Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-03-2024 06:25

General

  • Target

    f44d23b0b845ca4388424f9d5be32890.exe

  • Size

    283KB

  • MD5

    f44d23b0b845ca4388424f9d5be32890

  • SHA1

    d46eac4684455e34a396eba79ddb01441359ebb6

  • SHA256

    067950a7b80f52fc946a13bf4fd389ea8cbbc043658d33aaff9e3680e1dadd46

  • SHA512

    a8943cc756b9c3339efb3fe8e24e0c24f4e285012a731b4e8e2f5e940a37d246879d469e1ee9825805670fd63f905cec91b1dcde6d01ee0aea72fe7abe711ede

  • SSDEEP

    3072:c+tpp4K1PAppyBA1Q8EkKXU1iKL4i2Dva2ICXIIKcKU1KpVT/wV9tmX3m:cud14pEWC5/Hi2KCY5mUpVTEy

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

http://kamsmad.com/tmp/index.php

http://souzhensil.ru/tmp/index.php

http://teplokub.com.ua/tmp/index.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

20.218.68.91:7690

Extracted

Family

lumma

C2

https://resergvearyinitiani.shop/api

https://associationokeo.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat 3 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 1 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 21 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f44d23b0b845ca4388424f9d5be32890.exe
    "C:\Users\Admin\AppData\Local\Temp\f44d23b0b845ca4388424f9d5be32890.exe"
    1⤵
    • DcRat
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3916
  • C:\Users\Admin\AppData\Local\Temp\A26A.exe
    C:\Users\Admin\AppData\Local\Temp\A26A.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    PID:828
  • C:\Users\Admin\AppData\Local\Temp\A76C.exe
    C:\Users\Admin\AppData\Local\Temp\A76C.exe
    1⤵
    • Executes dropped EXE
    • Writes to the Master Boot Record (MBR)
    PID:4920
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\B131.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\B131.dll
      2⤵
      • Loads dropped DLL
      PID:2792
  • C:\Users\Admin\AppData\Local\Temp\D2A5.exe
    C:\Users\Admin\AppData\Local\Temp\D2A5.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\D2A5.exe
      C:\Users\Admin\AppData\Local\Temp\D2A5.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      PID:4940
  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe
      "C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:924
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:1892
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
            PID:1888
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
              PID:2836
          • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprime123.exe
            "C:\Users\Admin\AppData\Local\Temp\1000837001\goldprime123.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:436
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4268
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
            2⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:4284
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
              3⤵
              • Blocklisted process makes network request
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:4944
              • C:\Windows\system32\netsh.exe
                netsh wlan show profiles
                4⤵
                  PID:1804
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\270530367132_Desktop.zip' -CompressionLevel Optimal
                  4⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3876
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
              2⤵
              • Blocklisted process makes network request
              • Loads dropped DLL
              PID:1984
          • C:\Users\Admin\AppData\Local\Temp\6C36.exe
            C:\Users\Admin\AppData\Local\Temp\6C36.exe
            1⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2252
            • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe
              "C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              PID:2072
              • C:\Users\Admin\AppData\Local\Temp\u1lk.0.exe
                "C:\Users\Admin\AppData\Local\Temp\u1lk.0.exe"
                3⤵
                • Executes dropped EXE
                • Checks processor information in registry
                PID:852
              • C:\Users\Admin\AppData\Local\Temp\u1lk.1.exe
                "C:\Users\Admin\AppData\Local\Temp\u1lk.1.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4128
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
                  4⤵
                    PID:4600
                    • C:\Windows\SysWOW64\chcp.com
                      chcp 1251
                      5⤵
                        PID:4528
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                        5⤵
                        • DcRat
                        • Creates scheduled task(s)
                        PID:4648
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 1588
                    3⤵
                    • Program crash
                    PID:3304
                • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                  "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2616
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3980
                  • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                    "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
                    3⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Checks for VirtualBox DLLs, possible anti-VM trick
                    • Drops file in Windows directory
                    • Modifies data under HKEY_USERS
                    PID:4692
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      4⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3136
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                      4⤵
                        PID:1916
                        • C:\Windows\system32\netsh.exe
                          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                          5⤵
                          • Modifies Windows Firewall
                          PID:2072
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        4⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2400
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        4⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2872
                      • C:\Windows\rss\csrss.exe
                        C:\Windows\rss\csrss.exe
                        4⤵
                        • Executes dropped EXE
                        PID:4452
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          5⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2164
                        • C:\Windows\SYSTEM32\schtasks.exe
                          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                          5⤵
                          • DcRat
                          • Creates scheduled task(s)
                          PID:528
                        • C:\Windows\SYSTEM32\schtasks.exe
                          schtasks /delete /tn ScheduledUpdate /f
                          5⤵
                            PID:2352
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            5⤵
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4472
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            5⤵
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            PID:4024
                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                            5⤵
                            • Executes dropped EXE
                            PID:4984
                  • C:\Users\Admin\AppData\Local\Temp\71B5.exe
                    C:\Users\Admin\AppData\Local\Temp\71B5.exe
                    1⤵
                    • Executes dropped EXE
                    PID:1640
                    • C:\Users\Admin\AppData\Local\Temp\is-DD05A.tmp\71B5.tmp
                      "C:\Users\Admin\AppData\Local\Temp\is-DD05A.tmp\71B5.tmp" /SL5="$8011A,1714247,56832,C:\Users\Admin\AppData\Local\Temp\71B5.exe"
                      2⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of FindShellTrayWindow
                      PID:3340
                      • C:\Users\Admin\AppData\Local\Email Box Organizer\emailboxorganizer.exe
                        "C:\Users\Admin\AppData\Local\Email Box Organizer\emailboxorganizer.exe" -i
                        3⤵
                        • Executes dropped EXE
                        PID:1164
                      • C:\Users\Admin\AppData\Local\Email Box Organizer\emailboxorganizer.exe
                        "C:\Users\Admin\AppData\Local\Email Box Organizer\emailboxorganizer.exe" -s
                        3⤵
                        • Executes dropped EXE
                        PID:4936
                  • C:\Users\Admin\AppData\Local\Temp\9404.exe
                    C:\Users\Admin\AppData\Local\Temp\9404.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    PID:5032
                  • C:\Users\Admin\AppData\Local\Temp\A74E.exe
                    C:\Users\Admin\AppData\Local\Temp\A74E.exe
                    1⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: MapViewOfSection
                    PID:3108
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2072 -ip 2072
                    1⤵
                      PID:3236
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
                      1⤵
                        PID:4528

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\ProgramData\DirectSoundDriver 2.36.198.65\DirectSoundDriver 2.36.198.65.exe

                        Filesize

                        1.9MB

                        MD5

                        a6f412432fcf05d9111b79301b09beef

                        SHA1

                        a6f6df51d30617dd16fae3afd0042b01230dfbb7

                        SHA256

                        cc430f9090c6b76b804364b371efa46ec85943722b452f0cd65793c2aab4ebfa

                        SHA512

                        0b0fbb49fd6c59a9bd0cd0a4f418dbe7c7bae76ee1bf62b439ee5d1416f7ccdc88f1c0f2acd1e2f1dbc20f5dceff2998100c85953311fbcc8bb4460fd51f3171

                      • C:\Users\Admin\AppData\Local\Email Box Organizer\emailboxorganizer.exe

                        Filesize

                        1.8MB

                        MD5

                        8ef043feed945aa688c633cf3946b22d

                        SHA1

                        51acd9b792103e04a810bb8bdd69e338fa75507c

                        SHA256

                        b3cc4ccd39447f529977e89ae27dfb265a09122bf50be13af52f75e6300b0f3a

                        SHA512

                        73f37e12285c408cfd568bff29c002143d6f3845992829a3cc29ee5b2b9679100393b0bd8b0ac275b2380fdc7b50e0245f83252ec61e27cfd974a2e8a9009d07

                      • C:\Users\Admin\AppData\Local\Email Box Organizer\emailboxorganizer.exe

                        Filesize

                        1.2MB

                        MD5

                        9f86c86e14a6832e5f7519075a5a1739

                        SHA1

                        77db6622bb7605e9c7b9a26dc6af92938453e176

                        SHA256

                        fda28a12d2f640785e655f8e2c3fdaac8ca69b576ab15ff13c5228b33d63250b

                        SHA512

                        59ec164cc1015c7c1d1dae79429d499db96aae3e3fd3983e89a09f9c204d9a4a117b1b8c2d26bba03717f671e8c2c4d3621f1135df291013702c1903c035fcc9

                      • C:\Users\Admin\AppData\Local\Email Box Organizer\emailboxorganizer.exe

                        Filesize

                        448KB

                        MD5

                        d97d41ab937f28d0494ef562855bca54

                        SHA1

                        c251c3699b9fa48f6b98e341db27a17f2de724fd

                        SHA256

                        ade934c88c28038eeedc30d62f82d99d4670c27568b5fcac2c2f63cc7aff441a

                        SHA512

                        12f04344a2663e03d6456bd7ec8f219526ae92255e5eb8f6010c3cbd89b9096bc82c7aee380f077f1cdebfb6faf289fc319eb71fb88a0a32f6755cad5c1b9a24

                      • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe

                        Filesize

                        318KB

                        MD5

                        69c8535d268d104e0b48f04617980371

                        SHA1

                        a835c367b6f9b9e63605c6e8aaa742f9db7dcf40

                        SHA256

                        3c74e8c9c3694e4036fea99eb08ba0d3502ad3fe2158432d0efdfaacd9763c35

                        SHA512

                        93f35aa818391d06c4662796bec0dced2dc7a28b666c5c4bf6a6f68898ed52b77fa2ac7dd031b701b1ab8ae396e8941ade4ef0159765419788034742534a0c9e

                      • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprime123.exe

                        Filesize

                        64KB

                        MD5

                        2963fbb109421642b9db85a52b174bff

                        SHA1

                        fb0e3bb18b352492cd99ffe7a0c20ffc52ac0659

                        SHA256

                        6501b692d3d471efd9dc995ff5959f47ed72e105b3920482b36e666225f7051c

                        SHA512

                        312323f3ffcccf9fd6e467795666e5f45df48d275ec0600b82e1f1146e93e3830fbf69be048b69697d5154098dafb0989b5995aea33e685b7f39eb48d2418f31

                      • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprime123.exe

                        Filesize

                        555KB

                        MD5

                        e8947f50909d3fdd0ab558750e139756

                        SHA1

                        ea4664eb61ddde1b17e3b05e67d5928703a1b6f1

                        SHA256

                        0b01a984b362772a49cc7e99af1306a2bb00145b03ea8eca7db616c91f6cf445

                        SHA512

                        7d7f389af526ee2947693983bf4c1cf61064cfe8c75a9708c6e0780b24f5eb261a907eeb6fedfaefcd08d8cddc9afb04c1701b85992456d793b5236a5a981f58

                      • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                        Filesize

                        1.8MB

                        MD5

                        5362a0f2c084029070b5f14c9537c635

                        SHA1

                        e4ca2e259be387a04ea359d1bf064acdb9bb9c8f

                        SHA256

                        bafdf87110ae7a53811a6474a8bacf781a02d7cb473e80799a00f0c29bf613cd

                        SHA512

                        e41358182f2e7bf0af2308b90d31a58272cc0383e36caa61dd07f407f7ec26257ac4800272a57fb5bad4ecec2683eae062eb15192c322b75aa4b0629d3499ee9

                      • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                        Filesize

                        1.3MB

                        MD5

                        73ed54d505b1235091284fd2766578c3

                        SHA1

                        fd5593cfece10c796c34842f32b02d0f4a333093

                        SHA256

                        f587969e97c00332d9a44ed8c6f1cb25fffaaabb285df17ff21ed86f2003137b

                        SHA512

                        aafc0f415108bd8d3ebb8da2f5cdfbb899e13e95281c3523f1534ba587276c0a99c853a35ac29da3b8e81ec72a71e9d645d2b6bb3ed24de08859822f113fc119

                      • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                        Filesize

                        1.1MB

                        MD5

                        a364cf0aebf8819d767277d4da81b1ca

                        SHA1

                        2692be08767f57fe2d73f450a42c37ab5b648ad0

                        SHA256

                        a6d8b2e2ecb7891a561d3b961e8da8f85e9752e7f5a7caddc84a3ce49797448e

                        SHA512

                        07401ac82955911d5306394652eb5a9cfa6f8e88286dd59049fb5ad5980bb739b3b1bb65e4acd3c2cd2597e81ff583800abc7637eb17458a6bdc8acaef1e21a0

                      • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                        Filesize

                        4.1MB

                        MD5

                        b869cd2b17a48a042c543f97b5ff7e2f

                        SHA1

                        325559575cdba97275743c3077be2780b20e8558

                        SHA256

                        30487d60a6dc7d5a6da51e624ae8586c9906547fff22ba533df1b53a4ad94728

                        SHA512

                        1706d77d8dd3ead8a1da0f58daaba8737cdccf4563fdc98878d5922f6b0f0ce78d3176e2233380a3942b671146b2d9fa7d4d504ced6d5e17c27e8b5033a018d6

                      • C:\Users\Admin\AppData\Local\Temp\4KPV6A~1\cached-microdesc-consensus.tmp

                        Filesize

                        2.6MB

                        MD5

                        c63047bd54d6fe5f1e767bdd972d5632

                        SHA1

                        8b735fe171834d13ee767b48d23f9f25c6d365fd

                        SHA256

                        1b11737404b8c0327069d9e2c5d85ab89d15bbed4b0643a473c461740cd95d87

                        SHA512

                        c30d5993bd553df1296f929d5589a045406e9f493597e128059cc8ed303165a1972ae37d787dad57e35f9932898359cb8bdd92fd9718f370fcf0c65041589439

                      • C:\Users\Admin\AppData\Local\Temp\6C36.exe

                        Filesize

                        2.6MB

                        MD5

                        bf8fd3b864f132ab72858bd29cc32345

                        SHA1

                        1bf4938f2a89badab1772f213b91a7d5a00a3a95

                        SHA256

                        886dba28612a64d8294f485718623bb3a4adc4e981b87e9904cac27f853ef7e4

                        SHA512

                        3f8675a54725e2a25e81e105564d2773f73610425719c0de2daa6cdbf6c22ccf11b32e8e94634589c9d92817326cdadfc627f86b1e1419efa94f91fdc9144c58

                      • C:\Users\Admin\AppData\Local\Temp\6C36.exe

                        Filesize

                        2.3MB

                        MD5

                        b99c489a0874bfdba4ec9ad3e223a57d

                        SHA1

                        1400a01df4e2fe6875aaf8dcbfaa7b788ee3696c

                        SHA256

                        4fb82c8b2c2d28e3128f5be83df6ba74c22c41708e486cc03d55d96ba3e817d0

                        SHA512

                        0afdc5b192ac39b384ea14de2857b676d705833846e1298c453de587be908450b24c098fef3a254a2679ddd453719c959b09b7fa9db87879e203806f6302fa53

                      • C:\Users\Admin\AppData\Local\Temp\71B5.exe

                        Filesize

                        1.9MB

                        MD5

                        3382cac53272ce4d00b106f99b8d226b

                        SHA1

                        de6ab208cbb8712b6eb634c32a15c4dba496cb9e

                        SHA256

                        81e3171f398298da0f6975a646f71a754483b0518c43810e6b61eda121207baa

                        SHA512

                        9cee3238dfb867c26a7445f20ee7782ff26dd27246023e480095cebec5634ba0269087eed60f41678ada6415e329bfcfb2a2a0454c2e429f1ef20c5b61aaf10e

                      • C:\Users\Admin\AppData\Local\Temp\71B5.exe

                        Filesize

                        2.0MB

                        MD5

                        e8b5e79bfcf6676adbad4b286df73d89

                        SHA1

                        9ee8ef9956a6a6f25cc887f442a597cca2a61575

                        SHA256

                        985e179ac7076905f3c0e12c02399feb49d450c6d4d701ff4fd364de2eb38b77

                        SHA512

                        a9a8aff7e1f065b2270d04061fc58c52564e574246bcb63b9e7d9475a59b70e956222d975326c63d897a6b41d332185ae56fe5f04d79331865792d965ebf020b

                      • C:\Users\Admin\AppData\Local\Temp\9404.exe

                        Filesize

                        704KB

                        MD5

                        2e129938dd42805040aafe12a4edcff0

                        SHA1

                        c2d12f7f8a37c5a6307d83d9a09615c8426f2b8a

                        SHA256

                        2862f184cf62d24a2a2610222e19db4d9f68ff9afd166a6fd39217cf51c1fea9

                        SHA512

                        376042b640ab9f473e649b034ee404fe77d45fb9131a64e77f7557bc8ec629064c8850fda251632c766cf58cac98d4ac2e5800046dba53f27f4b60b6cd1acd04

                      • C:\Users\Admin\AppData\Local\Temp\9404.exe

                        Filesize

                        1.2MB

                        MD5

                        868e7641b3369342a316f816ef2ef5dd

                        SHA1

                        842e75b0d23f12ca65b7336ecc2e6d86e0b6702b

                        SHA256

                        0d5cdd39cb846a8b4f60db61bde59adc75d8d28b8174e6595f27bcf6a23babff

                        SHA512

                        c6fc1a2b84287bfd84b36bc6380a20323a9932b7b4e2b1289820864a33467db7946681db9698a7aa04a20a12db59d01e68ab199a5ab43dbf0c5a840e72da925d

                      • C:\Users\Admin\AppData\Local\Temp\A26A.exe

                        Filesize

                        1.8MB

                        MD5

                        3bf261c0a00e880ee85c3e5d53f46e1e

                        SHA1

                        0e22830cd59a76ba4e7da643d1a4054deea4c7e5

                        SHA256

                        d0f4716356c11256ce372336dee85883a2696134f28b7b123e6fb76a6bf7fa3a

                        SHA512

                        538243d1b37f2b74c3fa5ab2d04ca379f743b758c268f11b5b16e2797427b3029ecf54896b9b5c0e67a7ae0c0de0c29cdb1f7f6ebb54aa059a4b1f3fbcab0d55

                      • C:\Users\Admin\AppData\Local\Temp\A74E.exe

                        Filesize

                        283KB

                        MD5

                        66901f8020ccd8b99cb1000ba1b12644

                        SHA1

                        852615fdbcc56969a83c66964fc98fb1a4970313

                        SHA256

                        209308a7011b49365b1e6172b040a0ee3a0c56706ad9ab62f94537091a8d9b83

                        SHA512

                        aa2263357c27b2973a500495c005b9e6ca5efb0e6df2018db131906af233a7a4f41cfc1fe37422d1180f5934bc379b20f362f0197967d7c48c648731aaa07194

                      • C:\Users\Admin\AppData\Local\Temp\A76C.exe

                        Filesize

                        554KB

                        MD5

                        a1b5ee1b9649ab629a7ac257e2392f8d

                        SHA1

                        dc1b14b6d57589440fb3021c9e06a3e3191968dc

                        SHA256

                        2bfd95260a4c52d4474cd51e74469fc3de94caed28937ff0ce99ded66af97e65

                        SHA512

                        50ccbb9fd4ea2da847c6be5988e1e82e28d551b06cc9122b921dbd40eff4b657a81a010cea76f29e88fda06f8c053090b38d04eb89a6d63ec4f42ef68b1cf82b

                      • C:\Users\Admin\AppData\Local\Temp\B131.dll

                        Filesize

                        2.8MB

                        MD5

                        b0fb18cfcac1983582e7fd67b2843ce8

                        SHA1

                        ca29cf7cee80be38c5d667d5e8c00e6ea11b3294

                        SHA256

                        4132c2587cfe85b944d95835d8d0bf92a08a0f831ea26a45c826146048347f45

                        SHA512

                        4d9e1b14ef1a8adc15d38846c0a4e1d762e76fd944c76621ef6ac3a8482d14e40cfd4d7a14853d7a99cca2a99aa438eba996e842f1172f5f9a8f34ba1d97daf9

                      • C:\Users\Admin\AppData\Local\Temp\B131.dll

                        Filesize

                        2.5MB

                        MD5

                        d9b5c7a308bf08b3591530a4300e99a4

                        SHA1

                        632a46d19f626826a9d9c9ff681fd5023788b600

                        SHA256

                        f61f23af4d4ff1992af7014c4d66ee84d638eab8d96e6cd2679a23908b68757c

                        SHA512

                        6454cbe1e1f1492be4b1a1ae49a7c460bbfc26fc0d52742febd31102fa19ce3c0406fe4c501103949ffc343cb111ae4e2d95b00669c8147cdab68aee294863d2

                      • C:\Users\Admin\AppData\Local\Temp\D2A5.exe

                        Filesize

                        1024KB

                        MD5

                        00839fca0325f7a370700a5c31609312

                        SHA1

                        965404242c2790255367af086411a17a4191df99

                        SHA256

                        4960a71016af937d794e0ffae50d00e4cd807b7ba42e7957d774f655a7b2de2b

                        SHA512

                        6a7234675fc32a7b52d17c61cef21cd3f6bb8827ebb8e9578fa15c48a5a1bf0a588c161b4aa6b7766461e230b83ef77d2fa4d17df5dcbb22f5d3b9ac0fc13c3b

                      • C:\Users\Admin\AppData\Local\Temp\D2A5.exe

                        Filesize

                        1.4MB

                        MD5

                        1ba929001f7c19ece2084485c306cac1

                        SHA1

                        5cb85947ddbd73b1b0e893b9c3df5e6f6ac562ea

                        SHA256

                        a7b094f34eca754acbde6cb1112ec13a8718b585900f87e68cd1d2b0c41253ef

                        SHA512

                        42b1ac766c08316118f21b23edb7d18cca77ed868b8f14724c99be2b8a1060542ec25f0d0b778f406e40787719413e0c5e7e9e50ac184a7973f23c771341aa9f

                      • C:\Users\Admin\AppData\Local\Temp\D2A5.exe

                        Filesize

                        1.8MB

                        MD5

                        996c2b1fb60f980ea6618aeefbe4cebf

                        SHA1

                        a8553f7f723132a1d35f7a57cae1a2e267cbc2ac

                        SHA256

                        f91c0a4753cdb98cce0ade020917fdefe7a8daf88d23b4c07595de741402ca50

                        SHA512

                        4af8fb921a332c5ac3d43b85bc23c859e431702e00852537bf1831c7af8b990d880808d044a1317873c77fbdecb1af7c97bed9edd9e2185bcbfa390c463f9056

                      • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe

                        Filesize

                        331KB

                        MD5

                        4d07092a87d4212cd8b2bf4d7576c1a0

                        SHA1

                        bf5fe8140ff117b171efda94b25a5cd52e6c276d

                        SHA256

                        c659350d81f9bed61a7c300cf55ad211230a337a624424c0379f589de2bb20a1

                        SHA512

                        d1fe5eb758db5a34bd846c08e5240e0473b72b2604b846b5cfefa10c3b2ed7b0e948ccc26fddafa646ee526082b1445454f740767faa7488268082505b144bb4

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bvurqanu.xqx.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                        Filesize

                        281KB

                        MD5

                        d98e33b66343e7c96158444127a117f6

                        SHA1

                        bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                        SHA256

                        5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                        SHA512

                        705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                      • C:\Users\Admin\AppData\Local\Temp\is-DD05A.tmp\71B5.tmp

                        Filesize

                        690KB

                        MD5

                        4df57aaf92a50f25127408e03415e9ae

                        SHA1

                        8f7670cfae2f405be830c8ec5f06856358d301a1

                        SHA256

                        d247810adf596b210b373af971bfeeeebea4f574cf2175d87d4899dcfa6e405c

                        SHA512

                        a2bbb20f3d41b86f01455640c188b2c80d2bf8559ffd335e4cbeac7d70b8d88da3f75432e19a3597ffb79c183c32e1f071f0d259b277caf9173cf60479d312b5

                      • C:\Users\Admin\AppData\Local\Temp\is-DD05A.tmp\71B5.tmp

                        Filesize

                        384KB

                        MD5

                        5949dd8368b9f6b1c2a0df7f759822df

                        SHA1

                        1c2057aef29a43a61d220e56a218da075989d43c

                        SHA256

                        cb90ef41a6623abe92fdd1ee5f6a2077982470f56c4cf15b825a6f179da0f3ab

                        SHA512

                        6acbfc35224c1c82bf4faac7f16ce2139d27b965a2b0722de4fc76caec5df6ca59c6ff243b9ee55d530b8ee67bf0ab4b7db69fb12c08f2ba065ce45d637b0d56

                      • C:\Users\Admin\AppData\Local\Temp\is-Q9LON.tmp\_isetup\_iscrypt.dll

                        Filesize

                        2KB

                        MD5

                        a69559718ab506675e907fe49deb71e9

                        SHA1

                        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                        SHA256

                        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                        SHA512

                        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                      • C:\Users\Admin\AppData\Local\Temp\u1lk.0.exe

                        Filesize

                        282KB

                        MD5

                        54e0220b6f9b4f8f64382b71c6033595

                        SHA1

                        1f599189588a7a174a6b8a4587ae0df5c15bdd6f

                        SHA256

                        47bccced008024236587fbe59d8419a52888f7b50b01cc6c7dc92101a0885607

                        SHA512

                        0c4e27554ee5a090f8e8e1fa0b901cc5cc90fb6f1a3fb68c4a991096d8ea53a07e452d1ad119b046107deffe34173b21a5ff2f0062b98ae9b23945ea05ad8708

                      • C:\Users\Admin\AppData\Local\Temp\u1lk.1.exe

                        Filesize

                        1.7MB

                        MD5

                        eee5ddcffbed16222cac0a1b4e2e466e

                        SHA1

                        28b40c88b8ea50b0782e2bcbb4cc0f411035f3d5

                        SHA256

                        2a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54

                        SHA512

                        8f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                        Filesize

                        109KB

                        MD5

                        2afdbe3b99a4736083066a13e4b5d11a

                        SHA1

                        4d4856cf02b3123ac16e63d4a448cdbcb1633546

                        SHA256

                        8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                        SHA512

                        d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                        Filesize

                        1.2MB

                        MD5

                        92fbdfccf6a63acef2743631d16652a7

                        SHA1

                        971968b1378dd89d59d7f84bf92f16fc68664506

                        SHA256

                        b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                        SHA512

                        b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                      • C:\Users\Admin\AppData\Roaming\Temp\Task.bat

                        Filesize

                        128B

                        MD5

                        11bb3db51f701d4e42d3287f71a6a43e

                        SHA1

                        63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                        SHA256

                        6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                        SHA512

                        907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                        Filesize

                        2KB

                        MD5

                        968cb9309758126772781b83adb8a28f

                        SHA1

                        8da30e71accf186b2ba11da1797cf67f8f78b47c

                        SHA256

                        92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                        SHA512

                        4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                        Filesize

                        19KB

                        MD5

                        2b7d7a4bed93489928b2b8165ea263d8

                        SHA1

                        bc5720e8f7897c141f5ce13de4a98c9c9c32eb03

                        SHA256

                        8972f18c1ee6447da6764101bf94adaf2fcd0f5b9bf605f113711a5fdb7b57fc

                        SHA512

                        35ae3663e9444f151ac4375fc0ab2e53673a0ba9995f657d7b9edcba9b26cbc3bf69a7ac62c31d68f7dbdba069a1402c53d39e8c61099320c0add987091addf3

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                        Filesize

                        19KB

                        MD5

                        41f68dd3f615c629735e5113426b861e

                        SHA1

                        5f49a51db4b1c9ec6cf7c71270d7f2362a25ff99

                        SHA256

                        c61fcef7453d4184cb706cef0aac0f203273050dc01965ecd0f2ba5cb95eb986

                        SHA512

                        0a7a250615a99e4920afb210926fede70868f5c42c7a78aed44cacbf7333bf8c2402e02acc8afae2e6bd4729339f1f9422a73ce5956d405a3570bc88e8ffb8a5

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                        Filesize

                        19KB

                        MD5

                        145ad7df7d57adee1a7d712919f31c66

                        SHA1

                        afc2494c83ce3a1dfd12e7bb44054cc76106219e

                        SHA256

                        e3a4de21fb6900f3ec170a4fa816d7ba896d902956f9743f2a2b81f102461d5e

                        SHA512

                        5cce5c14f8fb760855592d0bfcd6d0c2b423371b155602592b0c157420327645db0de8a67d7949808a29cf8ebfe0b882061848dedf01b9e7a84e1239b08dd106

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                        Filesize

                        19KB

                        MD5

                        22b76c491bf4f562d6e47c0b57e1014b

                        SHA1

                        70f2c85c38c4e0fe2ef2d6d2854eb422ae34540a

                        SHA256

                        7ec2c04d7ee1f790b0773565296d549a8484f1a22f8c29c8ff8b6ce7274972a5

                        SHA512

                        126daeaa9f25b49c82fd5bf91ef9b1a3d02b00b228d04cab502cee58e8eeab440c34a87cda3bd533887867e0fad5e1b21044b383bb2e135910fb4c41d9497cd8

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                        Filesize

                        19KB

                        MD5

                        cfe7df95b564602fae46dc720701b69c

                        SHA1

                        b1a96f520140af7d7f75844bb48745f3d228f628

                        SHA256

                        77b587da0519ef9622aec4099dcebaf7ad562eb93857f352bf0dcce724ed5d27

                        SHA512

                        895f20d3574f36a36e5dc3615b542a3c3661d09ae27e106045138192f15b6e5e836ffd9d5de61c95686ecae220ad7f6d75521fe0ef91e426524687b47cec52a9

                      • memory/436-145-0x00000000728B0000-0x0000000073060000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/436-146-0x0000000005900000-0x0000000005910000-memory.dmp

                        Filesize

                        64KB

                      • memory/436-155-0x00000000728B0000-0x0000000073060000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/436-152-0x00000000032A0000-0x00000000052A0000-memory.dmp

                        Filesize

                        32.0MB

                      • memory/436-141-0x0000000000E10000-0x0000000000EA2000-memory.dmp

                        Filesize

                        584KB

                      • memory/828-40-0x00000000005E0000-0x0000000000A84000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/828-33-0x0000000004EB0000-0x0000000004EB1000-memory.dmp

                        Filesize

                        4KB

                      • memory/828-24-0x0000000004E90000-0x0000000004E91000-memory.dmp

                        Filesize

                        4KB

                      • memory/828-23-0x0000000004E40000-0x0000000004E41000-memory.dmp

                        Filesize

                        4KB

                      • memory/828-22-0x0000000004E30000-0x0000000004E31000-memory.dmp

                        Filesize

                        4KB

                      • memory/828-19-0x0000000004E70000-0x0000000004E71000-memory.dmp

                        Filesize

                        4KB

                      • memory/828-21-0x0000000004EA0000-0x0000000004EA1000-memory.dmp

                        Filesize

                        4KB

                      • memory/828-20-0x0000000004E50000-0x0000000004E51000-memory.dmp

                        Filesize

                        4KB

                      • memory/828-18-0x0000000004E60000-0x0000000004E61000-memory.dmp

                        Filesize

                        4KB

                      • memory/828-34-0x0000000004EC0000-0x0000000004EC1000-memory.dmp

                        Filesize

                        4KB

                      • memory/828-16-0x00000000772A4000-0x00000000772A6000-memory.dmp

                        Filesize

                        8KB

                      • memory/828-17-0x00000000005E0000-0x0000000000A84000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/828-15-0x00000000005E0000-0x0000000000A84000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/924-116-0x00000000004A0000-0x00000000004F6000-memory.dmp

                        Filesize

                        344KB

                      • memory/924-126-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

                        Filesize

                        64KB

                      • memory/924-124-0x00000000728B0000-0x0000000073060000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/924-135-0x00000000728B0000-0x0000000073060000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/924-129-0x0000000002720000-0x0000000004720000-memory.dmp

                        Filesize

                        32.0MB

                      • memory/1164-261-0x0000000000400000-0x00000000005EB000-memory.dmp

                        Filesize

                        1.9MB

                      • memory/1640-207-0x0000000000400000-0x0000000000414000-memory.dmp

                        Filesize

                        80KB

                      • memory/1640-317-0x0000000000400000-0x0000000000414000-memory.dmp

                        Filesize

                        80KB

                      • memory/2004-55-0x0000000002290000-0x0000000002451000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/2004-56-0x0000000002460000-0x0000000002617000-memory.dmp

                        Filesize

                        1.7MB

                      • memory/2004-144-0x0000000002290000-0x0000000002451000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/2072-316-0x0000000000400000-0x0000000000469000-memory.dmp

                        Filesize

                        420KB

                      • memory/2252-191-0x0000000000AF0000-0x0000000000F62000-memory.dmp

                        Filesize

                        4.4MB

                      • memory/2616-318-0x0000000000400000-0x0000000000D1C000-memory.dmp

                        Filesize

                        9.1MB

                      • memory/2792-52-0x0000000010000000-0x00000000102CE000-memory.dmp

                        Filesize

                        2.8MB

                      • memory/2792-44-0x0000000002D30000-0x0000000002E3F000-memory.dmp

                        Filesize

                        1.1MB

                      • memory/2836-130-0x0000000000400000-0x0000000000448000-memory.dmp

                        Filesize

                        288KB

                      • memory/2836-139-0x0000000000DF0000-0x0000000000E22000-memory.dmp

                        Filesize

                        200KB

                      • memory/2836-142-0x0000000000DF0000-0x0000000000E22000-memory.dmp

                        Filesize

                        200KB

                      • memory/2836-137-0x0000000000DF0000-0x0000000000E22000-memory.dmp

                        Filesize

                        200KB

                      • memory/2836-136-0x0000000000400000-0x0000000000448000-memory.dmp

                        Filesize

                        288KB

                      • memory/2836-134-0x0000000000400000-0x0000000000448000-memory.dmp

                        Filesize

                        288KB

                      • memory/2836-143-0x0000000000DF0000-0x0000000000E22000-memory.dmp

                        Filesize

                        200KB

                      • memory/3108-352-0x0000000000400000-0x0000000001A34000-memory.dmp

                        Filesize

                        22.2MB

                      • memory/3340-319-0x0000000000400000-0x00000000004BC000-memory.dmp

                        Filesize

                        752KB

                      • memory/3448-4-0x00000000022F0000-0x0000000002306000-memory.dmp

                        Filesize

                        88KB

                      • memory/3448-351-0x0000000002330000-0x0000000002346000-memory.dmp

                        Filesize

                        88KB

                      • memory/3916-1-0x0000000001D10000-0x0000000001E10000-memory.dmp

                        Filesize

                        1024KB

                      • memory/3916-2-0x0000000001CE0000-0x0000000001CEB000-memory.dmp

                        Filesize

                        44KB

                      • memory/3916-3-0x0000000000400000-0x0000000001A34000-memory.dmp

                        Filesize

                        22.2MB

                      • memory/3916-5-0x0000000000400000-0x0000000001A34000-memory.dmp

                        Filesize

                        22.2MB

                      • memory/4268-168-0x0000000008010000-0x000000000805C000-memory.dmp

                        Filesize

                        304KB

                      • memory/4268-165-0x0000000007F00000-0x000000000800A000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/4268-169-0x0000000008120000-0x0000000008186000-memory.dmp

                        Filesize

                        408KB

                      • memory/4268-156-0x00000000055F0000-0x0000000005B94000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/4268-150-0x0000000000400000-0x0000000000450000-memory.dmp

                        Filesize

                        320KB

                      • memory/4268-166-0x0000000007E30000-0x0000000007E42000-memory.dmp

                        Filesize

                        72KB

                      • memory/4268-167-0x0000000007E90000-0x0000000007ECC000-memory.dmp

                        Filesize

                        240KB

                      • memory/4268-162-0x00000000728B0000-0x0000000073060000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4268-164-0x0000000006490000-0x0000000006AA8000-memory.dmp

                        Filesize

                        6.1MB

                      • memory/4268-160-0x00000000052C0000-0x00000000052D0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4268-161-0x0000000005270000-0x000000000527A000-memory.dmp

                        Filesize

                        40KB

                      • memory/4268-158-0x00000000050E0000-0x0000000005172000-memory.dmp

                        Filesize

                        584KB

                      • memory/4920-50-0x0000000000400000-0x0000000001A77000-memory.dmp

                        Filesize

                        22.5MB

                      • memory/4920-30-0x0000000001D90000-0x0000000001E90000-memory.dmp

                        Filesize

                        1024KB

                      • memory/4920-31-0x0000000001CF0000-0x0000000001D5B000-memory.dmp

                        Filesize

                        428KB

                      • memory/4920-32-0x0000000000400000-0x0000000001A77000-memory.dmp

                        Filesize

                        22.5MB

                      • memory/4920-117-0x0000000001D90000-0x0000000001E90000-memory.dmp

                        Filesize

                        1024KB

                      • memory/4936-341-0x0000000000400000-0x00000000005EB000-memory.dmp

                        Filesize

                        1.9MB

                      • memory/4940-51-0x0000000000400000-0x0000000000848000-memory.dmp

                        Filesize

                        4.3MB

                      • memory/4940-54-0x0000000000400000-0x0000000000848000-memory.dmp

                        Filesize

                        4.3MB

                      • memory/4940-83-0x0000000002E20000-0x0000000002F4B000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/4940-59-0x0000000000400000-0x0000000000848000-memory.dmp

                        Filesize

                        4.3MB

                      • memory/4940-58-0x0000000000400000-0x0000000000848000-memory.dmp

                        Filesize

                        4.3MB

                      • memory/4940-63-0x0000000010000000-0x00000000102CE000-memory.dmp

                        Filesize

                        2.8MB

                      • memory/4940-64-0x0000000000CE0000-0x0000000000CE6000-memory.dmp

                        Filesize

                        24KB

                      • memory/4940-61-0x0000000000400000-0x0000000000848000-memory.dmp

                        Filesize

                        4.3MB

                      • memory/4940-60-0x0000000000400000-0x0000000000848000-memory.dmp

                        Filesize

                        4.3MB

                      • memory/4940-84-0x0000000002F50000-0x000000000305F000-memory.dmp

                        Filesize

                        1.1MB

                      • memory/4940-87-0x0000000002F50000-0x000000000305F000-memory.dmp

                        Filesize

                        1.1MB

                      • memory/5032-331-0x0000000000AF0000-0x0000000000F94000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/5096-208-0x0000000000E60000-0x0000000001304000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/5096-315-0x0000000000E60000-0x0000000001304000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/5096-69-0x0000000000E60000-0x0000000001304000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/5096-70-0x0000000000E60000-0x0000000001304000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/5096-163-0x0000000000E60000-0x0000000001304000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/5096-71-0x0000000005770000-0x0000000005771000-memory.dmp

                        Filesize

                        4KB

                      • memory/5096-73-0x0000000005780000-0x0000000005781000-memory.dmp

                        Filesize

                        4KB

                      • memory/5096-75-0x00000000057B0000-0x00000000057B1000-memory.dmp

                        Filesize

                        4KB

                      • memory/5096-74-0x0000000005760000-0x0000000005761000-memory.dmp

                        Filesize

                        4KB

                      • memory/5096-76-0x0000000005740000-0x0000000005741000-memory.dmp

                        Filesize

                        4KB

                      • memory/5096-77-0x0000000005750000-0x0000000005751000-memory.dmp

                        Filesize

                        4KB

                      • memory/5096-78-0x00000000057A0000-0x00000000057A1000-memory.dmp

                        Filesize

                        4KB

                      • memory/5096-79-0x00000000057D0000-0x00000000057D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/5096-186-0x0000000000E60000-0x0000000001304000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/5096-82-0x00000000057C0000-0x00000000057C1000-memory.dmp

                        Filesize

                        4KB

                      • memory/5096-138-0x0000000000E60000-0x0000000001304000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/5096-154-0x0000000000E60000-0x0000000001304000-memory.dmp

                        Filesize

                        4.6MB