Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22-03-2024 08:49

General

  • Target

    91971721b53c791bd1e4bef7ae44c4fc.exe

  • Size

    303KB

  • MD5

    91971721b53c791bd1e4bef7ae44c4fc

  • SHA1

    ffd271ebad1b0afae61b36a62d63352d38c703bd

  • SHA256

    b119f003f9fca28111b386401a9da65eb1b6b36f6824b2145188aed2bacada1c

  • SHA512

    25675855e0f4bb9727a1b7ffe63488f3a3a8bc85120bfd8be3187913dfd03d0db13f9f25fc79d06d3ee871b9e92b979df3a2a11b8e52812fcec858813d81a0ad

  • SSDEEP

    3072:oQciUCwAoPh+BYYCEXWHbbk9B/armuE/1K8nD2ey7AOD65xL4dK:kOIhmhbL/uER2ey752L44

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://sajdfue.com/test1/get.php

Attributes
  • extension

    .vook

  • offline_id

    1eSPzWRaNslCgtjBZfL5pzvovoiaVI4IZSnvAwt1

  • payload_url

    http://sdfjhuz.com/dl/build2.exe

    http://sajdfue.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1 Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@freshingmail.top Reserve e-mail address to contact us: datarestorehelpyou@airmail.cc Your personal ID: 0857PsawqS

rsa_pubkey.plain

Extracted

Family

vidar

Version

8.4

Botnet

95002d0a9d65ffced363a8f35f42a529

C2

https://steamcommunity.com/profiles/76561199654112719

https://t.me/r2d0s

Attributes
  • profile_id_v2

    95002d0a9d65ffced363a8f35f42a529

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0

Signatures

  • DcRat 6 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Vidar Stealer 5 IoCs
  • Detected Djvu ransomware 15 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 8 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Windows security bypass 2 TTPs 7 IoCs
  • Modifies boot configuration data using bcdedit 14 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 25 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Suspicious use of SetThreadContext 6 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\91971721b53c791bd1e4bef7ae44c4fc.exe
    "C:\Users\Admin\AppData\Local\Temp\91971721b53c791bd1e4bef7ae44c4fc.exe"
    1⤵
    • DcRat
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2240
  • C:\Windows\system32\cmd.exe
    cmd /c ""C:\Users\Admin\AppData\Local\Temp\6336.bat" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\system32\reg.exe
      reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
      2⤵
        PID:2844
    • C:\Users\Admin\AppData\Local\Temp\8DDF.exe
      C:\Users\Admin\AppData\Local\Temp\8DDF.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Users\Admin\AppData\Local\Temp\8DDF.exe
        C:\Users\Admin\AppData\Local\Temp\8DDF.exe
        2⤵
        • DcRat
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:2600
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\c6d5a933-0c7f-461e-a865-5822e8db4b93" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          3⤵
          • Modifies file permissions
          PID:2796
        • C:\Users\Admin\AppData\Local\Temp\8DDF.exe
          "C:\Users\Admin\AppData\Local\Temp\8DDF.exe" --Admin IsNotAutoStart IsNotTask
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2916
          • C:\Users\Admin\AppData\Local\Temp\8DDF.exe
            "C:\Users\Admin\AppData\Local\Temp\8DDF.exe" --Admin IsNotAutoStart IsNotTask
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            • Suspicious use of WriteProcessMemory
            PID:1160
            • C:\Users\Admin\AppData\Local\9af707ac-8640-402b-9fe4-a6e5760158ec\build2.exe
              "C:\Users\Admin\AppData\Local\9af707ac-8640-402b-9fe4-a6e5760158ec\build2.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2432
              • C:\Users\Admin\AppData\Local\9af707ac-8640-402b-9fe4-a6e5760158ec\build2.exe
                "C:\Users\Admin\AppData\Local\9af707ac-8640-402b-9fe4-a6e5760158ec\build2.exe"
                6⤵
                • Executes dropped EXE
                • Modifies system certificate store
                PID:844
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 844 -s 1456
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:1892
            • C:\Users\Admin\AppData\Local\9af707ac-8640-402b-9fe4-a6e5760158ec\build3.exe
              "C:\Users\Admin\AppData\Local\9af707ac-8640-402b-9fe4-a6e5760158ec\build3.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1996
              • C:\Users\Admin\AppData\Local\9af707ac-8640-402b-9fe4-a6e5760158ec\build3.exe
                "C:\Users\Admin\AppData\Local\9af707ac-8640-402b-9fe4-a6e5760158ec\build3.exe"
                6⤵
                • Executes dropped EXE
                PID:948
                • C:\Windows\SysWOW64\schtasks.exe
                  /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                  7⤵
                  • DcRat
                  • Creates scheduled task(s)
                  PID:1736
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {6C3F5737-B8A7-45A9-B2DA-0CB4C1B1FEC6} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
      1⤵
        PID:1680
        • C:\Users\Admin\AppData\Roaming\jeuwefw
          C:\Users\Admin\AppData\Roaming\jeuwefw
          2⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: MapViewOfSection
          PID:1108
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:2936
          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            3⤵
            • Executes dropped EXE
            PID:2948
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:1864
          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            3⤵
            • Executes dropped EXE
            PID:1216
            • C:\Windows\SysWOW64\schtasks.exe
              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
              4⤵
              • DcRat
              • Creates scheduled task(s)
              PID:1900
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\347A.bat" "
        1⤵
          PID:2968
          • C:\Windows\system32\reg.exe
            reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
            2⤵
              PID:608
          • C:\Users\Admin\AppData\Local\Temp\4B29.exe
            C:\Users\Admin\AppData\Local\Temp\4B29.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1768
            • C:\Users\Admin\AppData\Local\Temp\4B29.exe
              "C:\Users\Admin\AppData\Local\Temp\4B29.exe"
              2⤵
              • Windows security bypass
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Adds Run key to start application
              • Checks for VirtualBox DLLs, possible anti-VM trick
              • Drops file in Windows directory
              • Modifies data under HKEY_USERS
              PID:2288
              • C:\Windows\system32\cmd.exe
                C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                3⤵
                  PID:1108
                  • C:\Windows\system32\netsh.exe
                    netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                    4⤵
                    • Modifies Windows Firewall
                    • Modifies data under HKEY_USERS
                    PID:888
                • C:\Windows\rss\csrss.exe
                  C:\Windows\rss\csrss.exe
                  3⤵
                  • Drops file in Drivers directory
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Manipulates WinMon driver.
                  • Manipulates WinMonFS driver.
                  • Drops file in Windows directory
                  • Modifies system certificate store
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2192
                  • C:\Windows\system32\schtasks.exe
                    schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                    4⤵
                    • DcRat
                    • Creates scheduled task(s)
                    PID:1516
                  • C:\Windows\system32\schtasks.exe
                    schtasks /delete /tn ScheduledUpdate /f
                    4⤵
                      PID:1984
                    • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                      "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                      4⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Modifies system certificate store
                      PID:2920
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2900
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2396
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:1768
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:1788
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2792
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:1108
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2088
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2800
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2604
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2060
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2796
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -timeout 0
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:2944
                      • C:\Windows\system32\bcdedit.exe
                        C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
                        5⤵
                        • Modifies boot configuration data using bcdedit
                        PID:1536
                    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                      C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                      4⤵
                      • Executes dropped EXE
                      PID:2236
                    • C:\Windows\system32\bcdedit.exe
                      C:\Windows\Sysnative\bcdedit.exe /v
                      4⤵
                      • Modifies boot configuration data using bcdedit
                      PID:1740
                    • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                      C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                      4⤵
                      • Executes dropped EXE
                      PID:2680
                    • C:\Windows\system32\schtasks.exe
                      schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                      4⤵
                      • DcRat
                      • Creates scheduled task(s)
                      PID:1616
                    • C:\Windows\windefender.exe
                      "C:\Windows\windefender.exe"
                      4⤵
                      • Executes dropped EXE
                      PID:2628
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                        5⤵
                          PID:1588
                          • C:\Windows\SysWOW64\sc.exe
                            sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                            6⤵
                            • Launches sc.exe
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2568
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                  • Modifies Installed Components in the registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:2372
                • C:\Windows\system32\makecab.exe
                  "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240322085027.log C:\Windows\Logs\CBS\CbsPersist_20240322085027.cab
                  1⤵
                  • Drops file in Windows directory
                  PID:820
                • C:\Windows\windefender.exe
                  C:\Windows\windefender.exe
                  1⤵
                  • Executes dropped EXE
                  PID:2328

                Network

                MITRE ATT&CK Matrix ATT&CK v13

                Execution

                Command and Scripting Interpreter

                1
                T1059

                Scheduled Task/Job

                1
                T1053

                Persistence

                Boot or Logon Autostart Execution

                2
                T1547

                Registry Run Keys / Startup Folder

                2
                T1547.001

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Scheduled Task/Job

                1
                T1053

                Privilege Escalation

                Boot or Logon Autostart Execution

                2
                T1547

                Registry Run Keys / Startup Folder

                2
                T1547.001

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Scheduled Task/Job

                1
                T1053

                Defense Evasion

                Impair Defenses

                4
                T1562

                Disable or Modify Tools

                2
                T1562.001

                Disable or Modify System Firewall

                1
                T1562.004

                Modify Registry

                5
                T1112

                File and Directory Permissions Modification

                1
                T1222

                Subvert Trust Controls

                1
                T1553

                Install Root Certificate

                1
                T1553.004

                Discovery

                Query Registry

                3
                T1012

                System Information Discovery

                3
                T1082

                Peripheral Device Discovery

                1
                T1120

                Command and Control

                Web Service

                1
                T1102

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
                  Filesize

                  1KB

                  MD5

                  e53bfe3592dd6dd03bde7f4ed6ca8846

                  SHA1

                  026a313f5d93859f2b5d8fdffc810236a001a0dc

                  SHA256

                  ea0b2ceb79a1c7893e3bb13477c110ad259aaf40aec6265b1a26c19d2383cebd

                  SHA512

                  ace6bface8c83861bb55a46db9d4ea29d8f67672a63eb5d45166f3d7497740706e40dbe948d2c8618603c85b4553d55e924decd7373569f9bf84e084c0e8f6e7

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                  Filesize

                  67KB

                  MD5

                  753df6889fd7410a2e9fe333da83a429

                  SHA1

                  3c425f16e8267186061dd48ac1c77c122962456e

                  SHA256

                  b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

                  SHA512

                  9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
                  Filesize

                  724B

                  MD5

                  8202a1cd02e7d69597995cabbe881a12

                  SHA1

                  8858d9d934b7aa9330ee73de6c476acf19929ff6

                  SHA256

                  58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

                  SHA512

                  97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
                  Filesize

                  1KB

                  MD5

                  a266bb7dcc38a562631361bbf61dd11b

                  SHA1

                  3b1efd3a66ea28b16697394703a72ca340a05bd5

                  SHA256

                  df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                  SHA512

                  0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
                  Filesize

                  410B

                  MD5

                  ad5c7a3adb657108758c841f64edc87e

                  SHA1

                  0443fb71cbe4aa30cf4e53921181dac58f345c88

                  SHA256

                  3965cde680f8851ad95e994dab51f2bff156e859b9441939a0c400b74cf71ca4

                  SHA512

                  681dd0b69a7b4b71c43b970120efea0436a8dc3dc2609638c33e39e0a17c777008c8f83f827dd2ffff7ffccf71b5170128c8a9529e33242db3ea8e247634fb9c

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  344B

                  MD5

                  45d1ff91f9f71f49829ad38df05c299a

                  SHA1

                  83aa0f44b5a889e8377b74f46f4bbc179b1601e6

                  SHA256

                  e6045889d6b08f6bac741fa01835d1e6b201c636c351fca5753deeee3b521b38

                  SHA512

                  5e644dd77da3b606299dcef742c4487678f9037304159d439e7c1dcf4de46ed9a6110464f8d79e2c4380dbdf5ef9602a7ab04df147dbd8baf58bf7a8a35e29c7

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  344B

                  MD5

                  0ac7668f339873d96bd8d33733ef9551

                  SHA1

                  05de37ffb20355b6352f2bd6123b147d57ec13bd

                  SHA256

                  d04e9249bae5016bbadfc1fd66dac81a55e138a512c1548d6783bef48dd00225

                  SHA512

                  90446c5d3953a17a54f50dac0d97ebceb14e3390d493e3967f839254523acb624e5f7e791de7c524b1e76fcab11453b2310ff99417844a5e48ed35119b625015

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  344B

                  MD5

                  d19b62bb15b7704a0dd52219a7d077ce

                  SHA1

                  377028cc79c7d187bc64b84af32dca2748a3dab7

                  SHA256

                  0a8538f12bd8d18e89d1be22871a6675a2ff5d8edb111a1e2850eb50a8beb511

                  SHA512

                  b77c691844442d308f6d055f85f8451effe1d9f32de0f6ab7279a68fb7a1bdb2fb7272a6ea2fe6cfb2e1234b35685f1c7464ed9cec2ecc2338118c5145e432dc

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  344B

                  MD5

                  8886f7f21aa3ef02b7259fb629797bea

                  SHA1

                  0f990be093789e21e4496a61e342c3c32a254187

                  SHA256

                  c413f10f5bb06f4e8c618b2a73ad89772195f23e4dad23ddadb4a480f7adba0b

                  SHA512

                  01242ed42601f40d9e369a2e5b3f27f998ef0fdc899e43d571ddfc9396c03e343dd95327f0dc43f0f7630ff8d276732a48f9798e09f8782ba51dcde92aec279d

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  Filesize

                  344B

                  MD5

                  df0601646fa233e66982019f304ef2ac

                  SHA1

                  b76a9c2de61c960fa253b217f509af14b49173c5

                  SHA256

                  e8e4a8b0fc41412cc0d97fb6b5f00639390f62e21fd169298796edfa2d29004f

                  SHA512

                  94b125e6d43a1d06a3440404bdc997d471853d790d3d1afaabd94fbf95d2277ab6da0827404041df62c7304137593fbec6da1f439e35b5971b64e133cf0562ef

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
                  Filesize

                  392B

                  MD5

                  684e187091ee1bf16a2d939e2a75e5da

                  SHA1

                  2530941ddf389b2c2f07aa4b2db31ef5ca09354a

                  SHA256

                  60cf509a0a3baf8aad7bd567cf91bb178a4e440577ce694f60c9eabd917c7d84

                  SHA512

                  2f32e9f806ab34fa2f6b2958ad4d4fbeee49d0753eb64dfb2030ee11caff15b6f2e77656540c922b5644127fffc8bb3f400f841693d46800773ad39894d24391

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
                  Filesize

                  242B

                  MD5

                  c5be1078edb9824182b0af34d356047a

                  SHA1

                  43e374a12a3c05d9ddc8ca0dc4e6961f7782bda5

                  SHA256

                  bcaf209203ecf27b57afe3778df29af43058034f42e8484d55c66db7e1c1eb11

                  SHA512

                  7770b2cc8f2102372b405ababd7d550b53e99be11fe25d6eca4160ae05a07f9f4b119315e96d67973731b70f0e16c36aa86e85267dfe9d3b6d968bfa77d93202

                • C:\Users\Admin\AppData\Local\9af707ac-8640-402b-9fe4-a6e5760158ec\build2.exe
                  Filesize

                  342KB

                  MD5

                  26544ec9adc1864de80222fb0b38e6dc

                  SHA1

                  2ca52374bb468a8e2c10d39b64d1e4e9d7d0adee

                  SHA256

                  03b38ccf2c3145839d5ea7c5ccec609de3a67a7e435e94ca05c8c080d9df4411

                  SHA512

                  f7eb99db8eb4df15ac252bd4523a407b32089d22c435303499bc3813ecdf1ffbc8483417bb97e901fba3e3f36c6e9e47eb30fa78b7c461d3f78f5d5899fae730

                • C:\Users\Admin\AppData\Local\9af707ac-8640-402b-9fe4-a6e5760158ec\build3.exe
                  Filesize

                  299KB

                  MD5

                  41b883a061c95e9b9cb17d4ca50de770

                  SHA1

                  1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

                  SHA256

                  fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

                  SHA512

                  cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

                • C:\Users\Admin\AppData\Local\Temp\4B29.exe
                  Filesize

                  3.6MB

                  MD5

                  afe9a34bf591b41258ef9b84a5b1d5c3

                  SHA1

                  8ab093448ddee6e02dc5614f7d5fac49bc78d4aa

                  SHA256

                  4ae90772436f6c12c933e1479d9dd95758a15309063e47dd3b1728b004dfb566

                  SHA512

                  bdeef8490cd46d3875db80020b3fa3d00314548843005094b54ee657dd55ef2d6da898814bb611eadf42abf5e4bc8d403ce0caa3940bda5229d866bd5d2c801b

                • C:\Users\Admin\AppData\Local\Temp\4B29.exe
                  Filesize

                  3.2MB

                  MD5

                  644e9f4f596d24095dc54e1a2022788e

                  SHA1

                  8a474e5e478607548ccda334ba7c3e58d4f966a4

                  SHA256

                  7c258026c6d09b36df162a76c85d90c84c4189f2a41dfb9c67d287beb30fa007

                  SHA512

                  26196aafec91d91ee757260e6be4d7b641d6171f1966039b73bfc224371ea3fec831937dfd095092bf17446cdacd8aede51f0faa33e764bc7ab30a6c0092a45b

                • C:\Users\Admin\AppData\Local\Temp\4B29.exe
                  Filesize

                  2.1MB

                  MD5

                  53b49e892e787486a5a0cb2e89cd4dc6

                  SHA1

                  e24e8579913e1539404e08f95c89a507f459f6f4

                  SHA256

                  6fdf8ef65f7b32d9517b0a9df585d6d1c1d4dd4ba5cbc1e05b6c023985111ed6

                  SHA512

                  546e0e0520190c6a19d9ff5329e0ce89fe5e28ed38955a57a75f0b166655f24d440e48775d2ca80cb46ff29bc256b8ce378439c70124544fa8d0673934e95db8

                • C:\Users\Admin\AppData\Local\Temp\4B29.exe
                  Filesize

                  4.2MB

                  MD5

                  c04e8a7f5d7bbe44362f10e840d8b61a

                  SHA1

                  eabcfa20b3a5fee7cd75c7ab143ebd419ac75980

                  SHA256

                  28d208f6c8d25f488c46751ef8ce808c1313e9f1d3589063a218b4fe4affcd84

                  SHA512

                  d9f3f924b403ba2ba028277cba190338eb55a2c7ea75c8865cd09a83e6194ed1eace674ae23e85f029ad8a0c7e64d8fb70e8579f7680768577fe1be6fb623923

                • C:\Users\Admin\AppData\Local\Temp\6336.bat
                  Filesize

                  77B

                  MD5

                  55cc761bf3429324e5a0095cab002113

                  SHA1

                  2cc1ef4542a4e92d4158ab3978425d517fafd16d

                  SHA256

                  d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

                  SHA512

                  33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

                • C:\Users\Admin\AppData\Local\Temp\8DDF.exe
                  Filesize

                  802KB

                  MD5

                  9fe25c8086f471443ffbef376d79ca55

                  SHA1

                  2e7b24071bb9b662b0f524a369090ead506d4c77

                  SHA256

                  afead939da7d40739fcd4fcb90fb452a6ac0ef97ba485d40354cfb76fbed8c78

                  SHA512

                  074cbc33154ffcca4e8e692e4b0ff577f0897ee9be12a7bc85c8c4e8f8a5a237471d626b7c89850b48a27f9f4de5bf4c76f26a10c5854a2b358c7f2483517993

                • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
                  Filesize

                  8.3MB

                  MD5

                  fd2727132edd0b59fa33733daa11d9ef

                  SHA1

                  63e36198d90c4c2b9b09dd6786b82aba5f03d29a

                  SHA256

                  3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e

                  SHA512

                  3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

                • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
                  Filesize

                  492KB

                  MD5

                  fafbf2197151d5ce947872a4b0bcbe16

                  SHA1

                  a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020

                  SHA256

                  feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71

                  SHA512

                  acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6

                • C:\Users\Admin\AppData\Local\Temp\TarBCDA.tmp
                  Filesize

                  175KB

                  MD5

                  dd73cead4b93366cf3465c8cd32e2796

                  SHA1

                  74546226dfe9ceb8184651e920d1dbfb432b314e

                  SHA256

                  a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

                  SHA512

                  ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                  Filesize

                  281KB

                  MD5

                  d98e33b66343e7c96158444127a117f6

                  SHA1

                  bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                  SHA256

                  5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                  SHA512

                  705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe
                  Filesize

                  773KB

                  MD5

                  124d790dc10096a1c288be747d056581

                  SHA1

                  069518768d4935968c9c6b424bf529412cd83d92

                  SHA256

                  d823df60dab71125f639d23370020e67b98826f07532b70ff85cd00ea350d58c

                  SHA512

                  b9bf0475944fd2f9c82426d8a22d56f18bed067207f6d880f228ef0207387ce5a0a921dd05e8f3f72a9a0c34a3f1b4a2605a6165214dd2c8fe1ff6f1326c3064

                • C:\Users\Admin\AppData\Roaming\jeuwefw
                  Filesize

                  303KB

                  MD5

                  91971721b53c791bd1e4bef7ae44c4fc

                  SHA1

                  ffd271ebad1b0afae61b36a62d63352d38c703bd

                  SHA256

                  b119f003f9fca28111b386401a9da65eb1b6b36f6824b2145188aed2bacada1c

                  SHA512

                  25675855e0f4bb9727a1b7ffe63488f3a3a8bc85120bfd8be3187913dfd03d0db13f9f25fc79d06d3ee871b9e92b979df3a2a11b8e52812fcec858813d81a0ad

                • C:\Windows\rss\csrss.exe
                  Filesize

                  1.6MB

                  MD5

                  aa83ff9f0fe86f144bc9f240ba7b6573

                  SHA1

                  1269f469c4a063045dfe9951705c034554d5c779

                  SHA256

                  7b796df81f995b9bad3c096cb5b214786c597d6c3c180e8fbe460eb44e0ac0ce

                  SHA512

                  753ae8b4176a90a1c3175a6f6298b63a82f2e44de01a86d2691080656d1c7cc33d287769de1d2ea58508a74f9b0071b4e0e615c31ee1fd77e11d77f1408329de

                • \Users\Admin\AppData\Local\Temp\8DDF.exe
                  Filesize

                  384KB

                  MD5

                  fbf5c94dd697822506044fe35063a78f

                  SHA1

                  86cc90fc131caf18c3a650b965e3c0b5d09056d0

                  SHA256

                  2aefbcffa2d2a0b16c1e9f98d15f712c50dde230b98327dfcb85daa2ca6d967c

                  SHA512

                  5c05d90fe8aea4fa83805a78071d66c3ed84e88c4c48e65e624d9dac59da3d0b0a0d8d17a9cdea5d43ed61553b4a60a9648549525150c4e803ade5a2c6e998a3

                • \Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                  Filesize

                  94KB

                  MD5

                  d98e78fd57db58a11f880b45bb659767

                  SHA1

                  ab70c0d3bd9103c07632eeecee9f51d198ed0e76

                  SHA256

                  414035cc96d8bcc87ed173852a839ffbb45882a98c7a6f7b821e1668891deef0

                  SHA512

                  aafbd3eee102d0b682c4c854d69d50bac077e48f7f0dd8a5f913c6c73027aed7231d99fc9d716511759800da8c4f0f394b318821e9e47f6e62e436c8725a7831

                • \Users\Admin\AppData\Local\Temp\csrss\patch.exe
                  Filesize

                  1.7MB

                  MD5

                  13aaafe14eb60d6a718230e82c671d57

                  SHA1

                  e039dd924d12f264521b8e689426fb7ca95a0a7b

                  SHA256

                  f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3

                  SHA512

                  ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3

                • \Users\Admin\AppData\Local\Temp\dbghelp.dll
                  Filesize

                  1.5MB

                  MD5

                  f0616fa8bc54ece07e3107057f74e4db

                  SHA1

                  b33995c4f9a004b7d806c4bb36040ee844781fca

                  SHA256

                  6e58fcf4d763022b1f79a3c448eb2ebd8ad1c15df3acf58416893f1cbc699026

                  SHA512

                  15242e3f5652d7f1d0e31cebadfe2f238ca3222f0e927eb7feb644ab2b3d33132cf2316ee5089324f20f72f1650ad5bb8dd82b96518386ce5b319fb5ceb8313c

                • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe
                  Filesize

                  1.4MB

                  MD5

                  56c90767e95d64289d2d6f9ac45d486e

                  SHA1

                  ec2a8237e634a2560b6670ebd33fcfff460fd214

                  SHA256

                  678ea433b8266394f566492a13ff8e973bf4383b0b512415b5113a7b3affa776

                  SHA512

                  071f4dc8b9b01bb1bad59305e3ec5c1b09168e41612abf61e9c1c2e00d59bb48015740ede5ae4814e9ba904fd9409b492a0a49e81060d2a2184dafd978f9d147

                • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe
                  Filesize

                  923KB

                  MD5

                  42b388f24241fef7a81ad02dfb7c488f

                  SHA1

                  72706825fabc61f1abd3fb11299fb024028b0622

                  SHA256

                  fc5592b7d1a8ca53dfee98de2a55290b7884a87313bf0e4a65b194c4b941c314

                  SHA512

                  1fa79388c44370bf0c6b9adfcc9c77e5feaea28d6576febc8f4b73f3e04b80c94782dbbe06a4b46b6befd474226c5c56fafc6e57b843242d40dc6fe4a7f7fe2c

                • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe
                  Filesize

                  693KB

                  MD5

                  f675f17726992e20e6c7eedba325efe7

                  SHA1

                  1bcb2087717a0316d64e6aa848cdaa78527e8879

                  SHA256

                  ac6d9c6eba6dce199763f8503fbe5872eeb276606601679e1d4a3d4400c7582a

                  SHA512

                  06cce84991e45c7a5bb4cb71a19e188598bd89eaffe44f4eaa890ed26f266c78113446ee79a6844cfd519bca7c86187984b823f2f08cee4857ba8eecdfc1ff11

                • \Users\Admin\AppData\Local\Temp\osloader.exe
                  Filesize

                  591KB

                  MD5

                  e2f68dc7fbd6e0bf031ca3809a739346

                  SHA1

                  9c35494898e65c8a62887f28e04c0359ab6f63f5

                  SHA256

                  b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

                  SHA512

                  26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

                • \Users\Admin\AppData\Local\Temp\symsrv.dll
                  Filesize

                  163KB

                  MD5

                  5c399d34d8dc01741269ff1f1aca7554

                  SHA1

                  e0ceed500d3cef5558f3f55d33ba9c3a709e8f55

                  SHA256

                  e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f

                  SHA512

                  8ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d

                • \Windows\rss\csrss.exe
                  Filesize

                  3.6MB

                  MD5

                  5ccb5112775f764c54482e5e5014840a

                  SHA1

                  d4c8f8180deb3b88217a736382abe8aa5fe546a5

                  SHA256

                  71bf42f00aeb00bea0650c5a43631a7a0a3132b1a71ef1675d044e78a4bae23e

                  SHA512

                  f3b35888ed4a03c6e7a25628fdb38bf594884f4d4c2131072d0ad33a84fffc50cf15db06359949abc2ac60a1cfe94c08553bf93fab575cafec58cd5b9340f133

                • \Windows\rss\csrss.exe
                  Filesize

                  768KB

                  MD5

                  4d8313b0f706797b79c651fe293c6d50

                  SHA1

                  4d7a3b8a866b5cbfd39ab02697a9879d7a82e24c

                  SHA256

                  dadc6769ff813591ae90b952f44fa0005bffddfd043d3462f80e6f077fd532e5

                  SHA512

                  0db526678fdc2160cc95dd18a111c4d4956878c064951a233040beb6fcd00d46df4a8756346cf2dd918314936aa18cbab58e027063a63e93d08665533db64b96

                • memory/844-141-0x0000000000400000-0x0000000000644000-memory.dmp
                  Filesize

                  2.3MB

                • memory/844-144-0x0000000000400000-0x0000000000644000-memory.dmp
                  Filesize

                  2.3MB

                • memory/844-145-0x0000000000400000-0x0000000000644000-memory.dmp
                  Filesize

                  2.3MB

                • memory/844-312-0x0000000000400000-0x0000000000644000-memory.dmp
                  Filesize

                  2.3MB

                • memory/844-138-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
                  Filesize

                  4KB

                • memory/948-202-0x0000000000400000-0x0000000000406000-memory.dmp
                  Filesize

                  24KB

                • memory/948-204-0x0000000000400000-0x0000000000406000-memory.dmp
                  Filesize

                  24KB

                • memory/948-196-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
                  Filesize

                  4KB

                • memory/948-199-0x0000000000400000-0x0000000000406000-memory.dmp
                  Filesize

                  24KB

                • memory/1108-304-0x0000000000400000-0x0000000002D4A000-memory.dmp
                  Filesize

                  41.3MB

                • memory/1108-303-0x0000000000230000-0x0000000000330000-memory.dmp
                  Filesize

                  1024KB

                • memory/1108-316-0x0000000000400000-0x0000000002D4A000-memory.dmp
                  Filesize

                  41.3MB

                • memory/1160-146-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/1160-157-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/1160-98-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/1160-99-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/1160-120-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/1160-116-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/1160-115-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/1160-123-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/1160-122-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/1340-313-0x0000000004320000-0x0000000004336000-memory.dmp
                  Filesize

                  88KB

                • memory/1340-4-0x0000000002D10000-0x0000000002D26000-memory.dmp
                  Filesize

                  88KB

                • memory/1340-427-0x0000000002970000-0x0000000002971000-memory.dmp
                  Filesize

                  4KB

                • memory/1768-424-0x0000000000400000-0x000000000312D000-memory.dmp
                  Filesize

                  45.2MB

                • memory/1768-434-0x0000000000400000-0x000000000312D000-memory.dmp
                  Filesize

                  45.2MB

                • memory/1768-422-0x0000000004A70000-0x0000000004E68000-memory.dmp
                  Filesize

                  4.0MB

                • memory/1768-423-0x0000000004E70000-0x000000000575B000-memory.dmp
                  Filesize

                  8.9MB

                • memory/1768-421-0x0000000004A70000-0x0000000004E68000-memory.dmp
                  Filesize

                  4.0MB

                • memory/1864-597-0x00000000009E2000-0x00000000009F2000-memory.dmp
                  Filesize

                  64KB

                • memory/1996-195-0x00000000002B0000-0x00000000003B0000-memory.dmp
                  Filesize

                  1024KB

                • memory/1996-197-0x00000000001B0000-0x00000000001B4000-memory.dmp
                  Filesize

                  16KB

                • memory/2192-451-0x0000000004A30000-0x0000000004E28000-memory.dmp
                  Filesize

                  4.0MB

                • memory/2192-560-0x0000000000400000-0x000000000312D000-memory.dmp
                  Filesize

                  45.2MB

                • memory/2192-452-0x0000000004E30000-0x000000000571B000-memory.dmp
                  Filesize

                  8.9MB

                • memory/2192-453-0x0000000000400000-0x000000000312D000-memory.dmp
                  Filesize

                  45.2MB

                • memory/2192-552-0x0000000004A30000-0x0000000004E28000-memory.dmp
                  Filesize

                  4.0MB

                • memory/2240-5-0x0000000000400000-0x0000000002D4A000-memory.dmp
                  Filesize

                  41.3MB

                • memory/2240-1-0x0000000002E90000-0x0000000002F90000-memory.dmp
                  Filesize

                  1024KB

                • memory/2240-3-0x0000000000400000-0x0000000002D4A000-memory.dmp
                  Filesize

                  41.3MB

                • memory/2240-2-0x0000000000220000-0x000000000022B000-memory.dmp
                  Filesize

                  44KB

                • memory/2288-436-0x0000000004AC0000-0x0000000004EB8000-memory.dmp
                  Filesize

                  4.0MB

                • memory/2288-437-0x0000000000400000-0x000000000312D000-memory.dmp
                  Filesize

                  45.2MB

                • memory/2288-433-0x0000000004AC0000-0x0000000004EB8000-memory.dmp
                  Filesize

                  4.0MB

                • memory/2288-454-0x0000000000400000-0x000000000312D000-memory.dmp
                  Filesize

                  45.2MB

                • memory/2328-629-0x0000000000400000-0x00000000008DF000-memory.dmp
                  Filesize

                  4.9MB

                • memory/2328-607-0x0000000000400000-0x00000000008DF000-memory.dmp
                  Filesize

                  4.9MB

                • memory/2372-450-0x00000000043E0000-0x00000000043E1000-memory.dmp
                  Filesize

                  4KB

                • memory/2372-548-0x00000000043E0000-0x00000000043E1000-memory.dmp
                  Filesize

                  4KB

                • memory/2432-136-0x0000000002E80000-0x0000000002F80000-memory.dmp
                  Filesize

                  1024KB

                • memory/2432-139-0x0000000000230000-0x0000000000261000-memory.dmp
                  Filesize

                  196KB

                • memory/2600-37-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/2600-36-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/2600-30-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
                  Filesize

                  4KB

                • memory/2600-76-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/2600-33-0x0000000000400000-0x0000000000537000-memory.dmp
                  Filesize

                  1.2MB

                • memory/2628-606-0x0000000000400000-0x00000000008DF000-memory.dmp
                  Filesize

                  4.9MB

                • memory/2628-609-0x0000000000400000-0x00000000008DF000-memory.dmp
                  Filesize

                  4.9MB

                • memory/2708-27-0x00000000002E0000-0x0000000000372000-memory.dmp
                  Filesize

                  584KB

                • memory/2708-26-0x00000000002E0000-0x0000000000372000-memory.dmp
                  Filesize

                  584KB

                • memory/2708-31-0x00000000046A0000-0x00000000047BB000-memory.dmp
                  Filesize

                  1.1MB

                • memory/2916-77-0x0000000002DD0000-0x0000000002E62000-memory.dmp
                  Filesize

                  584KB

                • memory/2916-93-0x0000000002DD0000-0x0000000002E62000-memory.dmp
                  Filesize

                  584KB

                • memory/2920-461-0x0000000140000000-0x00000001405E8000-memory.dmp
                  Filesize

                  5.9MB

                • memory/2920-475-0x0000000140000000-0x00000001405E8000-memory.dmp
                  Filesize

                  5.9MB

                • memory/2936-371-0x00000000009C0000-0x0000000000AC0000-memory.dmp
                  Filesize

                  1024KB

                • memory/2936-311-0x00000000009C0000-0x0000000000AC0000-memory.dmp
                  Filesize

                  1024KB