Resubmissions

19-03-2024 10:46

240319-mvcmcsah4t 10

18-03-2024 12:09

240318-pbenqagc97 10

17-03-2024 13:27

240317-qqh55afc93 10

17-03-2024 02:17

240317-cqtd7scf2x 10

Analysis

  • max time kernel
    432s
  • max time network
    467s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    18-03-2024 12:09

General

  • Target

    d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe

  • Size

    209KB

  • MD5

    2cb4d9235c8edfaeeedf9258177cec57

  • SHA1

    401520c963a302e4df292c032416febec06e5666

  • SHA256

    d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278

  • SHA512

    5d1059c1618e8cf1645a7775da743b02ef387d249c6b263e20ade68362ee06e43548293c1bb224719014618458b6bb6b00c7664fbea97b2414976ce980a8d950

  • SSDEEP

    3072:M4GZjvkqp4C/Khv97mrvw1F0Dz1yL9w1RBeg8+/yGYV:nGlvkqp4RSTwQwkRBeA

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://selebration17io.io/index.php

http://vacantion18ffeu.cc/index.php

http://valarioulinity1.net/index.php

http://buriatiarutuhuob.net/index.php

http://cassiosssionunu.me/index.php

http://sulugilioiu19.net/index.php

http://goodfooggooftool.net/index.php

http://nidoe.org/tmp/index.php

http://sodez.ru/tmp/index.php

http://uama.com.ua/tmp/index.php

http://talesofpirates.net/tmp/index.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

socks5systemz

C2

http://botablb.com/search/?q=67e28dd83f0bf1291606a9177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978f171ea771795af8e05c647db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923a6789f912c9ea96

http://botablb.com/search/?q=67e28dd83f0bf1291606a9177c27d78406abdd88be4b12eab517aa5c96bd86e99d824a815a8bbc896c58e713bc90c91836b5281fc235a925ed3e52d6bd974a95129070b614e96cc92be20ea778c255bbe258b90d3b4eed3233d1626a8ff810c0e8939932c86c

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 6 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socks5Systemz

    Socks5Systemz is a botnet written in C++.

  • Stealc

    Stealc is an infostealer written in C++.

  • Windows security bypass 2 TTPs 7 IoCs
  • Modifies boot configuration data using bcdedit 14 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 24 IoCs
  • Loads dropped DLL 48 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe
    "C:\Users\Admin\AppData\Local\Temp\d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1148
  • C:\Windows\system32\msinfo32.exe
    "C:\Windows\system32\msinfo32.exe" "C:\Users\Admin\Desktop\ResetResume.nfo"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1304
  • C:\Users\Admin\AppData\Local\Temp\7BE4.exe
    C:\Users\Admin\AppData\Local\Temp\7BE4.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 560
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:1160
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2516
    • C:\Windows\system32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\AC57.dll
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Windows\SysWOW64\regsvr32.exe
        /s C:\Users\Admin\AppData\Local\Temp\AC57.dll
        2⤵
        • Loads dropped DLL
        PID:2184
    • C:\Users\Admin\AppData\Local\Temp\CA43.exe
      C:\Users\Admin\AppData\Local\Temp\CA43.exe
      1⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      PID:2504
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {0FAEF3F9-4927-4957-9594-448DFC632BCA} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Users\Admin\AppData\Roaming\dwvcuge
        C:\Users\Admin\AppData\Roaming\dwvcuge
        2⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:1128
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4779758,0x7fef4779768,0x7fef4779778
        2⤵
          PID:1756
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1128 --field-trial-handle=1364,i,421118625642994123,15908665286568441015,131072 /prefetch:2
          2⤵
            PID:1696
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1364,i,421118625642994123,15908665286568441015,131072 /prefetch:8
            2⤵
              PID:980
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1364,i,421118625642994123,15908665286568441015,131072 /prefetch:8
              2⤵
                PID:1644
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1364,i,421118625642994123,15908665286568441015,131072 /prefetch:1
                2⤵
                  PID:572
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2252 --field-trial-handle=1364,i,421118625642994123,15908665286568441015,131072 /prefetch:1
                  2⤵
                    PID:2412
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3448 --field-trial-handle=1364,i,421118625642994123,15908665286568441015,131072 /prefetch:2
                    2⤵
                      PID:2208
                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                    1⤵
                      PID:2104
                    • C:\Users\Admin\AppData\Local\Temp\5988.exe
                      C:\Users\Admin\AppData\Local\Temp\5988.exe
                      1⤵
                      • Executes dropped EXE
                      PID:2172
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 124
                        2⤵
                        • Loads dropped DLL
                        • Program crash
                        PID:2028
                    • C:\Users\Admin\AppData\Local\Temp\7D5E.exe
                      C:\Users\Admin\AppData\Local\Temp\7D5E.exe
                      1⤵
                      • Executes dropped EXE
                      • Checks SCSI registry key(s)
                      • Suspicious behavior: MapViewOfSection
                      PID:2376
                    • C:\Windows\explorer.exe
                      "C:\Windows\explorer.exe"
                      1⤵
                        PID:1604
                      • C:\Windows\SysWOW64\DllHost.exe
                        C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                        1⤵
                          PID:2932
                        • C:\Users\Admin\AppData\Local\Temp\B070.exe
                          C:\Users\Admin\AppData\Local\Temp\B070.exe
                          1⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:5060
                          • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe
                            "C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"
                            2⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:1036
                            • C:\Users\Admin\AppData\Local\Temp\uss.0.exe
                              "C:\Users\Admin\AppData\Local\Temp\uss.0.exe"
                              3⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Checks processor information in registry
                              PID:1044
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\GHDHDBAECG.exe"
                                4⤵
                                • Loads dropped DLL
                                PID:4704
                                • C:\Users\Admin\AppData\Local\Temp\GHDHDBAECG.exe
                                  "C:\Users\Admin\AppData\Local\Temp\GHDHDBAECG.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  PID:2020
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\GHDHDBAECG.exe
                                    6⤵
                                      PID:4840
                                      • C:\Windows\SysWOW64\PING.EXE
                                        ping 2.2.2.2 -n 1 -w 3000
                                        7⤵
                                        • Runs ping.exe
                                        PID:1800
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\GIIEGHIDBG.exe"
                                  4⤵
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  PID:1976
                              • C:\Users\Admin\AppData\Local\Temp\uss.1.exe
                                "C:\Users\Admin\AppData\Local\Temp\uss.1.exe"
                                3⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:3148
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
                                  4⤵
                                    PID:3732
                                    • C:\Windows\SysWOW64\chcp.com
                                      chcp 1251
                                      5⤵
                                        PID:3756
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
                                        5⤵
                                        • Creates scheduled task(s)
                                        PID:3764
                                • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                                  "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:592
                                  • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
                                    "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
                                    3⤵
                                    • Windows security bypass
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Windows security modification
                                    • Adds Run key to start application
                                    • Checks for VirtualBox DLLs, possible anti-VM trick
                                    • Drops file in Windows directory
                                    • Modifies data under HKEY_USERS
                                    PID:1656
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                      4⤵
                                        PID:3020
                                        • C:\Windows\system32\netsh.exe
                                          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                          5⤵
                                          • Modifies Windows Firewall
                                          • Modifies data under HKEY_USERS
                                          PID:1148
                                      • C:\Windows\rss\csrss.exe
                                        C:\Windows\rss\csrss.exe
                                        4⤵
                                        • Drops file in Drivers directory
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Adds Run key to start application
                                        • Manipulates WinMon driver.
                                        • Manipulates WinMonFS driver.
                                        • Drops file in Windows directory
                                        • Modifies system certificate store
                                        PID:3096
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                          5⤵
                                          • Creates scheduled task(s)
                                          PID:3524
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks /delete /tn ScheduledUpdate /f
                                          5⤵
                                            PID:3552
                                          • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                                            "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies system certificate store
                                            PID:3600
                                            • C:\Windows\system32\bcdedit.exe
                                              C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
                                              6⤵
                                              • Modifies boot configuration data using bcdedit
                                              PID:2180
                                            • C:\Windows\system32\bcdedit.exe
                                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
                                              6⤵
                                              • Modifies boot configuration data using bcdedit
                                              PID:1848
                                            • C:\Windows\system32\bcdedit.exe
                                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
                                              6⤵
                                              • Modifies boot configuration data using bcdedit
                                              PID:2740
                                            • C:\Windows\system32\bcdedit.exe
                                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
                                              6⤵
                                              • Modifies boot configuration data using bcdedit
                                              PID:2204
                                            • C:\Windows\system32\bcdedit.exe
                                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
                                              6⤵
                                              • Modifies boot configuration data using bcdedit
                                              PID:3032
                                            • C:\Windows\system32\bcdedit.exe
                                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
                                              6⤵
                                              • Modifies boot configuration data using bcdedit
                                              PID:412
                                            • C:\Windows\system32\bcdedit.exe
                                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
                                              6⤵
                                              • Modifies boot configuration data using bcdedit
                                              PID:2536
                                            • C:\Windows\system32\bcdedit.exe
                                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
                                              6⤵
                                              • Modifies boot configuration data using bcdedit
                                              PID:824
                                            • C:\Windows\system32\bcdedit.exe
                                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
                                              6⤵
                                              • Modifies boot configuration data using bcdedit
                                              PID:1576
                                            • C:\Windows\system32\bcdedit.exe
                                              C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
                                              6⤵
                                              • Modifies boot configuration data using bcdedit
                                              PID:2092
                                            • C:\Windows\system32\bcdedit.exe
                                              C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
                                              6⤵
                                              • Modifies boot configuration data using bcdedit
                                              PID:1448
                                            • C:\Windows\system32\bcdedit.exe
                                              C:\Windows\system32\bcdedit.exe -timeout 0
                                              6⤵
                                              • Modifies boot configuration data using bcdedit
                                              PID:1532
                                            • C:\Windows\system32\bcdedit.exe
                                              C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
                                              6⤵
                                              • Modifies boot configuration data using bcdedit
                                              PID:2576
                                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                            5⤵
                                            • Executes dropped EXE
                                            PID:3796
                                          • C:\Windows\system32\bcdedit.exe
                                            C:\Windows\Sysnative\bcdedit.exe /v
                                            5⤵
                                            • Modifies boot configuration data using bcdedit
                                            PID:1184
                                          • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                                            C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                                            5⤵
                                            • Executes dropped EXE
                                            PID:1416
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                            5⤵
                                            • Creates scheduled task(s)
                                            PID:1648
                                          • C:\Windows\windefender.exe
                                            "C:\Windows\windefender.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            PID:4748
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                              6⤵
                                                PID:2976
                                                • C:\Windows\SysWOW64\sc.exe
                                                  sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                                  7⤵
                                                  • Launches sc.exe
                                                  PID:2476
                                      • C:\Users\Admin\AppData\Local\Temp\april.exe
                                        "C:\Users\Admin\AppData\Local\Temp\april.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:2964
                                        • C:\Users\Admin\AppData\Local\Temp\is-7VI4K.tmp\april.tmp
                                          "C:\Users\Admin\AppData\Local\Temp\is-7VI4K.tmp\april.tmp" /SL5="$D0192,1478464,54272,C:\Users\Admin\AppData\Local\Temp\april.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:1936
                                          • C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe
                                            "C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe" -i
                                            4⤵
                                            • Executes dropped EXE
                                            PID:4576
                                          • C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe
                                            "C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe" -s
                                            4⤵
                                            • Executes dropped EXE
                                            PID:4628
                                    • C:\Users\Admin\AppData\Local\Temp\BA31.exe
                                      C:\Users\Admin\AppData\Local\Temp\BA31.exe
                                      1⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:376
                                      • C:\Users\Admin\AppData\Local\Temp\is-HE8NA.tmp\BA31.tmp
                                        "C:\Users\Admin\AppData\Local\Temp\is-HE8NA.tmp\BA31.tmp" /SL5="$B016A,1693321,54272,C:\Users\Admin\AppData\Local\Temp\BA31.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:1240
                                    • C:\Windows\system32\makecab.exe
                                      "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240318121101.log C:\Windows\Logs\CBS\CbsPersist_20240318121101.cab
                                      1⤵
                                      • Drops file in Windows directory
                                      PID:1316
                                    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
                                      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde
                                      1⤵
                                      • Enumerates system info in registry
                                      • Modifies Internet Explorer settings
                                      • Modifies registry class
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4120
                                    • C:\Windows\system32\wermgr.exe
                                      "C:\Windows\system32\wermgr.exe" "-outproc" "1248" "5076"
                                      1⤵
                                        PID:4488
                                      • C:\Windows\windefender.exe
                                        C:\Windows\windefender.exe
                                        1⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        PID:2260
                                      • C:\Windows\system32\taskmgr.exe
                                        "C:\Windows\system32\taskmgr.exe" /4
                                        1⤵
                                        • Loads dropped DLL
                                        • Suspicious behavior: GetForegroundWindowSpam
                                        PID:3356
                                      • C:\Windows\system32\Dwm.exe
                                        "C:\Windows\system32\Dwm.exe"
                                        1⤵
                                          PID:4528

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          67KB

                                          MD5

                                          753df6889fd7410a2e9fe333da83a429

                                          SHA1

                                          3c425f16e8267186061dd48ac1c77c122962456e

                                          SHA256

                                          b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

                                          SHA512

                                          9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\41646444-fb9e-4474-ac7d-511b0afd6721.tmp

                                          Filesize

                                          259KB

                                          MD5

                                          a7f69d54be0e9b93790e3dee94364735

                                          SHA1

                                          a212e27d00f3beae5cca4567cb32d6e3226e0da5

                                          SHA256

                                          896d8648312bea0b1fdbbf7cd5fd738674c9d2637505c6720710ceb1fff8979a

                                          SHA512

                                          d65719e2f738ee7c33a51318c8cb6c806bb57082b54c7925b4ea08a2e79ccee6ec013815dfd8c78a74bbafb31cdd41688c251c0ed7e350010cb6f50fc5fa3456

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                          Filesize

                                          264KB

                                          MD5

                                          f50f89a0a91564d0b8a211f8921aa7de

                                          SHA1

                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                          SHA256

                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                          SHA512

                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          01820d62350616eec5e835d54cf91ebf

                                          SHA1

                                          bc4fdd93c58fc90d999369d6c7991652153d4bdb

                                          SHA256

                                          2a009d370b8f4156041e351dff9b7dd0b08c8856b13b906da8d06ee631166b96

                                          SHA512

                                          a6b19c557a59410e8c90d6e3f0418da1c8ac71d0decd5628aba47ebc438a8068aa753df83f1ca60e103d8b35de5647777f419f0deb115df29c2a8a9e2bb1f080

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                          Filesize

                                          16B

                                          MD5

                                          18e723571b00fb1694a3bad6c78e4054

                                          SHA1

                                          afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                          SHA256

                                          8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                          SHA512

                                          43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          129KB

                                          MD5

                                          ec95c29b5d0566b858bd029b3db1e4fd

                                          SHA1

                                          ebcfbbc2349a99fbc9c0f349b00b9c1ca2c88df8

                                          SHA256

                                          2121f0b7c99cd866512b13e1aff25f8dcd3488ae43ebc7f145a427bdb5b999d5

                                          SHA512

                                          b174464ca5e1cce8c5ad9ace0195eceec3d2a477f7fe7fdaa41a7742a1a6a15815a478f243a193fc8bd219c6180f41e8757b568e64f55ef5c00a27fb849b4b5e

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          259KB

                                          MD5

                                          ceb67087e388141d21598a83d0987551

                                          SHA1

                                          e1f2019e418b7d348ac98f48f5d82909c4b90116

                                          SHA256

                                          244b085e3d3b8a55e21669ebdb231fb7ea24c9d33a7717001f70cb5e418dc078

                                          SHA512

                                          822fa856e42f5a2ab82c39e53800c423607d1a03b967c1c6284ce68fd581414c746eeace3d2649019fc39b20b7f04b353a02b96abb278ec8b7bf259a7a39379e

                                        • C:\Users\Admin\AppData\Local\Log File Analyzer\is-UINRB.tmp

                                          Filesize

                                          122KB

                                          MD5

                                          6231b452e676ade27ca0ceb3a3cf874a

                                          SHA1

                                          f8236dbf9fa3b2835bbb5a8d08dab3a155f310d1

                                          SHA256

                                          9941eee1cafffad854ab2dfd49bf6e57b181efeb4e2d731ba7a28f5ab27e91cf

                                          SHA512

                                          f5882a3cded0a4e498519de5679ea12a0ea275c220e318af1762855a94bdac8dc5413d1c5d1a55a7cc31cfebcf4647dcf1f653195536ce1826a3002cf01aa12c

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\1033\StructuredQuerySchema.bin

                                          Filesize

                                          292KB

                                          MD5

                                          ae71383c3cbc5a7c64ee793a5779015b

                                          SHA1

                                          1cabfd5c590a76fe86af0c042b4d9a6e1546cf78

                                          SHA256

                                          29bbdf534e97add374f41c9a2e5a1a34952b8eac501f1a8828f5999e7e0d79f7

                                          SHA512

                                          f7703b0e5b67e2c3bbba42efe912eda68c90d7fe4425c7d2f20f02f2d6e659f71870286055eb87095a0861e4ba04a9fbf72bfb328bda10aadafe2880fd06e51d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                          Filesize

                                          1KB

                                          MD5

                                          05471356f0ea1c0f5f5b8deb29c3ebd1

                                          SHA1

                                          12b14b737d1e0f76ca2494fb7a6841e5792a0504

                                          SHA256

                                          cf59479c75a8803468dd2a2c1d2803a2694c41992d5a0b3b65b1c69c28d1eac7

                                          SHA512

                                          942285259612792c2b3a45a65483e0775314841e397e815d447fd8f69f63f5de1ac48653a051c0121bd73415655c468772d39ce72bb1ba3d8ae367f78143502b

                                        • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                          Filesize

                                          1.9MB

                                          MD5

                                          7f180170b9a351a34ec08f7cd8eb1f1b

                                          SHA1

                                          184b95d815972756a167ba8d5d9d6d8885fc5749

                                          SHA256

                                          5a53fb320dd73dffd4e50585df3c5a8ad440e37b1f7e613bedf9594a89799ec8

                                          SHA512

                                          bd1349230999c730995b575c3c00bf3b10e7c476f9e5da4309d361ea4cef8e84e9f98e9864b2a61e1863b2347b8e46f12c66eb0ffa60229557a082444ab0a8fa

                                        • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                          Filesize

                                          2.4MB

                                          MD5

                                          c0009957675b93912bcf111662cc25b3

                                          SHA1

                                          4c511a00992036d35f4484ecff9b7ab249212585

                                          SHA256

                                          88674d090e97d43175490abed98d1a4145fd3ed1af8c909b63a63ca40568f6b8

                                          SHA512

                                          833789882eb8dbe791334d3c78d70ce077765c2e4c018cac2b276bdc6e3f9d8a05d7ab7b7bb72f0d16cb81babb24f91dd79764cff7ccc42956c534ead3b5e00f

                                        • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                          Filesize

                                          4.1MB

                                          MD5

                                          abc868cf6f8183990f8d476dbe1224ba

                                          SHA1

                                          b9226909d1c0472af5eabd6949232d509ecf38cb

                                          SHA256

                                          17573c321796456afc4e0fdf9eb00326636410dbbcd2c4c92495ef39a2f48924

                                          SHA512

                                          d1c1e5c11cb58430b8f9455fbbdb094fc51cdb75382b1e7d1b03c08936f553cfb73c71c9869428e8a77ad3e9de8cde15bbd733b4843cb9ed9dc394d1a160ba01

                                        • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                          Filesize

                                          1.9MB

                                          MD5

                                          ce7fe02b69c411a825fd14c6c662e340

                                          SHA1

                                          4b18a84c21d0dc0b47aac52a871a53e303b6097a

                                          SHA256

                                          a678d34eee59cafea4972b1996fc628af3dfb08c525c46998dcaf2a3bf96152c

                                          SHA512

                                          22c45a6d7a6471bc19701342b90a9cdd938a54a8f54811ffff5ace0d56af52f26608cb558dde0f1dcde78362cb4546e392875e11f790ceb5db76b80fab270707

                                        • C:\Users\Admin\AppData\Local\Temp\5988.exe

                                          Filesize

                                          896KB

                                          MD5

                                          91f591d500e6ecc78906a16565bd6fa4

                                          SHA1

                                          1495180f260860183579dc282593de1c9e92e1ed

                                          SHA256

                                          860b7de2175ec2af3bb90f4826b9eb2b9bde6a1ad582e610cfabec4be78a69ac

                                          SHA512

                                          c078c9cc086e4e8060e97206a5017a125d6f91353d157e2479ff2e8ccd70da65bc9af89cc343359fd9da5ec3f8ced60b7d2ce3ebe14b98a4998809f5f9614cce

                                        • C:\Users\Admin\AppData\Local\Temp\7BE4.exe

                                          Filesize

                                          4.8MB

                                          MD5

                                          0de49b7358184b13c717ea9a823f12bb

                                          SHA1

                                          a764efe549b694c7ce05773c55b7d582b6f4ba2d

                                          SHA256

                                          48c26d758ee7acee07033f1583de83451a9e1f07facf958b786c654786f7f18f

                                          SHA512

                                          d10361e573912aad2dd49791c14cb6eec6d271eb5353b9c500e2824eb229e96799ecc982e96abb3fbd610eef6cb55487873bbac9dfbf0a68872beac746e9044a

                                        • C:\Users\Admin\AppData\Local\Temp\7D5E.exe

                                          Filesize

                                          319KB

                                          MD5

                                          8ac094179e0a157e2c4c186f8e3a3985

                                          SHA1

                                          e95f9e7ee4f2b9591f07911466cbf13381adc24e

                                          SHA256

                                          367c2765bfda5ac092ed0620c56a6de39f1d9ba4d924f3165f5252757e0cc560

                                          SHA512

                                          3e6f2323e5f64f10ee55cf1cb5109fbb079d9df6171ce43430881105e7a965e4ee10c2a3d9208c5d394d03a0443cbd89932e76d332e4171e04e15e89be562e52

                                        • C:\Users\Admin\AppData\Local\Temp\AC57.dll

                                          Filesize

                                          2.9MB

                                          MD5

                                          441e0b373665cbb5c31b83046144c19f

                                          SHA1

                                          d8df44336a6933c8bbc8ef3e7417771a04bdf72c

                                          SHA256

                                          cf5db7b441e8c5c899f808436d53848b2d37ba3167776902e3ad94a2629f7b30

                                          SHA512

                                          e9afa8a09a5b9b32562c10c28348cac3bb25da25dff6bb638f2c1460ceb8ec517a1a291fbd2066de938adbce5787e068bf1454cd63f2113942bdca160aca2d96

                                        • C:\Users\Admin\AppData\Local\Temp\B070.exe

                                          Filesize

                                          1.6MB

                                          MD5

                                          3a5fc566e700568bfa6701e2fd795ca9

                                          SHA1

                                          404a099fb0e20675f1fef8596df02c05788cc1a7

                                          SHA256

                                          ab5d6ec351816dcab2ae2633ad48352b4214682fd4ad273bc3510a4b7f6c6c8f

                                          SHA512

                                          86a9f41038ca0ea848b55af23bd645f50488d95598726927bf7b045b1ddf14fddda060c2f67db8602c8fc68be3e6732c7d6a8602af9c8221c7d6f9d90fa7cbdd

                                        • C:\Users\Admin\AppData\Local\Temp\B070.exe

                                          Filesize

                                          1.3MB

                                          MD5

                                          1c91d79c376bbe4490ddf4622b18f0cf

                                          SHA1

                                          987a3d0ea670093f286f96910dfd1f270eaa3971

                                          SHA256

                                          b62b7c270c0ce21f04d286474c195446bed99c103be7fa1d8d28bf3256f44f64

                                          SHA512

                                          90ffd300e6e17dd0687fc04efd038df7a7a9fc65abad1d44df360f209fbc52fcbfee579c734c280cfc2bf285ac990b8f04cfb9e177467ce303371e3a7ccf1e73

                                        • C:\Users\Admin\AppData\Local\Temp\BA31.exe

                                          Filesize

                                          64KB

                                          MD5

                                          f64766db5236dae66b701b18c7d1f6d1

                                          SHA1

                                          7bceda6da347928ea681675dc20bacf4060fb409

                                          SHA256

                                          59fcfc5048fedf2c78f88fd5aa6e841712324d24a4f362deb9abff600fead0b5

                                          SHA512

                                          cf7d3dbb02e13efea7824704187b3fcc75253b68f33d96decfa6eb9104626cefc31c91f0495cc415d3fb4d49f50e04c0f4a5a8b3a55b1e911a3108f9f406f777

                                        • C:\Users\Admin\AppData\Local\Temp\BA31.exe

                                          Filesize

                                          2.0MB

                                          MD5

                                          57bbbec3cc5c3cb8024bc5c7f2999dd5

                                          SHA1

                                          7eb3c008cd273d06aacdeaca5e35f4d504bdf676

                                          SHA256

                                          30c20c68369acf6e0977ae90a4238b3a2908025f08075fc04ffa5f23325029ab

                                          SHA512

                                          d46c6c4374e9fb68c6bfc350f440ce634b152a220ba6f98c90d3d2647f96f6f0a447060af190535da21b5b7c2e82741ba242de873b9e62d98a92075a5f4d5cef

                                        • C:\Users\Admin\AppData\Local\Temp\CA43.exe

                                          Filesize

                                          554KB

                                          MD5

                                          a1b5ee1b9649ab629a7ac257e2392f8d

                                          SHA1

                                          dc1b14b6d57589440fb3021c9e06a3e3191968dc

                                          SHA256

                                          2bfd95260a4c52d4474cd51e74469fc3de94caed28937ff0ce99ded66af97e65

                                          SHA512

                                          50ccbb9fd4ea2da847c6be5988e1e82e28d551b06cc9122b921dbd40eff4b657a81a010cea76f29e88fda06f8c053090b38d04eb89a6d63ec4f42ef68b1cf82b

                                        • C:\Users\Admin\AppData\Local\Temp\CabEFFC.tmp

                                          Filesize

                                          65KB

                                          MD5

                                          ac05d27423a85adc1622c714f2cb6184

                                          SHA1

                                          b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                          SHA256

                                          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                          SHA512

                                          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                        • C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe

                                          Filesize

                                          366KB

                                          MD5

                                          f98c75a2502a2f5251b262e4aeaf1c16

                                          SHA1

                                          0edb55ec7e7768a39f1bf37dc27aecd04507f63c

                                          SHA256

                                          392ff6fc0a544611919098a630cebfd47ecd210cdc34c97081bfe31c938ba67c

                                          SHA512

                                          b05969d381c66f06b3ec8af2a76312e3bf6cef34e84ef062685a16062ee50f0aa198a8d2d7641939ec2c66f08e3439357f15087eb51a7ef1b63a6683a129bd58

                                        • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

                                          Filesize

                                          8.3MB

                                          MD5

                                          fd2727132edd0b59fa33733daa11d9ef

                                          SHA1

                                          63e36198d90c4c2b9b09dd6786b82aba5f03d29a

                                          SHA256

                                          3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e

                                          SHA512

                                          3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

                                        • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

                                          Filesize

                                          492KB

                                          MD5

                                          fafbf2197151d5ce947872a4b0bcbe16

                                          SHA1

                                          a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020

                                          SHA256

                                          feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71

                                          SHA512

                                          acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6

                                        • C:\Users\Admin\AppData\Local\Temp\TarF38C.tmp

                                          Filesize

                                          175KB

                                          MD5

                                          dd73cead4b93366cf3465c8cd32e2796

                                          SHA1

                                          74546226dfe9ceb8184651e920d1dbfb432b314e

                                          SHA256

                                          a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

                                          SHA512

                                          ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

                                        • C:\Users\Admin\AppData\Local\Temp\is-HE8NA.tmp\BA31.tmp

                                          Filesize

                                          677KB

                                          MD5

                                          12fdca826c153015cf70c2f56242500f

                                          SHA1

                                          f7c01202d717c2f389221919755f5a9848f297f9

                                          SHA256

                                          e8d6dc4a662658005193880fb05ffb7c305976241004ccfae44109969ee085ca

                                          SHA512

                                          db630a368e7d2355ab084c061f2ddbd9c37acf4457ce1d3633f8f0e785833a913aa3d4dc49e161e46cab8dbbae903350424da5793abf8d054edbe0fca803c004

                                        • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                                          Filesize

                                          5.3MB

                                          MD5

                                          1afff8d5352aecef2ecd47ffa02d7f7d

                                          SHA1

                                          8b115b84efdb3a1b87f750d35822b2609e665bef

                                          SHA256

                                          c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

                                          SHA512

                                          e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

                                        • C:\Users\Admin\AppData\Local\Temp\osloader.exe

                                          Filesize

                                          591KB

                                          MD5

                                          e2f68dc7fbd6e0bf031ca3809a739346

                                          SHA1

                                          9c35494898e65c8a62887f28e04c0359ab6f63f5

                                          SHA256

                                          b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

                                          SHA512

                                          26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

                                        • C:\Users\Admin\AppData\Local\Temp\uss.1.exe

                                          Filesize

                                          1.7MB

                                          MD5

                                          eee5ddcffbed16222cac0a1b4e2e466e

                                          SHA1

                                          28b40c88b8ea50b0782e2bcbb4cc0f411035f3d5

                                          SHA256

                                          2a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54

                                          SHA512

                                          8f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc

                                        • C:\Users\Admin\AppData\Roaming\Temp\Task.bat

                                          Filesize

                                          128B

                                          MD5

                                          11bb3db51f701d4e42d3287f71a6a43e

                                          SHA1

                                          63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

                                          SHA256

                                          6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

                                          SHA512

                                          907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

                                        • C:\Users\Admin\AppData\Roaming\dwvcuge

                                          Filesize

                                          209KB

                                          MD5

                                          2cb4d9235c8edfaeeedf9258177cec57

                                          SHA1

                                          401520c963a302e4df292c032416febec06e5666

                                          SHA256

                                          d4bd84ab6a80420dd229e9607fb50c088667fdd38e2d8bf7a583269effa68278

                                          SHA512

                                          5d1059c1618e8cf1645a7775da743b02ef387d249c6b263e20ade68362ee06e43548293c1bb224719014618458b6bb6b00c7664fbea97b2414976ce980a8d950

                                        • C:\Windows\rss\csrss.exe

                                          Filesize

                                          704KB

                                          MD5

                                          7b5110d07bec43d1f8009c79abaa8dad

                                          SHA1

                                          e2237730018e767391018bba2e979e2482e680a8

                                          SHA256

                                          20ec9644fb33e3c3db32d07db631ede81ad1fa0000f549a7dd4b9323f1373333

                                          SHA512

                                          72cdb1c45b54f9409a66ff4a744a85ce9f9706dee671e3176825362a07f67e2bd0a0ce5d2ccb60e5cd596813b41294e3dcc3a6e7d2730cf975ebb8b7b13761a4

                                        • \Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                          Filesize

                                          2.1MB

                                          MD5

                                          b573e6487a6ed6adbc7279004bbf3942

                                          SHA1

                                          ab4071c26eab5c9c4c113ee3c5064a13cc27e794

                                          SHA256

                                          7f2650fd84059059f94fed7bc062f7c3830b33ec033e7ac0560903f3e69ff75a

                                          SHA512

                                          369b22f46c7dede5cdaf3c98f6504c05712d1418cbafff065d3b854514f6f77af322e253bd1018dfafa7853e58623750b99138f371878c8f6cf3941d37c057bc

                                        • \Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

                                          Filesize

                                          2.0MB

                                          MD5

                                          0ff541aacdc3f24f495d97aad8107d24

                                          SHA1

                                          94b30417bcab2c8a90a83ecfa98eceafbfb79452

                                          SHA256

                                          c7e60fa17326ee871b23d43754d680248e5870ec7e6d7bf26e2ef0e02c6e14c8

                                          SHA512

                                          6d9834f0b1da83104c704dd8d8c21d956a1e2be66a13ff4dbccb16211ba0d5f63caecb44d459f1726e6fcd277be2be5bd8df2ee1e516b27b95267da44a4c6e09

                                        • \Users\Admin\AppData\Local\Temp\5988.exe

                                          Filesize

                                          1024KB

                                          MD5

                                          0d958099e2287862c41c1607ea3676e2

                                          SHA1

                                          83346bf498f46b4a7fb905ba3cfb1bc03b4dc464

                                          SHA256

                                          24f2300a2584184e213cc877228a0308d228e079d5b2239f72fdca54c4684a9d

                                          SHA512

                                          b9c035f9c1036db3710cf92417590e1b3fc16f83bb879988902c464bb9825c7189946d6dd0f190251235c2c699c09973ea136ee15900f4997211f50b453e5b7f

                                        • \Users\Admin\AppData\Local\Temp\5988.exe

                                          Filesize

                                          64KB

                                          MD5

                                          fa0dbf21b986bc15ba720a58491400cf

                                          SHA1

                                          08c9ad4d204b9b746e6e3870e90874f54b11ba41

                                          SHA256

                                          3bf1d53615d1e40e6b319d47ee870bd4098938f6591d63d6932144e4116ef5b0

                                          SHA512

                                          51f3b3f8ea48f2533ae820ac4245aee91c084377069d87da6ad0191a0fd7b6dc93f2921c3cebef6794a262e6597ec32c286cbd58796de033145b2fb59c52a70b

                                        • \Users\Admin\AppData\Local\Temp\5988.exe

                                          Filesize

                                          6.6MB

                                          MD5

                                          e350f2139b224a786fdbb52511ba7fe3

                                          SHA1

                                          8c7fde9b86a2a0f6f771512da62f1d0ce8f23ec3

                                          SHA256

                                          829bf2ccf1b1382384482ff6a19bae30785ae0fb474b75d32621969dc91ccf5c

                                          SHA512

                                          a939fcc3569098ce0ebec743e52aac4d39998c0383826ffd15ce7323cd2c5e615c0b50bd8d2e9d28e1e9e77c3c9422ed79637b5c21d48acabde523cdd43c5285

                                        • \Users\Admin\AppData\Local\Temp\7BE4.exe

                                          Filesize

                                          3.9MB

                                          MD5

                                          4395e5af4f1d3157222e9bd8709f884c

                                          SHA1

                                          acdbc62128704f0f5027b0e02254d2fe6c3008d3

                                          SHA256

                                          d2a49c74019e94debc6a5308cca0c0080d54b213c182498815f4f7891a331f55

                                          SHA512

                                          290dcc3779f3ae4db140a4884318116887c057d9936b07602f6d7e61ff44aaf13ee0ed0bff010617e0c161bfa3e9d2ac443dacc72af5a34ae92e93bf9c6846e5

                                        • \Users\Admin\AppData\Local\Temp\7BE4.exe

                                          Filesize

                                          512KB

                                          MD5

                                          8e596ddbc51ada0c3c1e01836d336b0d

                                          SHA1

                                          74ec0d7550aebec755f31b56086158d7a44a1be0

                                          SHA256

                                          17621f2f660b4475372ab2b845b6a53f27476cede57d975857d2c5e91bfd27f4

                                          SHA512

                                          675ea64fb192aec27db43b2d665bbcc4747adca6c74567b32783e9b093def160cffbad27f24adf0b1cadc0810182a3a7639ad521902f2efd67a839ea6c9fdae5

                                        • \Users\Admin\AppData\Local\Temp\InstallSetup_four.exe

                                          Filesize

                                          64KB

                                          MD5

                                          ba388e888e0f919e0a70ad55a790b091

                                          SHA1

                                          621d168ba779694354bfa087e6283675c0762636

                                          SHA256

                                          24a68286c60a096452564c1edddffdd8390fbaea954c56311b26109602a1ca45

                                          SHA512

                                          4a55c18a905cb007580d6f699b2d765e5a1f474c1bdae603aaeb45feebab59c8d17d5b5cf9be641390e67f9c7000e96e59d57197f1205283ce349121bac6d3a6

                                        • \Users\Admin\AppData\Local\Temp\april.exe

                                          Filesize

                                          1.8MB

                                          MD5

                                          a84541841e8d381cefe71b9467c439c3

                                          SHA1

                                          4e45c5d8ec17818e67a9d1b65183be203d54b7bd

                                          SHA256

                                          c4529e757bce9a52ff52cecff2b89344d33acc4cc3a23577b4f560396ab3beda

                                          SHA512

                                          43b28773d2d5529577c21a82d520e01716625a90b734f750722ee97abd92a9845267ce02b41cf75f0f50d165020b278f76386efbe8106979c429047b4f54dd49

                                        • \Users\Admin\AppData\Local\Temp\is-7VI4K.tmp\april.tmp

                                          Filesize

                                          677KB

                                          MD5

                                          33da9dc521f467c0405d3ef5377ce04b

                                          SHA1

                                          5249d7ce5dfabe5ee6d2fc7d3f3eba1e866b7d1f

                                          SHA256

                                          dbab8a7b2b45fc7001d5e34d3d45ccbe93a7591f12910281acf2c32f8c4e631c

                                          SHA512

                                          a3093637e1d731eab58080e10706db1afbf6e79fbac6593733b61033f97875ecbe230311e9741d349625ec3a66a6435318846d35290db8cd00af76d692699a55

                                        • \Users\Admin\AppData\Local\Temp\is-O378P.tmp\_isetup\_iscrypt.dll

                                          Filesize

                                          2KB

                                          MD5

                                          a69559718ab506675e907fe49deb71e9

                                          SHA1

                                          bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                          SHA256

                                          2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                          SHA512

                                          e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                        • \Users\Admin\AppData\Local\Temp\is-O378P.tmp\_isetup\_shfoldr.dll

                                          Filesize

                                          22KB

                                          MD5

                                          92dc6ef532fbb4a5c3201469a5b5eb63

                                          SHA1

                                          3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                          SHA256

                                          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                          SHA512

                                          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                        • \Users\Admin\AppData\Local\Temp\uss.0.exe

                                          Filesize

                                          318KB

                                          MD5

                                          d917bb746df8e58f9fcea42f544c031b

                                          SHA1

                                          66dd0439e7dab138962a2d4c74359985d2ba62d5

                                          SHA256

                                          76d8195efec9dbc481edd46caee6f7c349fb4d2fbb5f33ec48d163410a8792f2

                                          SHA512

                                          bf88b7cf66a9521a8026e7504945e79acfb427573330d2e7792f056ceff094dc783d800f021fac8461d29450afd8de8fc34155efef21464711d0cc692e89d492

                                        • \Windows\rss\csrss.exe

                                          Filesize

                                          768KB

                                          MD5

                                          93bd5275550b239666f3167957c5240f

                                          SHA1

                                          c5984c7eadf4daac21ee2a54a80f92ad74bee940

                                          SHA256

                                          0b87034accc2da56ae53af536c0936a511f4bc3b57c4eb1c7146e69fc0ef2596

                                          SHA512

                                          963684c11966a51a1817e85b4cf6f1b27d7da1e36db994904d362a352057f777bedfeef1692b3a8b96faba801c062c16f55bc70aa5b99a3958094e4ee7ac9e30

                                        • memory/376-1048-0x0000000000400000-0x0000000000414000-memory.dmp

                                          Filesize

                                          80KB

                                        • memory/376-1157-0x0000000000400000-0x0000000000414000-memory.dmp

                                          Filesize

                                          80KB

                                        • memory/592-1053-0x0000000002550000-0x0000000002948000-memory.dmp

                                          Filesize

                                          4.0MB

                                        • memory/592-1091-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                          Filesize

                                          9.1MB

                                        • memory/592-1055-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                          Filesize

                                          9.1MB

                                        • memory/592-1054-0x0000000002950000-0x000000000323B000-memory.dmp

                                          Filesize

                                          8.9MB

                                        • memory/1036-1088-0x0000000000400000-0x00000000004A5000-memory.dmp

                                          Filesize

                                          660KB

                                        • memory/1036-1086-0x0000000000620000-0x0000000000720000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/1036-1087-0x0000000000240000-0x00000000002A7000-memory.dmp

                                          Filesize

                                          412KB

                                        • memory/1036-1147-0x0000000003520000-0x0000000003A50000-memory.dmp

                                          Filesize

                                          5.2MB

                                        • memory/1036-1154-0x0000000003530000-0x0000000003A60000-memory.dmp

                                          Filesize

                                          5.2MB

                                        • memory/1036-1152-0x0000000000620000-0x0000000000720000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/1036-1155-0x0000000000400000-0x00000000004A5000-memory.dmp

                                          Filesize

                                          660KB

                                        • memory/1036-1150-0x0000000003530000-0x0000000003A60000-memory.dmp

                                          Filesize

                                          5.2MB

                                        • memory/1044-1108-0x0000000002E00000-0x0000000002F00000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/1044-1261-0x0000000002E00000-0x0000000002F00000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/1044-1109-0x0000000000220000-0x0000000000247000-memory.dmp

                                          Filesize

                                          156KB

                                        • memory/1044-1209-0x0000000000400000-0x0000000002D50000-memory.dmp

                                          Filesize

                                          41.3MB

                                        • memory/1044-1110-0x0000000000400000-0x0000000002D50000-memory.dmp

                                          Filesize

                                          41.3MB

                                        • memory/1128-1074-0x0000000000400000-0x0000000000473000-memory.dmp

                                          Filesize

                                          460KB

                                        • memory/1128-1073-0x0000000000640000-0x0000000000740000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/1128-1123-0x0000000000400000-0x0000000000473000-memory.dmp

                                          Filesize

                                          460KB

                                        • memory/1148-5-0x0000000000400000-0x0000000000473000-memory.dmp

                                          Filesize

                                          460KB

                                        • memory/1148-3-0x0000000000400000-0x0000000000473000-memory.dmp

                                          Filesize

                                          460KB

                                        • memory/1148-2-0x0000000000220000-0x000000000022B000-memory.dmp

                                          Filesize

                                          44KB

                                        • memory/1148-1-0x0000000000500000-0x0000000000600000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/1240-1185-0x0000000000240000-0x0000000000241000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1240-1069-0x0000000000240000-0x0000000000241000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1248-70-0x0000000010900000-0x0000000010EE8000-memory.dmp

                                          Filesize

                                          5.9MB

                                        • memory/1248-1010-0x0000000010900000-0x0000000010EE8000-memory.dmp

                                          Filesize

                                          5.9MB

                                        • memory/1248-1012-0x0000000140000000-0x00000001405E8000-memory.dmp

                                          Filesize

                                          5.9MB

                                        • memory/1248-71-0x0000000140000000-0x00000001405E8000-memory.dmp

                                          Filesize

                                          5.9MB

                                        • memory/1248-280-0x00000000047C0000-0x00000000047D6000-memory.dmp

                                          Filesize

                                          88KB

                                        • memory/1248-4-0x0000000002510000-0x0000000002526000-memory.dmp

                                          Filesize

                                          88KB

                                        • memory/1656-1117-0x0000000002540000-0x0000000002938000-memory.dmp

                                          Filesize

                                          4.0MB

                                        • memory/1656-1119-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                          Filesize

                                          9.1MB

                                        • memory/1656-1148-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                          Filesize

                                          9.1MB

                                        • memory/1936-1032-0x00000000001D0000-0x00000000001D1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2172-154-0x0000000000080000-0x0000000000081000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2172-145-0x00000000003E0000-0x00000000010D9000-memory.dmp

                                          Filesize

                                          13.0MB

                                        • memory/2172-269-0x00000000003E0000-0x00000000010D9000-memory.dmp

                                          Filesize

                                          13.0MB

                                        • memory/2172-164-0x0000000000090000-0x0000000000091000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2172-162-0x0000000000090000-0x0000000000091000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2172-170-0x00000000001D0000-0x00000000001D1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2172-173-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2172-175-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2172-160-0x0000000000090000-0x0000000000091000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2172-159-0x0000000000080000-0x0000000000081000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2172-157-0x0000000000080000-0x0000000000081000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2172-155-0x00000000003E0000-0x00000000010D9000-memory.dmp

                                          Filesize

                                          13.0MB

                                        • memory/2172-241-0x0000000000210000-0x0000000000211000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2172-168-0x00000000001D0000-0x00000000001D1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2172-178-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2172-185-0x0000000000200000-0x0000000000201000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2172-180-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2172-183-0x0000000000200000-0x0000000000201000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2184-32-0x00000000025D0000-0x0000000002710000-memory.dmp

                                          Filesize

                                          1.2MB

                                        • memory/2184-33-0x0000000002A70000-0x0000000002B92000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2184-36-0x0000000002A70000-0x0000000002B92000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2184-25-0x0000000000210000-0x0000000000216000-memory.dmp

                                          Filesize

                                          24KB

                                        • memory/2184-23-0x0000000010000000-0x00000000102F2000-memory.dmp

                                          Filesize

                                          2.9MB

                                        • memory/2184-965-0x0000000002A70000-0x0000000002B92000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2184-54-0x0000000010000000-0x00000000102F2000-memory.dmp

                                          Filesize

                                          2.9MB

                                        • memory/2376-277-0x0000000002E10000-0x0000000002F10000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/2376-278-0x0000000000230000-0x000000000023B000-memory.dmp

                                          Filesize

                                          44KB

                                        • memory/2376-281-0x0000000000400000-0x0000000002D50000-memory.dmp

                                          Filesize

                                          41.3MB

                                        • memory/2376-279-0x0000000000400000-0x0000000002D50000-memory.dmp

                                          Filesize

                                          41.3MB

                                        • memory/2504-286-0x0000000001EC0000-0x0000000001FC0000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/2504-45-0x0000000001CE0000-0x0000000001D4B000-memory.dmp

                                          Filesize

                                          428KB

                                        • memory/2504-44-0x0000000001EC0000-0x0000000001FC0000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/2504-50-0x0000000000400000-0x0000000001A77000-memory.dmp

                                          Filesize

                                          22.5MB

                                        • memory/2504-287-0x0000000001CE0000-0x0000000001D4B000-memory.dmp

                                          Filesize

                                          428KB

                                        • memory/2504-68-0x0000000000400000-0x0000000001A77000-memory.dmp

                                          Filesize

                                          22.5MB

                                        • memory/2512-18-0x0000000074140000-0x000000007482E000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2512-17-0x0000000000D00000-0x00000000011D6000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/2512-165-0x0000000074140000-0x000000007482E000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2512-48-0x0000000074140000-0x000000007482E000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2964-1016-0x0000000000400000-0x0000000000414000-memory.dmp

                                          Filesize

                                          80KB

                                        • memory/2964-1118-0x0000000000400000-0x0000000000414000-memory.dmp

                                          Filesize

                                          80KB

                                        • memory/3096-1183-0x0000000002760000-0x0000000002B58000-memory.dmp

                                          Filesize

                                          4.0MB

                                        • memory/3096-1184-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                          Filesize

                                          9.1MB

                                        • memory/3148-1336-0x0000000000400000-0x0000000000930000-memory.dmp

                                          Filesize

                                          5.2MB

                                        • memory/3148-1167-0x0000000000230000-0x0000000000231000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3148-1159-0x0000000000400000-0x0000000000930000-memory.dmp

                                          Filesize

                                          5.2MB

                                        • memory/3600-1208-0x0000000140000000-0x00000001405E8000-memory.dmp

                                          Filesize

                                          5.9MB

                                        • memory/4120-1338-0x0000000071FED000-0x0000000071FF8000-memory.dmp

                                          Filesize

                                          44KB

                                        • memory/4120-1289-0x0000000071FED000-0x0000000071FF8000-memory.dmp

                                          Filesize

                                          44KB

                                        • memory/5060-986-0x0000000072E60000-0x000000007354E000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/5060-985-0x0000000000EE0000-0x0000000001524000-memory.dmp

                                          Filesize

                                          6.3MB

                                        • memory/5060-1009-0x0000000072E60000-0x000000007354E000-memory.dmp

                                          Filesize

                                          6.9MB