Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

19/03/2024, 10:46

240319-mvcmcsah4t 10

18/03/2024, 12:09

240318-pbenqagc97 10

17/03/2024, 13:27

240317-qqh55afc93 10

17/03/2024, 02:17

240317-cqtd7scf2x 10

Analysis

  • max time kernel
    637s
  • max time network
    623s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/03/2024, 13:27

General

  • Target

    d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe

  • Size

    209KB

  • MD5

    2cb4d9235c8edfaeeedf9258177cec57

  • SHA1

    401520c963a302e4df292c032416febec06e5666

  • SHA256

    d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278

  • SHA512

    5d1059c1618e8cf1645a7775da743b02ef387d249c6b263e20ade68362ee06e43548293c1bb224719014618458b6bb6b00c7664fbea97b2414976ce980a8d950

  • SSDEEP

    3072:M4GZjvkqp4C/Khv97mrvw1F0Dz1yL9w1RBeg8+/yGYV:nGlvkqp4RSTwQwkRBeA

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

rc4.i32
rc4.i32

Extracted

Family

vidar

Version

8.3

Botnet

aadba0e623c9f7875c6a7402447d5a33

C2

https://steamcommunity.com/profiles/76561199651834633

https://t.me/raf6ik

Attributes
  • profile_id_v2

    aadba0e623c9f7875c6a7402447d5a33

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0

Extracted

Family

lumma

C2

https://herdbescuitinjurywu.shop/api

https://colorfulequalugliess.shop/api

https://resergvearyinitiani.shop/api

https://deadpanstupiddyjjuwk.shop/api

Extracted

Family

socks5systemz

C2

http://cszqkvf.net/search/?q=67e28dd83d5cf57a4406a9177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978f571ea771795af8e05c647db22f31df92d8838ed12a666d307eca743ec4c2b07b52966923a6788f713c4e790

http://cszqkvf.net/search/?q=67e28dd83d5cf57a4406a9177c27d78406abdd88be4b12eab517aa5c96bd86ef9c8244825a8bbc896c58e713bc90c91836b5281fc235a925ed3e56d6bd974a95129070b614e96cc92be20ea478cc51bbe358b90d3b4eed3233d1626a8ff810c0e99d983fc56a

http://bozbmfe.com/search/?q=67e28dd83d5cf57a4406a9177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978f571ea771795af8e05c646db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608fff17c8ed91923d

http://bozbmfe.com/search/?q=67e28dd83d5cf57a4406a9177c27d78406abdd88be4b12eab517aa5c96bd86e894854a825a8bbc896c58e713bc90c91836b5281fc235a925ed3e56d6bd974a95129070b615e96cc92be510b866db52b2e34aec4c2b14a82966836f23d7f210c7ee959c33cf6b9e10

Signatures

  • DcRat 4 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Vidar Stealer 2 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socks5Systemz

    Socks5Systemz is a botnet written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 4 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 29 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe
    "C:\Users\Admin\AppData\Local\Temp\d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3664
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • DcRat
    • Loads dropped DLL
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3856
  • C:\Users\Admin\AppData\Local\Temp\5743.exe
    C:\Users\Admin\AppData\Local\Temp\5743.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1332
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
      2⤵
        PID:2016
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 896
          3⤵
          • Program crash
          PID:2392
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 1032
          3⤵
          • Program crash
          PID:1404
    • C:\Windows\system32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\C36B.dll
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3168
      • C:\Windows\SysWOW64\regsvr32.exe
        /s C:\Users\Admin\AppData\Local\Temp\C36B.dll
        2⤵
        • Loads dropped DLL
        PID:944
    • C:\Users\Admin\AppData\Local\Temp\D270.exe
      C:\Users\Admin\AppData\Local\Temp\D270.exe
      1⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      PID:4556
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2016 -ip 2016
      1⤵
        PID:3768
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2016 -ip 2016
        1⤵
          PID:2804
        • C:\Users\Admin\AppData\Roaming\digvhbv
          C:\Users\Admin\AppData\Roaming\digvhbv
          1⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: MapViewOfSection
          PID:4944
        • C:\Users\Admin\AppData\Local\Temp\CBC5.exe
          C:\Users\Admin\AppData\Local\Temp\CBC5.exe
          1⤵
          • Executes dropped EXE
          PID:4792
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 1076
            2⤵
            • Program crash
            PID:2620
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4792 -ip 4792
          1⤵
            PID:4940
          • C:\Users\Admin\AppData\Local\Temp\B99.exe
            C:\Users\Admin\AppData\Local\Temp\B99.exe
            1⤵
            • Checks BIOS information in registry
            • Executes dropped EXE
            PID:2792
            • C:\Windows\system32\sc.exe
              C:\Windows\system32\sc.exe delete "csrss"
              2⤵
              • Launches sc.exe
              PID:2284
            • C:\Windows\system32\sc.exe
              C:\Windows\system32\sc.exe create "csrss" binpath= "C:\ProgramData\SystemFiles\csrss.exe" start= "auto"
              2⤵
              • Launches sc.exe
              PID:4832
            • C:\Windows\system32\sc.exe
              C:\Windows\system32\sc.exe stop eventlog
              2⤵
              • Launches sc.exe
              PID:264
            • C:\Windows\system32\sc.exe
              C:\Windows\system32\sc.exe start "csrss"
              2⤵
              • Launches sc.exe
              PID:3160
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\B99.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1816
              • C:\Windows\system32\choice.exe
                choice /C Y /N /D Y /T 3
                3⤵
                  PID:2508
            • C:\ProgramData\SystemFiles\csrss.exe
              C:\ProgramData\SystemFiles\csrss.exe
              1⤵
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4388
              • C:\Windows\system32\conhost.exe
                C:\Windows\system32\conhost.exe
                2⤵
                  PID:216
                  • C:\ProgramData\SystemFiles\csrss.exe
                    "C:\ProgramData\SystemFiles\csrss.exe"
                    3⤵
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:2716
                    • C:\Windows\system32\conhost.exe
                      conhost.exe
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4932
                • C:\Windows\system32\conhost.exe
                  conhost.exe
                  2⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:388
              • C:\Users\Admin\AppData\Local\Temp\6DFE.exe
                C:\Users\Admin\AppData\Local\Temp\6DFE.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:4768
                • C:\Users\Admin\AppData\Local\Temp\㝺㍢㕄砸䑇扸c
                  "C:\Users\Admin\AppData\Local\Temp\㝺㍢㕄砸䑇扸c"
                  2⤵
                  • Executes dropped EXE
                  PID:4584
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 1820
                    3⤵
                    • Program crash
                    PID:972
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4584 -ip 4584
                1⤵
                  PID:3600
                • C:\Users\Admin\AppData\Local\Temp\3064.exe
                  C:\Users\Admin\AppData\Local\Temp\3064.exe
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:2684
                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    2⤵
                      PID:4364
                  • C:\Users\Admin\AppData\Local\Temp\8684.exe
                    C:\Users\Admin\AppData\Local\Temp\8684.exe
                    1⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    PID:1544
                    • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe
                      "C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"
                      2⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      PID:1384
                      • C:\Users\Admin\AppData\Local\Temp\u12g.0.exe
                        "C:\Users\Admin\AppData\Local\Temp\u12g.0.exe"
                        3⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Checks processor information in registry
                        PID:960
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\JJDBGDHIID.exe"
                          4⤵
                            PID:720
                            • C:\Users\Admin\AppData\Local\Temp\JJDBGDHIID.exe
                              "C:\Users\Admin\AppData\Local\Temp\JJDBGDHIID.exe"
                              5⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Adds Run key to start application
                              PID:3656
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\JJDBGDHIID.exe
                                6⤵
                                  PID:2820
                                  • C:\Windows\SysWOW64\PING.EXE
                                    ping 2.2.2.2 -n 1 -w 3000
                                    7⤵
                                    • Runs ping.exe
                                    PID:1000
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 960 -s 2372
                              4⤵
                              • Program crash
                              PID:232
                          • C:\Users\Admin\AppData\Local\Temp\u12g.1.exe
                            "C:\Users\Admin\AppData\Local\Temp\u12g.1.exe"
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:4624
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
                              4⤵
                                PID:1284
                                • C:\Windows\SysWOW64\chcp.com
                                  chcp 1251
                                  5⤵
                                    PID:2140
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                                    5⤵
                                    • DcRat
                                    • Creates scheduled task(s)
                                    PID:660
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 1144
                                3⤵
                                • Program crash
                                PID:4988
                            • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                              "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
                              2⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3508
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1404
                              • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                                "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
                                3⤵
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • Checks for VirtualBox DLLs, possible anti-VM trick
                                • Drops file in Windows directory
                                • Modifies data under HKEY_USERS
                                PID:3128
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -nologo -noprofile
                                  4⤵
                                  • Drops file in System32 directory
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2520
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                  4⤵
                                    PID:2468
                                    • C:\Windows\system32\netsh.exe
                                      netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                      5⤵
                                      • Modifies Windows Firewall
                                      PID:2876
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -nologo -noprofile
                                    4⤵
                                    • Drops file in System32 directory
                                    • Modifies data under HKEY_USERS
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4464
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -nologo -noprofile
                                    4⤵
                                    • Drops file in System32 directory
                                    • Modifies data under HKEY_USERS
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3948
                                  • C:\Windows\rss\csrss.exe
                                    C:\Windows\rss\csrss.exe
                                    4⤵
                                    • Executes dropped EXE
                                    • Adds Run key to start application
                                    • Manipulates WinMonFS driver.
                                    • Drops file in Windows directory
                                    PID:5044
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -nologo -noprofile
                                      5⤵
                                      • Drops file in System32 directory
                                      • Modifies data under HKEY_USERS
                                      PID:2464
                                    • C:\Windows\SYSTEM32\schtasks.exe
                                      schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                      5⤵
                                      • DcRat
                                      • Creates scheduled task(s)
                                      PID:1992
                                    • C:\Windows\SYSTEM32\schtasks.exe
                                      schtasks /delete /tn ScheduledUpdate /f
                                      5⤵
                                        PID:4776
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -nologo -noprofile
                                        5⤵
                                        • Drops file in System32 directory
                                        • Modifies data under HKEY_USERS
                                        PID:4072
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -nologo -noprofile
                                        5⤵
                                        • Drops file in System32 directory
                                        • Modifies data under HKEY_USERS
                                        PID:4056
                                      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                        C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                        5⤵
                                        • Executes dropped EXE
                                        PID:2976
                                      • C:\Windows\SYSTEM32\schtasks.exe
                                        schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                        5⤵
                                        • DcRat
                                        • Creates scheduled task(s)
                                        PID:3944
                                      • C:\Windows\windefender.exe
                                        "C:\Windows\windefender.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        PID:1792
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                          6⤵
                                            PID:2128
                                            • C:\Windows\SysWOW64\sc.exe
                                              sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                              7⤵
                                              • Launches sc.exe
                                              PID:2960
                                  • C:\Users\Admin\AppData\Local\Temp\april.exe
                                    "C:\Users\Admin\AppData\Local\Temp\april.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    PID:3320
                                    • C:\Users\Admin\AppData\Local\Temp\is-0JGE8.tmp\april.tmp
                                      "C:\Users\Admin\AppData\Local\Temp\is-0JGE8.tmp\april.tmp" /SL5="$5047A,1478464,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"
                                      3⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:4516
                                      • C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe
                                        "C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe" -i
                                        4⤵
                                        • Executes dropped EXE
                                        PID:2696
                                      • C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe
                                        "C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe" -s
                                        4⤵
                                        • Executes dropped EXE
                                        PID:692
                                • C:\Users\Admin\AppData\Local\Temp\91FF.exe
                                  C:\Users\Admin\AppData\Local\Temp\91FF.exe
                                  1⤵
                                  • Executes dropped EXE
                                  PID:1744
                                  • C:\Users\Admin\AppData\Local\Temp\is-NVFK1.tmp\91FF.tmp
                                    "C:\Users\Admin\AppData\Local\Temp\is-NVFK1.tmp\91FF.tmp" /SL5="$3024A,1643956,54272,C:\Users\Admin\AppData\Local\Temp\91FF.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:4500
                                    • C:\Users\Admin\AppData\Local\Storm Php\stormphp32.exe
                                      "C:\Users\Admin\AppData\Local\Storm Php\stormphp32.exe" -i
                                      3⤵
                                      • Executes dropped EXE
                                      PID:3624
                                    • C:\Users\Admin\AppData\Local\Storm Php\stormphp32.exe
                                      "C:\Users\Admin\AppData\Local\Storm Php\stormphp32.exe" -s
                                      3⤵
                                      • Executes dropped EXE
                                      PID:4752
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1384 -ip 1384
                                  1⤵
                                    PID:2708
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 960 -ip 960
                                    1⤵
                                      PID:3132
                                    • C:\Windows\windefender.exe
                                      C:\Windows\windefender.exe
                                      1⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      PID:3104

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\ProgramData\Are.docx

                                      Filesize

                                      11KB

                                      MD5

                                      a33e5b189842c5867f46566bdbf7a095

                                      SHA1

                                      e1c06359f6a76da90d19e8fd95e79c832edb3196

                                      SHA256

                                      5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                                      SHA512

                                      f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                                    • C:\ProgramData\SystemFiles\csrss.exe

                                      Filesize

                                      6.9MB

                                      MD5

                                      fb389ed2c216fd1f7fd1c335fc85f44b

                                      SHA1

                                      9fa15ffbafa3e17549b735a431f692f95be8e933

                                      SHA256

                                      de8d67fd0bfeb0c7ba78e642cc75df3f31613466051e884e0c02189dad60a8f2

                                      SHA512

                                      df43cf93f728edb3aba11cc8f40d85a018bb228ee26a99ffa972817af6fca25a93d7aa9a76bb9464dbeaa237ede88218efcef6141a354877b6a1594188f5eeed

                                    • C:\ProgramData\SystemFiles\csrss.exe

                                      Filesize

                                      6.1MB

                                      MD5

                                      9e9dd0562ba22b4581b592e574c709f9

                                      SHA1

                                      3fb79b06de14f149f70a353d192272626fe4a735

                                      SHA256

                                      815aaf17fac9e3c1446923230be27fb9e0e0a2128dcd2590c1791206ef9de58c

                                      SHA512

                                      0b3d487272a64e8b77a27fc630918e421ec3280c7d35a49e834a60d237a8c503f60984048803a1bd13297ddf9c6162fd4569a15d35e83bc77e36a4bdd1c6ac9d

                                    • C:\ProgramData\SystemFiles\csrss.exe

                                      Filesize

                                      2.6MB

                                      MD5

                                      55e306bebe2c81057d8558ccce6f091f

                                      SHA1

                                      b0c02653872e9935c9c930e07104d514574373d6

                                      SHA256

                                      8fe39fad30fdd27f9fe5f46034b17a9ab05ddb7e14bde736313691bf7bddd335

                                      SHA512

                                      45d4cd5a3d497d3290ea99321eaa43232c3b83fcf573138afba79e43ba79f23abe6a6b5cd936da41f719a47f7f0a88ca5737fa8f73a4f08775961ad4fa82b21c

                                    • C:\ProgramData\SystemFiles\csrss.exe

                                      Filesize

                                      4.3MB

                                      MD5

                                      b08700b4ea3c43945992e34b3c7ca8a1

                                      SHA1

                                      11958c7e84c853d294a242d16a0089fd42a7b10d

                                      SHA256

                                      66d59f4837ae226914ea96dd74a47202cb329d5535993750c4f28a1c6cb85368

                                      SHA512

                                      062f5e03534cfa1fdea793083cd545995fbc6686fdc802127b56fce26d67b88e9e97ee2f00900cd241e9b442852ad4c8a23551d5e1ad93d4bc30e433fd5c6a04

                                    • C:\ProgramData\mozglue.dll

                                      Filesize

                                      593KB

                                      MD5

                                      c8fd9be83bc728cc04beffafc2907fe9

                                      SHA1

                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                      SHA256

                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                      SHA512

                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                    • C:\ProgramData\mozglue.dll

                                      Filesize

                                      163KB

                                      MD5

                                      420a051aaeb1c899b95d65f846589dca

                                      SHA1

                                      881135c6486b132d46e2ce5bff064b8668ad77f3

                                      SHA256

                                      b777314fb730f99ff6c35103e26628eee20bf2166496318a7b9da9044f632a00

                                      SHA512

                                      d6fb8bdb79f94ff774badf81bc7551a2811e5da085b595d79f8008d98c90261faa6bdb5d2f617cfc35e5b30ab749e0b37b87366a1b6ba9297925260bc499926d

                                    • C:\ProgramData\nss3.dll

                                      Filesize

                                      576KB

                                      MD5

                                      8b744e85b34bc21d630c0669e5d457fa

                                      SHA1

                                      e646ca548d94395ccc0da91142af69417390e722

                                      SHA256

                                      b56ca41b73a778f6da5e2e6b4c747c32d184118b64f5d98d666431895baa3f11

                                      SHA512

                                      54e703f9c4cd83313f4a959dd3607e605d47e2c73757eeaccfeccb4e84b0b44bef66fe2cf831992c4f87d78b1bdcbcc68cf72ecd882d8ede1482719ef1a1221d

                                    • C:\ProgramData\rc65.dat

                                      Filesize

                                      4B

                                      MD5

                                      f2dd0dedb2c260419ece4a9e03b2e828

                                      SHA1

                                      0aaf76f425c6e0f43a36197de768e67d9e035abb

                                      SHA256

                                      26b25d457597a7b0463f9620f666dd10aa2c4373a505967c7c8d70922a2d6ece

                                      SHA512

                                      fecd7b408089255b3467dc1f7231cc6388c9e1c65dcaa5e50f3b460235d18bc44033b08184018b65ac013fdae68c0088381644a6302b9d89e468f57ff9a005dd

                                    • C:\Users\Admin\AppData\Local\Storm Php\is-7JGLT.tmp

                                      Filesize

                                      122KB

                                      MD5

                                      6231b452e676ade27ca0ceb3a3cf874a

                                      SHA1

                                      f8236dbf9fa3b2835bbb5a8d08dab3a155f310d1

                                      SHA256

                                      9941eee1cafffad854ab2dfd49bf6e57b181efeb4e2d731ba7a28f5ab27e91cf

                                      SHA512

                                      f5882a3cded0a4e498519de5679ea12a0ea275c220e318af1762855a94bdac8dc5413d1c5d1a55a7cc31cfebcf4647dcf1f653195536ce1826a3002cf01aa12c

                                    • C:\Users\Admin\AppData\Local\Storm Php\stormphp32.exe

                                      Filesize

                                      856KB

                                      MD5

                                      3ce2c4cb64ade4e937c2daa9819a95fc

                                      SHA1

                                      dd7f22e1f690bfbbc28e917b29ec01da01c618c2

                                      SHA256

                                      a99bf3d8604c60252977949a6b7be36368324c3b7b0db55d9da16bf796a1f9d8

                                      SHA512

                                      fe54569227111d6e97b7fca8b98fcb3b5a28cf982366a17a40edaa4a21194a1f2ef70085fed997b406e0403e6d2deeb26a141266033b67bcc15d27989d22ac8e

                                    • C:\Users\Admin\AppData\Local\Storm Php\stormphp32.exe

                                      Filesize

                                      14KB

                                      MD5

                                      c552651577a45ef74b5029d7e2f0fe18

                                      SHA1

                                      add5ec61cf60dede73e4c05bd5ecef112707ce95

                                      SHA256

                                      b6619b8d405978126ba853fb29f4ec37d154d4323937e3fb967730b17330d3ae

                                      SHA512

                                      84f0919c3baf4226ed599858f471a51807ff905a838de4899b4e5ff644693136d0d98fd27e399a8ef2fb2946248c94f82c4b66a30de457c1da219d7b9703dea6

                                    • C:\Users\Admin\AppData\Local\Storm Php\stormphp32.exe

                                      Filesize

                                      1.9MB

                                      MD5

                                      8c2c5dc12085aa41954570aa2cd702b8

                                      SHA1

                                      757d393669c8cc2f1dea878e7a116fcc591688fc

                                      SHA256

                                      3973bdcfae8dbc943db694e13ee182b6dd1e06ab5983c41b454cd62b0def333f

                                      SHA512

                                      90d2d41dbe747bd011be23e82d2dbf9874a38a7ab8a2cb16dfc55d6e0e3cd733a474ef8b803914e1c7a282cb9527e50aa7f629e790d03430d1103031bd316a1a

                                    • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                      Filesize

                                      1.8MB

                                      MD5

                                      aa623945e48c0db7c50bc62016704730

                                      SHA1

                                      da8e003a107cc80ea6cc818ea44b041719314968

                                      SHA256

                                      54b32240776d5fc4e35568f2c9840e04150bbbc9653841550b98cdbbc975d809

                                      SHA512

                                      cfa81366616d928cde855aa540c31e32c5b58d25db05e9d8efaefba4fe899d22c7dcbb60284045b3988a7cb678dd088755db966f202acef3cf86de7af614e0e4

                                    • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                      Filesize

                                      2.5MB

                                      MD5

                                      36e5c74739ce1d04df387cb30c6925ba

                                      SHA1

                                      83dc7e0a36d6b8b6fbc524b317da74a4f8685a3c

                                      SHA256

                                      4385944236fe6960147b379c39571b810486cf3944514a8c1c63ccb6f6fa5c89

                                      SHA512

                                      fcf26a0d596267c6958bca5689c86676c6f994202bf1aab86f23dd56daeee9bd0729632d799238e905ef41423144ff7e84e552103be23b1ccdd065a662193f1f

                                    • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                      Filesize

                                      2.1MB

                                      MD5

                                      617d46f3afcceb83e4f38435c85a9193

                                      SHA1

                                      22b677a4b4b84b8962ef09fcf152e042055a7e94

                                      SHA256

                                      9928791f4b0952630d66a2e60ef4921f276bc90204af0b5ac3b7d7d4fe11776f

                                      SHA512

                                      5c91345090bdd3285717166add3db15e9db6363cb89de0e109e487fc066cbea72615cf749747056751fce183c166cf9e98e1417ab6f0beebb6296d08bf9a3cda

                                    • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                      Filesize

                                      4.1MB

                                      MD5

                                      abc868cf6f8183990f8d476dbe1224ba

                                      SHA1

                                      b9226909d1c0472af5eabd6949232d509ecf38cb

                                      SHA256

                                      17573c321796456afc4e0fdf9eb00326636410dbbcd2c4c92495ef39a2f48924

                                      SHA512

                                      d1c1e5c11cb58430b8f9455fbbdb094fc51cdb75382b1e7d1b03c08936f553cfb73c71c9869428e8a77ad3e9de8cde15bbd733b4843cb9ed9dc394d1a160ba01

                                    • C:\Users\Admin\AppData\Local\Temp\3064.exe

                                      Filesize

                                      2.6MB

                                      MD5

                                      42a9f3e0c3055a0392c186c32b9d1bb4

                                      SHA1

                                      1335da3f3e178606a846a63fdd9ea62f7eef1da6

                                      SHA256

                                      1ac8eea09ad61d97df446c250ed794b51bc1592bfe3f60fffbdead9a8c100637

                                      SHA512

                                      a47e55126e5366a11122d3e45e3fbeab34c05835a7f8bb3f20b295186987ac095d4ab65eb3536f6254a4b894eedc110cb3805aa75e148bd9cabf88b20faad2cd

                                    • C:\Users\Admin\AppData\Local\Temp\3064.exe

                                      Filesize

                                      2.5MB

                                      MD5

                                      6dd22dc9fe3c1224806279db0dd2dc8c

                                      SHA1

                                      ee287cfc48b3cc48b8f89df6c742f8696bb9b225

                                      SHA256

                                      934dcf414eb7844c5e3456daa4c31a3879a279db41a5b36008b70047f1ffcd0b

                                      SHA512

                                      8841b634ca55e6ee00bd5de60c6c65753a3cac8306c0297438e5f15cd536e969d8e6ab7e21292081d2b18f59306c421dbcbc4d10ba5d2a10e1130122b71e474b

                                    • C:\Users\Admin\AppData\Local\Temp\5743.exe

                                      Filesize

                                      2.4MB

                                      MD5

                                      b4c77aaa26e437858f099abfdb8ee1f5

                                      SHA1

                                      c0bd1444874a16b42a5d1e22b10e0744dd0f15c6

                                      SHA256

                                      e564d98fbfb0405a28d41e54db998225decbe3574641c985f5d39d071f259f12

                                      SHA512

                                      6fce5c77a06b6ec781af4717946c6ef680e411202137d07a026a5d519c59d15fdc682aee17137cdc8dd336256abe7a8727ad248a7b33723af9225a44f3e4d034

                                    • C:\Users\Admin\AppData\Local\Temp\5743.exe

                                      Filesize

                                      2.7MB

                                      MD5

                                      3b81dfdfebfc9fe8ef2c628235ab4ab7

                                      SHA1

                                      0364d950223bbe4c656548946934820bbe57bc6f

                                      SHA256

                                      b99061d7551600cd55733eddf4a5e3e48fc856855a5c90d427d161bbce839d1c

                                      SHA512

                                      5f094c7ad7ea2ccff66a7cffe1813941a048ad29bf7a83f4091697e8b1c6418a1104ce5a61547998330bb7652968bfc32a4e38a1789f9f6cc48b72d1b5bd7708

                                    • C:\Users\Admin\AppData\Local\Temp\6DFE.exe

                                      Filesize

                                      258KB

                                      MD5

                                      fb7d7239d00d4f28dacb1af390061517

                                      SHA1

                                      1ec0c1fbf666ba9a2c40b2f5a555035e0f89a53a

                                      SHA256

                                      ca87c7d4d0793caa2f79b7503d8e08b8b20dc2234492d35396fd118c277c565c

                                      SHA512

                                      91400915a3f9d771fa85408b2c65078d9ea1aab4fe141e21f302448f26b5c8734ab4936cdd9c93ef44a02eb76833d83fc32359460a2b1d5de9393fcec4f25bf9

                                    • C:\Users\Admin\AppData\Local\Temp\6DFE.exe

                                      Filesize

                                      194KB

                                      MD5

                                      440d300fe8047bed52f06e3e001569be

                                      SHA1

                                      892458b31b09bc38adf4316e188e6d7525485073

                                      SHA256

                                      4c5b67bc04466b44c33532a98759b315293712fb122c1ea4f276f1acee20f6e8

                                      SHA512

                                      5d2a9148aa5c7495d29ffd468c15946eb2a73b5cb284bd82b029985c3b0a040c7dab94c1391891a2679831d1c356fc9f7a2c7c1fc69afea3ded52921a4aab17e

                                    • C:\Users\Admin\AppData\Local\Temp\8684.exe

                                      Filesize

                                      2.1MB

                                      MD5

                                      1cdd589d8a2441ae48cbf2a2b3a4b971

                                      SHA1

                                      f86c0dd29a5b07a50d9397f74a03ef1aabdec3df

                                      SHA256

                                      f47ae060b95211ccdffa19acdd3f26964f40b39fa288a8f6a469964a96125f3b

                                      SHA512

                                      00053cb50dae4403f5f00dc027c1d539d9a99934d37052afd5a4568227e02f83dacf5c45aa1899381331b3ae0eb5f3f3a06da2f7fde7a6da1f15eb645b0be74d

                                    • C:\Users\Admin\AppData\Local\Temp\8684.exe

                                      Filesize

                                      1.7MB

                                      MD5

                                      a55ed7550e830248e3e7837fe689827c

                                      SHA1

                                      b3cc4c0ed2ddbf41bfb3530de93d1859773a9475

                                      SHA256

                                      bf30679ec471705adfe136a75aea30d5598641803fbf5ae158011b332c28cb18

                                      SHA512

                                      42b181075dbc5b82d320f5b3928934bebfbacce8b4304c62e27e46993dc48ce59c91065a75872aa76aa7416a84a4ec846da489b5490fe7ba0008ba075b5ab637

                                    • C:\Users\Admin\AppData\Local\Temp\91FF.exe

                                      Filesize

                                      1.9MB

                                      MD5

                                      12c0e9872b1f975e014f6971d2901b9c

                                      SHA1

                                      2747af2fa099a3e2897c98d0c2ae10efb91ffcbf

                                      SHA256

                                      9b1882e78875196fcc56470994ba043b2109f7ebd2871905b1f13b286749cf8f

                                      SHA512

                                      9d1a769091c52ba380be7e08bb63669dd7298c3de8395f8a469f23a9bfb638359d1b422d3fc2db6fa320210c883862f2ed9662a678fe72c0c685209d1bc5411f

                                    • C:\Users\Admin\AppData\Local\Temp\91FF.exe

                                      Filesize

                                      1.5MB

                                      MD5

                                      113c4e7ec5d8998d0807672525d1d67a

                                      SHA1

                                      676778e5518ce38d603d4e2b7930358de4b00fbb

                                      SHA256

                                      4e33f47a4dcfefa9714d67b91fc09e15add44db0ea66a0bfd7f0c4b977f66899

                                      SHA512

                                      db71c9c10ab8b32968961358bcf94b6a24ab6d260864158406b9b9b61ce977f1349c0dc720929800506f2c9d51e1a31fbbff9eec9fb4691cd367ab6c5cf6fec1

                                    • C:\Users\Admin\AppData\Local\Temp\B99.exe

                                      Filesize

                                      5.9MB

                                      MD5

                                      a3ff8b9c8da4315f1188fc97649b3ad1

                                      SHA1

                                      a33e754466f63412733e61883d8f3e50ea59e41a

                                      SHA256

                                      d7734cbccd3a3d77cf3a2d29ab01f1a7e33360fc1ecd5eacdf0bacd24ce967b9

                                      SHA512

                                      ecae64af1675f9620c30cbd65c0a7e9a6a84b1db165b10fbb87a06fc4c873e93e6b7155002214f8446875c269272ef1f6c944628ddbadc9d6df425cf2ed52dd8

                                    • C:\Users\Admin\AppData\Local\Temp\B99.exe

                                      Filesize

                                      5.4MB

                                      MD5

                                      94747f53ec89cd6dc330c01cfaf3fa6b

                                      SHA1

                                      5d5e438442692f30a68f32906c64f6a9c46bd803

                                      SHA256

                                      55733ad32d880c6d944a88e2393751e06e99fbaf8d0bf71566d136213de01872

                                      SHA512

                                      c9d2430817526faf40526f5c364b08aa58ca686e1a513f3444f753ad903aad242c05d0162d10d54f29df0a6e2a7b40cd7af815851d35e20872e4ac5e02835e7f

                                    • C:\Users\Admin\AppData\Local\Temp\C36B.dll

                                      Filesize

                                      2.9MB

                                      MD5

                                      441e0b373665cbb5c31b83046144c19f

                                      SHA1

                                      d8df44336a6933c8bbc8ef3e7417771a04bdf72c

                                      SHA256

                                      cf5db7b441e8c5c899f808436d53848b2d37ba3167776902e3ad94a2629f7b30

                                      SHA512

                                      e9afa8a09a5b9b32562c10c28348cac3bb25da25dff6bb638f2c1460ceb8ec517a1a291fbd2066de938adbce5787e068bf1454cd63f2113942bdca160aca2d96

                                    • C:\Users\Admin\AppData\Local\Temp\CBC5.exe

                                      Filesize

                                      6.0MB

                                      MD5

                                      754c89bb86b1dcfa3439879b90a0454d

                                      SHA1

                                      e208b934cee6006237c378d5afc8b382f93e2217

                                      SHA256

                                      9047c1300c1738def1558c1589c3010544b913871ba1db0a029bee7d900b67cc

                                      SHA512

                                      618857849c8020c9bd8104f1d7b26913615a4fe5d9f52d07979d52d663ace5ea8cb683ad0165c91bc5641fbb2d67030428bc80850abcb44d77d604b8dd14371f

                                    • C:\Users\Admin\AppData\Local\Temp\D270.exe

                                      Filesize

                                      554KB

                                      MD5

                                      a1b5ee1b9649ab629a7ac257e2392f8d

                                      SHA1

                                      dc1b14b6d57589440fb3021c9e06a3e3191968dc

                                      SHA256

                                      2bfd95260a4c52d4474cd51e74469fc3de94caed28937ff0ce99ded66af97e65

                                      SHA512

                                      50ccbb9fd4ea2da847c6be5988e1e82e28d551b06cc9122b921dbd40eff4b657a81a010cea76f29e88fda06f8c053090b38d04eb89a6d63ec4f42ef68b1cf82b

                                    • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe

                                      Filesize

                                      366KB

                                      MD5

                                      f98c75a2502a2f5251b262e4aeaf1c16

                                      SHA1

                                      0edb55ec7e7768a39f1bf37dc27aecd04507f63c

                                      SHA256

                                      392ff6fc0a544611919098a630cebfd47ecd210cdc34c97081bfe31c938ba67c

                                      SHA512

                                      b05969d381c66f06b3ec8af2a76312e3bf6cef34e84ef062685a16062ee50f0aa198a8d2d7641939ec2c66f08e3439357f15087eb51a7ef1b63a6683a129bd58

                                    • C:\Users\Admin\AppData\Local\Temp\JJDBGDHIID.exe

                                      Filesize

                                      101KB

                                      MD5

                                      42b838cf8bdf67400525e128d917f6e0

                                      SHA1

                                      a578f6faec738912dba8c41e7abe1502c46d0cae

                                      SHA256

                                      0e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d

                                      SHA512

                                      f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0

                                    • C:\Users\Admin\AppData\Local\Temp\Protect544cd51a.dll

                                      Filesize

                                      742KB

                                      MD5

                                      544cd51a596619b78e9b54b70088307d

                                      SHA1

                                      4769ddd2dbc1dc44b758964ed0bd231b85880b65

                                      SHA256

                                      dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd

                                      SHA512

                                      f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_og5yndan.xdw.ps1

                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • C:\Users\Admin\AppData\Local\Temp\april.exe

                                      Filesize

                                      1.6MB

                                      MD5

                                      55b6c10a35399e2e8b25a4d7bf21a9b5

                                      SHA1

                                      f50fcc707bbdeb121d33f1e76e915fc98541e798

                                      SHA256

                                      af55ab0993c59466b348f0cf0fc05f606910ed19fe81c1f04b5e19d885a3aecd

                                      SHA512

                                      0ea5159ee941371c3f4b3f7dbe23e80ac97c510799bb9e96c32417f0767cafdec4d13c34f55bcb26223e0457ac2d234b87bd1e0d6c079f9833c5620c2255149e

                                    • C:\Users\Admin\AppData\Local\Temp\april.exe

                                      Filesize

                                      896KB

                                      MD5

                                      909cc21ca77aa84e90637926823577f4

                                      SHA1

                                      68a104ee3641a29e53e03533bb9ca7c3b32e9cc3

                                      SHA256

                                      0a10223f76ff767f6dda39493d1f8d94c53e01c03e5e0c8669865bf32ead78d6

                                      SHA512

                                      1b596d8603cb10bf87ce266346e43b1e9d8f0eaa78256314542c923d05c9d6eea2082f2ce40649170961a3519f16530908d1d4fffd13535cfe5494b785e15709

                                    • C:\Users\Admin\AppData\Local\Temp\april.exe

                                      Filesize

                                      1.2MB

                                      MD5

                                      5ea8a2c88594f2ca90100e2197789f06

                                      SHA1

                                      03fe75e3631cfa435ea4aa49b9d16d3256ee23f8

                                      SHA256

                                      4fba01cc0930ab66f5c3ed21464227a1978e08e4ea7aa867e95fdf457e772836

                                      SHA512

                                      049080527c7404c9b835924143c39888aa31353477b9ecb9f7447efb6e33a7a404e20881fd754d8ee9e23df93d6405b514e4e5f507766376bd3d9e44b3b5adc8

                                    • C:\Users\Admin\AppData\Local\Temp\is-0JGE8.tmp\april.tmp

                                      Filesize

                                      256KB

                                      MD5

                                      953c00d92ff1336d1db8052616abfa74

                                      SHA1

                                      038efbda17bc77980d505398425211776ded2f4a

                                      SHA256

                                      87b0950dda8f940b7d5765c91a2915524011754c448e1a2f28c9e330ee425fb9

                                      SHA512

                                      2b2d35676d1f858aa6cf78c1a517cfe9e997c7e79ddcbba28ac5a8fed9bc101cb42cc6f814aa290a9960b6af7a98210d71023ff893d9866a6bf8d916cd96705d

                                    • C:\Users\Admin\AppData\Local\Temp\is-0JGE8.tmp\april.tmp

                                      Filesize

                                      192KB

                                      MD5

                                      115eab531930265a00fb23e55fc31990

                                      SHA1

                                      2de77c75b43892aa0d7511e3a99b8f9848827786

                                      SHA256

                                      744418eaaf23c708479a42a57e1c17d792dd6714b4478d8e856f07b65b8dacf9

                                      SHA512

                                      38c86b40e56251aa4dace68bb98ec6b49b9d5eedd2aa7686323fc32ccd6302740038aa573ab27af425a62870a87d0facaacaa01864956354efdb22b154bbc58b

                                    • C:\Users\Admin\AppData\Local\Temp\is-9390E.tmp\_isetup\_iscrypt.dll

                                      Filesize

                                      2KB

                                      MD5

                                      a69559718ab506675e907fe49deb71e9

                                      SHA1

                                      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                      SHA256

                                      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                      SHA512

                                      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                    • C:\Users\Admin\AppData\Local\Temp\is-IETIR.tmp\_isetup\_shfoldr.dll

                                      Filesize

                                      22KB

                                      MD5

                                      92dc6ef532fbb4a5c3201469a5b5eb63

                                      SHA1

                                      3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                      SHA256

                                      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                      SHA512

                                      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                    • C:\Users\Admin\AppData\Local\Temp\u12g.0.exe

                                      Filesize

                                      221KB

                                      MD5

                                      f2f1385bc802279c033efe2ab64867c4

                                      SHA1

                                      c6a01b873e5b77232e1523c1e1df3fae02aee18c

                                      SHA256

                                      cd4734f9192d1094da769a96899e9e9a45b4c63c02cde51d1ec6f788f0d12d2d

                                      SHA512

                                      a84af2fedf5be38950c30426991b622598515a379d946e806cadf5be7e95884bd8afca7edc9f76b13bbef5c251c2e21481768484f77016909b829534700294a7

                                    • C:\Users\Admin\AppData\Local\Temp\u12g.1.exe

                                      Filesize

                                      1.7MB

                                      MD5

                                      eee5ddcffbed16222cac0a1b4e2e466e

                                      SHA1

                                      28b40c88b8ea50b0782e2bcbb4cc0f411035f3d5

                                      SHA256

                                      2a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54

                                      SHA512

                                      8f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc

                                    • C:\Users\Admin\AppData\Local\Temp\㝺㍢㕄砸䑇扸c

                                      Filesize

                                      38KB

                                      MD5

                                      3992f464696b0eeff236aef93b1fdbd5

                                      SHA1

                                      8dddabaea6b342efc4f5b244420a0af055ae691e

                                      SHA256

                                      0d1a8457014f2eb2563a91d1509dba38f6c418fedf5f241d8579d15a93e40e14

                                      SHA512

                                      27a63b43dc50faf4d9b06e10daa15e83dfb3f3be1bd3af83ea6990bd8ae6d3a6a7fc2f928822db972aaf1305970f4587d768d68cd7e1124bc8f710c1d3ee19a6

                                    • C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe

                                      Filesize

                                      1.5MB

                                      MD5

                                      63ea0347e1fe9e7e316dd4cee2955e37

                                      SHA1

                                      2cb8fb83e0132dfa005f0d67cc0addeffb66ee03

                                      SHA256

                                      5c889633d065ff47815ccab303228bf08f2b882a5298eacc015ca03de2feeadc

                                      SHA512

                                      e62cee8e175b2bf9b9142a8c3ec634508770459c8d9c6abea8470ef9f3eda3f46f987db1f6931a70cf56a3885ad6400ddb6a40c93d18e53996cf72ff7cf93d2b

                                    • C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe

                                      Filesize

                                      576KB

                                      MD5

                                      7bad3244ac981f97cdc4fd97d96f402d

                                      SHA1

                                      76d16114dc353d35157079f2f0c204fec47acc0e

                                      SHA256

                                      78d1444a6510936d45e1dc00dbbac25cebacfc23be2b0874734d2cd88468d0f1

                                      SHA512

                                      99fd8d820be5b9589fa4473720f9706dc8adc7122a293bcfdb726552e25140f47f0569e4669ac6f32d5581510b046966405ec3022e7818be27bce490f8d174ae

                                    • C:\Users\Admin\AppData\Roaming\Temp\Task.bat

                                      Filesize

                                      128B

                                      MD5

                                      11bb3db51f701d4e42d3287f71a6a43e

                                      SHA1

                                      63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                                      SHA256

                                      6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                                      SHA512

                                      907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

                                    • C:\Users\Admin\AppData\Roaming\digvhbv

                                      Filesize

                                      209KB

                                      MD5

                                      2cb4d9235c8edfaeeedf9258177cec57

                                      SHA1

                                      401520c963a302e4df292c032416febec06e5666

                                      SHA256

                                      d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278

                                      SHA512

                                      5d1059c1618e8cf1645a7775da743b02ef387d249c6b263e20ade68362ee06e43548293c1bb224719014618458b6bb6b00c7664fbea97b2414976ce980a8d950

                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                      Filesize

                                      2KB

                                      MD5

                                      968cb9309758126772781b83adb8a28f

                                      SHA1

                                      8da30e71accf186b2ba11da1797cf67f8f78b47c

                                      SHA256

                                      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                      SHA512

                                      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                      Filesize

                                      19KB

                                      MD5

                                      c5fc920bd798adf2ba1d7a21939420ca

                                      SHA1

                                      156d18cf971ebbb7c718e3ffa2999267b0a21071

                                      SHA256

                                      21bbdeed04bdd90b06d782c882165d8025942f8e5550aa85d009fd11b2e63442

                                      SHA512

                                      0381c2cede613c4e93024b81636fbb44d76f8e8de1cdaf00dee948bb942430edfc85ebece856aec93200989f186d181304ac6e09744321443fc3f190c0a293f3

                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                      Filesize

                                      19KB

                                      MD5

                                      8234490132f4e16500172b6ddc2ed770

                                      SHA1

                                      749f1715e03c9954bc9015d73f2ea1b8be6b0218

                                      SHA256

                                      19b83a120748d3f30d2cc5f8e1b6614f8840cdf893ac740ea2aa5ebb12605832

                                      SHA512

                                      9b1ce3ce60628f1d0464b6f1568be5ca622de6362a79fcb032b860d64ed1538933617060925d4c78d9d0c4e3d378f0b643e6ed917c0f9706e98fd2bb4f6f659a

                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                      Filesize

                                      19KB

                                      MD5

                                      eb4bd6583b07f9323a3ba87daaf45db3

                                      SHA1

                                      716fe80cee1fe6ee9fb3e5302486aa1c7732ff46

                                      SHA256

                                      d441f82eeec320fb839bedeeb0a487b90fd99baf4cfef49fc772c6772c733681

                                      SHA512

                                      79fdec88830544f1c54f9c7cb87369ca1af139a6ccbaa1545f3f45af3f6352b4294bbcacb58b5843b9b1afb721157375c1ced653121003a95279d8b387320204

                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                      Filesize

                                      19KB

                                      MD5

                                      e545a97c0510dc4b042aeebc382c3a82

                                      SHA1

                                      5c3fc25125c89d4fb8da81ef8135ad9175b371da

                                      SHA256

                                      b8946f680b10c6c7f1880bfafef4c2cb2e6b9a9a4e73688fd1e8ba7909951549

                                      SHA512

                                      11e253b02860654d24cc180c4686e55ba87fd0de07e17a17d78c2c1f2769d60dbc09b6096132ce06339ec47c70921068f54ccd4ec6f83254025e3041fd596017

                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                      Filesize

                                      19KB

                                      MD5

                                      9ad435167f6ca6ebbe8d0e9feef916a1

                                      SHA1

                                      2387de60e066e3b509b2842007a65e10659c00bc

                                      SHA256

                                      2f5cf56ba962a09ca98097d5d5a9046a1213f2bebf3bb75da91b52e04d7fcb45

                                      SHA512

                                      60c6194b77cfa090089b8929a0526693ff49f00bd81f8b3ab9ecd544d37331a06dcf2d88b6fffba85b5368524831200595e8b6579eb38055a3da9e780a1174e4

                                    • C:\Windows\TEMP\yolphbxftzqb.sys

                                      Filesize

                                      14KB

                                      MD5

                                      0c0195c48b6b8582fa6f6373032118da

                                      SHA1

                                      d25340ae8e92a6d29f599fef426a2bc1b5217299

                                      SHA256

                                      11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5

                                      SHA512

                                      ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d

                                    • C:\Windows\rss\csrss.exe

                                      Filesize

                                      2.6MB

                                      MD5

                                      df190521162efa8ce7216c58eb9fc1d4

                                      SHA1

                                      d3dded830143c8cf6595ed4b544cedd390166872

                                      SHA256

                                      05333e7484646c7d9ae1441abe5b4d968694936da36f295685712a7386004db2

                                      SHA512

                                      9d45fabaa9a6fa843c1b26edf5e046237017d34712de29177e5b3309b34f01a75db1d2e99b2bb43b22a1f1cb83bb464d9534440773f50be02877188897c999b3

                                    • C:\Windows\rss\csrss.exe

                                      Filesize

                                      2.7MB

                                      MD5

                                      f7f1d61ee3e8ec8ad87605be88ca7ea1

                                      SHA1

                                      e0defcd3a5436ed613f87d932be720aa825f680a

                                      SHA256

                                      d871497296bb83c0e5a9e8ae81a077dc6eb9a50d7a953d2031d12aa97c6cf082

                                      SHA512

                                      769a7773403d9fbe5ed7f78ffdbc9552a3e1f5cec7739a155514ab7ea95a9388aa8c91f88e2ffd3f110fac57c573e391b61d031411b5b04f38cbde1bbc60e512

                                    • \??\c:\users\admin\appdata\local\temp\is-nvfk1.tmp\91ff.tmp

                                      Filesize

                                      677KB

                                      MD5

                                      246d2d67c9b6c276597b936347d66273

                                      SHA1

                                      2a1994f6b6fbbb4948e40bc75bfb038c778855b8

                                      SHA256

                                      4e5ca184b8077fc2aa07e18dc4e6e82eda07eaf93eb4ebd25f3cc618ab57789e

                                      SHA512

                                      c6bfe9232aee3b0d3a6a569b85b9d6ff22bb5099b494341c49cfdbc7b3b1018a669da058fcaf4f4bbc73146c668093b906ab6a1b062fd19ed754e6fdab7afc92

                                    • memory/216-143-0x0000000140000000-0x000000014000D000-memory.dmp

                                      Filesize

                                      52KB

                                    • memory/216-141-0x0000000140000000-0x000000014000D000-memory.dmp

                                      Filesize

                                      52KB

                                    • memory/216-140-0x0000000140000000-0x000000014000D000-memory.dmp

                                      Filesize

                                      52KB

                                    • memory/216-142-0x0000000140000000-0x000000014000D000-memory.dmp

                                      Filesize

                                      52KB

                                    • memory/216-144-0x0000000140000000-0x000000014000D000-memory.dmp

                                      Filesize

                                      52KB

                                    • memory/388-272-0x0000000140000000-0x0000000141123000-memory.dmp

                                      Filesize

                                      17.1MB

                                    • memory/388-171-0x0000000140000000-0x0000000141123000-memory.dmp

                                      Filesize

                                      17.1MB

                                    • memory/944-36-0x0000000002880000-0x0000000002886000-memory.dmp

                                      Filesize

                                      24KB

                                    • memory/944-37-0x0000000010000000-0x00000000102F2000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/944-78-0x0000000002B30000-0x0000000002C52000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/944-77-0x0000000002B30000-0x0000000002C52000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/944-74-0x0000000002B30000-0x0000000002C52000-memory.dmp

                                      Filesize

                                      1.1MB

                                    • memory/944-73-0x00000000029E0000-0x0000000002B20000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1332-64-0x00000000747F0000-0x0000000074FA0000-memory.dmp

                                      Filesize

                                      7.7MB

                                    • memory/1332-65-0x0000000005740000-0x0000000005750000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1332-29-0x00000000747F0000-0x0000000074FA0000-memory.dmp

                                      Filesize

                                      7.7MB

                                    • memory/1332-30-0x0000000000390000-0x0000000000866000-memory.dmp

                                      Filesize

                                      4.8MB

                                    • memory/1332-31-0x00000000052B0000-0x000000000534C000-memory.dmp

                                      Filesize

                                      624KB

                                    • memory/1332-32-0x00000000747F0000-0x0000000074FA0000-memory.dmp

                                      Filesize

                                      7.7MB

                                    • memory/1332-44-0x0000000005750000-0x00000000058E2000-memory.dmp

                                      Filesize

                                      1.6MB

                                    • memory/1332-52-0x0000000005710000-0x0000000005720000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1332-58-0x0000000005740000-0x0000000005750000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1332-61-0x0000000005740000-0x0000000005750000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1332-63-0x0000000005740000-0x0000000005750000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1332-55-0x0000000005740000-0x0000000005750000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1332-57-0x0000000005740000-0x0000000005750000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1544-301-0x0000000000B70000-0x00000000011B4000-memory.dmp

                                      Filesize

                                      6.3MB

                                    • memory/1544-351-0x00000000747F0000-0x0000000074FA0000-memory.dmp

                                      Filesize

                                      7.7MB

                                    • memory/1544-302-0x00000000747F0000-0x0000000074FA0000-memory.dmp

                                      Filesize

                                      7.7MB

                                    • memory/1744-330-0x0000000000400000-0x0000000000414000-memory.dmp

                                      Filesize

                                      80KB

                                    • memory/2016-69-0x0000000001670000-0x00000000016A2000-memory.dmp

                                      Filesize

                                      200KB

                                    • memory/2016-68-0x0000000001670000-0x00000000016A2000-memory.dmp

                                      Filesize

                                      200KB

                                    • memory/2016-56-0x0000000000400000-0x000000000044B000-memory.dmp

                                      Filesize

                                      300KB

                                    • memory/2016-93-0x0000000001670000-0x00000000016A2000-memory.dmp

                                      Filesize

                                      200KB

                                    • memory/2016-92-0x0000000000400000-0x000000000044B000-memory.dmp

                                      Filesize

                                      300KB

                                    • memory/2016-66-0x0000000001670000-0x00000000016A2000-memory.dmp

                                      Filesize

                                      200KB

                                    • memory/2016-67-0x0000000001670000-0x00000000016A2000-memory.dmp

                                      Filesize

                                      200KB

                                    • memory/2016-62-0x0000000000400000-0x000000000044B000-memory.dmp

                                      Filesize

                                      300KB

                                    • memory/2016-85-0x0000000001670000-0x00000000016A2000-memory.dmp

                                      Filesize

                                      200KB

                                    • memory/2016-88-0x0000000001670000-0x00000000016A2000-memory.dmp

                                      Filesize

                                      200KB

                                    • memory/2016-87-0x0000000001670000-0x00000000016A2000-memory.dmp

                                      Filesize

                                      200KB

                                    • memory/2016-71-0x0000000001670000-0x00000000016A2000-memory.dmp

                                      Filesize

                                      200KB

                                    • memory/2016-70-0x0000000000400000-0x000000000044B000-memory.dmp

                                      Filesize

                                      300KB

                                    • memory/2016-86-0x0000000001670000-0x00000000016A2000-memory.dmp

                                      Filesize

                                      200KB

                                    • memory/2696-416-0x0000000000400000-0x00000000005AA000-memory.dmp

                                      Filesize

                                      1.7MB

                                    • memory/2696-414-0x0000000000400000-0x00000000005AA000-memory.dmp

                                      Filesize

                                      1.7MB

                                    • memory/2716-222-0x00007FF7FC530000-0x00007FF7FD00B000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/2716-200-0x00007FF7FC530000-0x00007FF7FD00B000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/2792-134-0x00007FF72EE60000-0x00007FF72F93B000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/2792-136-0x00007FF72EE60000-0x00007FF72F93B000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/3256-17-0x0000000002B70000-0x0000000002B86000-memory.dmp

                                      Filesize

                                      88KB

                                    • memory/3256-94-0x0000000002A30000-0x0000000002A46000-memory.dmp

                                      Filesize

                                      88KB

                                    • memory/3320-346-0x0000000000400000-0x0000000000414000-memory.dmp

                                      Filesize

                                      80KB

                                    • memory/3624-428-0x0000000000400000-0x00000000005F0000-memory.dmp

                                      Filesize

                                      1.9MB

                                    • memory/3624-427-0x0000000000400000-0x00000000005F0000-memory.dmp

                                      Filesize

                                      1.9MB

                                    • memory/3664-19-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/3664-4-0x0000000000710000-0x0000000000810000-memory.dmp

                                      Filesize

                                      1024KB

                                    • memory/3664-6-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/3664-5-0x0000000000500000-0x000000000050B000-memory.dmp

                                      Filesize

                                      44KB

                                    • memory/3856-14-0x000001FE2C140000-0x000001FE2C141000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3856-1-0x000001FE2C140000-0x000001FE2C141000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3856-3-0x000001FE2C140000-0x000001FE2C141000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3856-2-0x000001FE2C140000-0x000001FE2C141000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3856-10-0x000001FE2C140000-0x000001FE2C141000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3856-16-0x000001FE2C140000-0x000001FE2C141000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3856-11-0x000001FE2C140000-0x000001FE2C141000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3856-12-0x000001FE2C140000-0x000001FE2C141000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3856-15-0x000001FE2C140000-0x000001FE2C141000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3856-13-0x000001FE2C140000-0x000001FE2C141000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4364-312-0x0000000001290000-0x00000000012DB000-memory.dmp

                                      Filesize

                                      300KB

                                    • memory/4364-399-0x0000000001290000-0x00000000012DB000-memory.dmp

                                      Filesize

                                      300KB

                                    • memory/4388-163-0x00007FF71ACC0000-0x00007FF71B79B000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/4388-139-0x00007FF71ACC0000-0x00007FF71B79B000-memory.dmp

                                      Filesize

                                      10.9MB

                                    • memory/4500-355-0x0000000000630000-0x0000000000631000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4516-374-0x0000000000620000-0x0000000000621000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4556-54-0x0000000000400000-0x0000000001A77000-memory.dmp

                                      Filesize

                                      22.5MB

                                    • memory/4556-53-0x0000000000400000-0x0000000001A77000-memory.dmp

                                      Filesize

                                      22.5MB

                                    • memory/4556-79-0x0000000000400000-0x0000000001A77000-memory.dmp

                                      Filesize

                                      22.5MB

                                    • memory/4556-81-0x0000000001CE0000-0x0000000001DE0000-memory.dmp

                                      Filesize

                                      1024KB

                                    • memory/4556-46-0x0000000001C30000-0x0000000001C9B000-memory.dmp

                                      Filesize

                                      428KB

                                    • memory/4556-45-0x0000000001CE0000-0x0000000001DE0000-memory.dmp

                                      Filesize

                                      1024KB

                                    • memory/4584-279-0x0000000000400000-0x0000000000644000-memory.dmp

                                      Filesize

                                      2.3MB

                                    • memory/4584-273-0x0000000000400000-0x0000000000644000-memory.dmp

                                      Filesize

                                      2.3MB

                                    • memory/4792-109-0x00000000005F0000-0x000000000113E000-memory.dmp

                                      Filesize

                                      11.3MB

                                    • memory/4792-111-0x0000000001530000-0x0000000001531000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4792-120-0x0000000001550000-0x0000000001551000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4792-106-0x00000000011D0000-0x00000000011D1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4792-119-0x0000000001550000-0x0000000001551000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4792-118-0x00000000005F0000-0x000000000113E000-memory.dmp

                                      Filesize

                                      11.3MB

                                    • memory/4792-112-0x0000000001540000-0x0000000001541000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4792-113-0x00000000005F0000-0x000000000113E000-memory.dmp

                                      Filesize

                                      11.3MB

                                    • memory/4792-122-0x00000000005F0000-0x000000000113E000-memory.dmp

                                      Filesize

                                      11.3MB

                                    • memory/4792-110-0x0000000001520000-0x0000000001521000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4792-108-0x00000000011F0000-0x00000000011F1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4792-107-0x00000000011E0000-0x00000000011E1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4932-280-0x0000000140000000-0x0000000141123000-memory.dmp

                                      Filesize

                                      17.1MB

                                    • memory/4932-231-0x0000000140000000-0x0000000141123000-memory.dmp

                                      Filesize

                                      17.1MB

                                    • memory/4944-95-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/4944-89-0x0000000000700000-0x0000000000800000-memory.dmp

                                      Filesize

                                      1024KB

                                    • memory/4944-90-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB