000005348000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/4136-62-0x0000000002640000-0x0000000002650000-memory.dmp

                        Filesize

                        64KB

                      • memory/4136-154-0x0000000007360000-0x0000000007371000-memory.dmp

                        Filesize

                        68KB

                      • memory/4136-150-0x0000000007200000-0x000000000721E000-memory.dmp

                        Filesize

                        120KB

                      • memory/4136-63-0x0000000002640000-0x0000000002650000-memory.dmp

                        Filesize

                        64KB

                      • memory/4136-140-0x0000000071660000-0x00000000719B4000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/4136-139-0x0000000072180000-0x00000000721CC000-memory.dmp

                        Filesize

                        304KB

                      • memory/4136-61-0x0000000073010000-0x00000000737C0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4136-138-0x0000000007220000-0x0000000007252000-memory.dmp

                        Filesize

                        200KB

                      • memory/4136-137-0x000000007F090000-0x000000007F0A0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4136-132-0x00000000076E0000-0x0000000007D5A000-memory.dmp

                        Filesize

                        6.5MB

                      • memory/4504-188-0x0000000000400000-0x00000000008E2000-memory.dmp

                        Filesize

                        4.9MB

                      • memory/4504-192-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

                        Filesize

                        4KB

                      • memory/4504-37-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

                        Filesize

                        4KB

                      • memory/4524-406-0x0000000000400000-0x0000000000434000-memory.dmp

                        Filesize

                        208KB

                      • memory/4736-427-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/4736-426-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/4736-424-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/4736-441-0x0000000000400000-0x0000000000537000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/4824-388-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/4824-474-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/4824-461-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/5012-57-0x00000000008B0000-0x00000000009B0000-memory.dmp

                        Filesize

                        1024KB

                      • memory/5012-331-0x0000000000400000-0x0000000000647000-memory.dmp

                        Filesize

                        2.3MB

                      • memory/5012-77-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                        Filesize

                        972KB

                      • memory/5012-206-0x00000000008B0000-0x00000000009B0000-memory.dmp

                        Filesize

                        1024KB

                      • memory/5012-58-0x0000000002290000-0x00000000022C4000-memory.dmp

                        Filesize

                        208KB

                      • memory/5012-59-0x0000000000400000-0x0000000000647000-memory.dmp

                        Filesize

                        2.3MB

                      • memory/5012-189-0x0000000000400000-0x0000000000647000-memory.dmp

                        Filesize

                        2.3MB