Analysis

  • max time kernel
    117s
  • max time network
    153s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-04-2024 12:29

General

  • Target

    1609f52b8c157735048cf19be722172aceffad5d336e249d92eca8518a11e280.exe

  • Size

    1.8MB

  • MD5

    8e65dfc026f983f04d33976e97137e0f

  • SHA1

    d12a4e7fd6393e822b04ec4d278047d7b1e6cc24

  • SHA256

    1609f52b8c157735048cf19be722172aceffad5d336e249d92eca8518a11e280

  • SHA512

    f0606c18849a3dbd22e3791ed81c6c890f3673d3320df2a7c296e759db900e68aafe820c1de8e3ae310aeeed6768814a0de02a2e5207744e79b49fbd5052e3ec

  • SSDEEP

    49152:DFa5gm5GvNjUbvtoD1rqb+AlC0pa5vrYyCRt:xlm8etKrlRWRt

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

185.172.128.33:8970

Extracted

Family

redline

Botnet

LiveTraffic

C2

4.184.225.183:30592

Extracted

Family

stealc

C2

http://52.143.157.84

Attributes
  • url_path

    /c73eed764cc59dcb.php

Extracted

Family

xehook

C2

https://unotree.ru/

https://aiwhcpoaw.ru/

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

103.249.112.118:8848

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Detect Xehook Payload 1 IoCs
  • Detect ZGRat V1 2 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 7 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 8 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Xehook stealer

    Xehook is an infostealer written in C#.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 17 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 9 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1609f52b8c157735048cf19be722172aceffad5d336e249d92eca8518a11e280.exe
    "C:\Users\Admin\AppData\Local\Temp\1609f52b8c157735048cf19be722172aceffad5d336e249d92eca8518a11e280.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1220
  • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
    C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3732
    • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe
      "C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:2600
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
            PID:700
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 888
            3⤵
            • Program crash
            PID:2088
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1672
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3880
            • C:\Windows\system32\netsh.exe
              netsh wlan show profiles
              4⤵
                PID:3932
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\017659663955_Desktop.zip' -CompressionLevel Optimal
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:556
          • C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe
            "C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2960
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2732
              • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
                "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
                4⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3804
              • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
                "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3476
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
            2⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            PID:4932
          • C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe
            "C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4600
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
                PID:4172
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2192
            • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
              "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1440
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe" /F
                3⤵
                • Creates scheduled task(s)
                PID:2792
            • C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe
              "C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"
              2⤵
              • Executes dropped EXE
              PID:2800
            • C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe
              "C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4784
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                3⤵
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:4116
            • C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe
              "C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1612
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                3⤵
                  PID:2548
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4228
                  • C:\Users\Admin\Pictures\WlAxwviXwTMIchh9XFtEwmDY.exe
                    "C:\Users\Admin\Pictures\WlAxwviXwTMIchh9XFtEwmDY.exe"
                    4⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3644
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      5⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3988
                    • C:\Users\Admin\Pictures\WlAxwviXwTMIchh9XFtEwmDY.exe
                      "C:\Users\Admin\Pictures\WlAxwviXwTMIchh9XFtEwmDY.exe"
                      5⤵
                      • Executes dropped EXE
                      PID:3020
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        6⤵
                          PID:3832
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                          6⤵
                            PID:2948
                            • C:\Windows\system32\netsh.exe
                              netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                              7⤵
                              • Modifies Windows Firewall
                              PID:3820
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            6⤵
                              PID:4796
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              6⤵
                                PID:132
                          • C:\Users\Admin\Pictures\3lN5RWqcFT8TtJEh3C8A84rf.exe
                            "C:\Users\Admin\Pictures\3lN5RWqcFT8TtJEh3C8A84rf.exe"
                            4⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2204
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              5⤵
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2372
                            • C:\Users\Admin\Pictures\3lN5RWqcFT8TtJEh3C8A84rf.exe
                              "C:\Users\Admin\Pictures\3lN5RWqcFT8TtJEh3C8A84rf.exe"
                              5⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              PID:2384
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                6⤵
                                  PID:3800
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                  6⤵
                                    PID:4556
                                    • C:\Windows\system32\netsh.exe
                                      netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                      7⤵
                                      • Modifies Windows Firewall
                                      PID:3796
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -nologo -noprofile
                                    6⤵
                                      PID:4076
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -nologo -noprofile
                                      6⤵
                                        PID:2424
                                      • C:\Windows\rss\csrss.exe
                                        C:\Windows\rss\csrss.exe
                                        6⤵
                                          PID:2028
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -nologo -noprofile
                                            7⤵
                                              PID:392
                                            • C:\Windows\SYSTEM32\schtasks.exe
                                              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                              7⤵
                                              • Creates scheduled task(s)
                                              PID:3636
                                            • C:\Windows\SYSTEM32\schtasks.exe
                                              schtasks /delete /tn ScheduledUpdate /f
                                              7⤵
                                                PID:3176
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -nologo -noprofile
                                                7⤵
                                                  PID:2784
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -nologo -noprofile
                                                  7⤵
                                                    PID:4676
                                            • C:\Users\Admin\Pictures\1KXlEFC5km6lcFHXQb08acw9.exe
                                              "C:\Users\Admin\Pictures\1KXlEFC5km6lcFHXQb08acw9.exe"
                                              4⤵
                                                PID:3884
                                          • C:\Users\Admin\AppData\Local\Temp\1000193001\dirtquire.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000193001\dirtquire.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            PID:4996
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                              3⤵
                                                PID:1948
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                3⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2864
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Start-Process 'C:\Users\Admin\AppData\Roaming\TYGGCUKFG3.exe'"
                                                  4⤵
                                                    PID:484
                                              • C:\Users\Admin\AppData\Local\Temp\1000196001\app.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1000196001\app.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3596
                                                • C:\Windows\system32\SCHtAsKs.EXe
                                                  "SCHtAsKs.EXe" /create /tn WindowsUpdates /TR 'C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE' /du 9999:59 /sc daily /ri 1
                                                  3⤵
                                                  • Creates scheduled task(s)
                                                  PID:4528
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                                  3⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:4876
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1916 -ip 1916
                                              1⤵
                                                PID:2876
                                              • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                1⤵
                                                • Executes dropped EXE
                                                PID:3132
                                              • C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE
                                                C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE
                                                1⤵
                                                  PID:3060
                                                • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                  C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                  1⤵
                                                    PID:5032
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                    1⤵
                                                      PID:4076
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                      1⤵
                                                        PID:2968

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\ProgramData\mozglue.dll

                                                        Filesize

                                                        593KB

                                                        MD5

                                                        c8fd9be83bc728cc04beffafc2907fe9

                                                        SHA1

                                                        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                        SHA256

                                                        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                        SHA512

                                                        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                      • C:\ProgramData\nss3.dll

                                                        Filesize

                                                        2.0MB

                                                        MD5

                                                        1cc453cdf74f31e4d913ff9c10acdde2

                                                        SHA1

                                                        6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                        SHA256

                                                        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                        SHA512

                                                        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        ac4917a885cf6050b1a483e4bc4d2ea5

                                                        SHA1

                                                        b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f

                                                        SHA256

                                                        e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9

                                                        SHA512

                                                        092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                        Filesize

                                                        19KB

                                                        MD5

                                                        f5ebb8678f4ee2f92a2b5dccf3ae80c9

                                                        SHA1

                                                        636ec6332c4994cc1bb1bfdb37de9dac69595cbb

                                                        SHA256

                                                        56389a275d772a4dce1d3a6211d39375b731528391ecf2f32006887b336d16e5

                                                        SHA512

                                                        a3bc2d22bbe20e638b91af2a1326edf4aca2e5d2d3770ecd2eafda6c69582f4c425a78aa7183422eb5911490c885436a2ffa3ecedcf30aeb442ec537d3d76c59

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        b3a83d0196afc480a90a1e7444210036

                                                        SHA1

                                                        6376ef283df20976769287b3bdc6bcd5d5ce371f

                                                        SHA256

                                                        3ac4190b1c447f3b5365b056150575ec779ffba10b82d940c93009e2f6809a07

                                                        SHA512

                                                        dfff8f23370ae8ab390b8a3dd675dd71ca6a8d0fac0f0c9a8b43453763ba5fa96a79a4b5a8891bcac86996471b912ca51dfc6b877d647391d14e355191d77370

                                                      • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe

                                                        Filesize

                                                        321KB

                                                        MD5

                                                        1c7d0f34bb1d85b5d2c01367cc8f62ef

                                                        SHA1

                                                        33aedadb5361f1646cffd68791d72ba5f1424114

                                                        SHA256

                                                        e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c

                                                        SHA512

                                                        53bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d

                                                      • C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        85a15f080b09acace350ab30460c8996

                                                        SHA1

                                                        3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                                                        SHA256

                                                        3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                                                        SHA512

                                                        ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

                                                      • C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe

                                                        Filesize

                                                        488KB

                                                        MD5

                                                        82053649cadec1a338509e46ba776fbd

                                                        SHA1

                                                        6d8e479a6dc76d54109bb2e602b8087d55537510

                                                        SHA256

                                                        30468f8b767772214c60a701ecfee11c634516c3e2de146cd07638ea00dd0b6e

                                                        SHA512

                                                        e4b2b219483477a73fec5a207012f77c7167bf7b7f9adcb80ee92f87ddfe592a0d520f2afee531d1cce926ef56da2b065b13630a1cc171f48db8f7987e10897a

                                                      • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe

                                                        Filesize

                                                        418KB

                                                        MD5

                                                        0099a99f5ffb3c3ae78af0084136fab3

                                                        SHA1

                                                        0205a065728a9ec1133e8a372b1e3864df776e8c

                                                        SHA256

                                                        919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                        SHA512

                                                        5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                                      • C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe

                                                        Filesize

                                                        304KB

                                                        MD5

                                                        8510bcf5bc264c70180abe78298e4d5b

                                                        SHA1

                                                        2c3a2a85d129b0d750ed146d1d4e4d6274623e28

                                                        SHA256

                                                        096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6

                                                        SHA512

                                                        5ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d

                                                      • C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe

                                                        Filesize

                                                        158KB

                                                        MD5

                                                        586f7fecacd49adab650fae36e2db994

                                                        SHA1

                                                        35d9fb512a8161ce867812633f0a43b042f9a5e6

                                                        SHA256

                                                        cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e

                                                        SHA512

                                                        a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772

                                                      • C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe

                                                        Filesize

                                                        3.3MB

                                                        MD5

                                                        b9882fe8bb7ab2a4d094f9ff5442df1c

                                                        SHA1

                                                        e17c146530a4371e0595c195c24863935a3dee8b

                                                        SHA256

                                                        4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628

                                                        SHA512

                                                        bee33d43deb43854975e6c7a57f27ab8c6519ea3e6df51297ca670ac62831f29f6a18eff0bb0af14f9e985ebf9e2169ed97582fa64998cfb33b1d8b61ec72db4

                                                      • C:\Users\Admin\AppData\Local\Temp\1000193001\dirtquire.exe

                                                        Filesize

                                                        273KB

                                                        MD5

                                                        e795115169cc800de0392d6a675d58fd

                                                        SHA1

                                                        8dd75837e360ba1cb8acf5a3d348dd020a5da482

                                                        SHA256

                                                        17f929c1d40a7fd6f897c0b15ca9c44b2059cbccb3037c31619d87954659478e

                                                        SHA512

                                                        5fb6543e91de175bd365462a1cc87d6772e43b0effd3757b3e408b08a4de5a004de9a85e7f1d09578fa3bc6b6486c5f5016c1b879496582dbb39b2e62e168f38

                                                      • C:\Users\Admin\AppData\Local\Temp\1000196001\app.exe

                                                        Filesize

                                                        89KB

                                                        MD5

                                                        12de70d06ed65680914d061347ac1f95

                                                        SHA1

                                                        14023e1ed46236cbfb463ddccd6345caa3c14d54

                                                        SHA256

                                                        46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339

                                                        SHA512

                                                        7d6a20b0e9d6c5db0177e08f197f7858aa8000097c5eb2fa7a2b3d2181fefb53760efacd7fcba32d481193eee547162ac22b08b8e8777b68fc1597dec12db67f

                                                      • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe

                                                        Filesize

                                                        1.8MB

                                                        MD5

                                                        8e65dfc026f983f04d33976e97137e0f

                                                        SHA1

                                                        d12a4e7fd6393e822b04ec4d278047d7b1e6cc24

                                                        SHA256

                                                        1609f52b8c157735048cf19be722172aceffad5d336e249d92eca8518a11e280

                                                        SHA512

                                                        f0606c18849a3dbd22e3791ed81c6c890f3673d3320df2a7c296e759db900e68aafe820c1de8e3ae310aeeed6768814a0de02a2e5207744e79b49fbd5052e3ec

                                                      • C:\Users\Admin\AppData\Local\Temp\TmpF983.tmp

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        1420d30f964eac2c85b2ccfe968eebce

                                                        SHA1

                                                        bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                        SHA256

                                                        f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                        SHA512

                                                        6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kkfisvng.ig4.ps1

                                                        Filesize

                                                        60B

                                                        MD5

                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                        SHA1

                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                        SHA256

                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                        SHA512

                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-801765966-3955847401-2235691403-1000\76b53b3ec448f7ccdda2063b15d2bfc3_46facfa6-6cf2-4847-999f-1119d7ee97f4

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        a63bdd117184cb17d8f1f447baea538b

                                                        SHA1

                                                        11aad43a2395652ee2b932ca1be3a440383a4a83

                                                        SHA256

                                                        0cf474fbbc8765aa8b270221ea4d9ebd3e1c8fb15cb5bcfe57c469f2292d0c1b

                                                        SHA512

                                                        85c20927b29e91e46faf61187a35d2954019ba9af48c282cfd353cddec50ac2d6efd8d5cbc8d0a64fbf12fc7ee388154008d4a81c03eb5f5b2f22eca7487f76c

                                                      • C:\Users\Admin\AppData\Roaming\TYGGCUKFG3.exe

                                                        Filesize

                                                        70KB

                                                        MD5

                                                        84ea09936faeb81811a6108cc985fd56

                                                        SHA1

                                                        55b1976fdebc47692b6560d2203b0f3eac913aa3

                                                        SHA256

                                                        92d5c2815c26920f1f156815e161b285c284391f0cc19cdf8fe58b505f996d7e

                                                        SHA512

                                                        9500f24cc4f4c3f28be464878315f8f50effec8d2cfec9777519016a63421f8ce873229111c6adb382206581add667c90773d8cc0e0f1a23754ea5555c9b24d5

                                                      • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                                        Filesize

                                                        109KB

                                                        MD5

                                                        154c3f1334dd435f562672f2664fea6b

                                                        SHA1

                                                        51dd25e2ba98b8546de163b8f26e2972a90c2c79

                                                        SHA256

                                                        5f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f

                                                        SHA512

                                                        1bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841

                                                      • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                                                        Filesize

                                                        1.2MB

                                                        MD5

                                                        f35b671fda2603ec30ace10946f11a90

                                                        SHA1

                                                        059ad6b06559d4db581b1879e709f32f80850872

                                                        SHA256

                                                        83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7

                                                        SHA512

                                                        b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

                                                      • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe

                                                        Filesize

                                                        541KB

                                                        MD5

                                                        1fc4b9014855e9238a361046cfbf6d66

                                                        SHA1

                                                        c17f18c8246026c9979ab595392a14fe65cc5e9f

                                                        SHA256

                                                        f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

                                                        SHA512

                                                        2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

                                                      • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe

                                                        Filesize

                                                        304KB

                                                        MD5

                                                        cc90e3326d7b20a33f8037b9aab238e4

                                                        SHA1

                                                        236d173a6ac462d85de4e866439634db3b9eeba3

                                                        SHA256

                                                        bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

                                                        SHA512

                                                        b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

                                                      • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        e616e802c7c321c0f3b5af7c3f302fad

                                                        SHA1

                                                        6816a8b855036529e51b93b3b4f351ff035c5033

                                                        SHA256

                                                        683458e127a2906bf57c930872539c719ff648242fb13fc917511984d6769806

                                                        SHA512

                                                        440da6fb1b59e7e3a828144688086fcb1009f27410ec65a208a8a9cd084375f9a9e4533259addc80c524eb12227d4136f9c8c3cc50f35cdba13ea63641e709f3

                                                      • C:\Users\Admin\Pictures\1KXlEFC5km6lcFHXQb08acw9.exe

                                                        Filesize

                                                        5.5MB

                                                        MD5

                                                        e1c8071bbd8e2132c3fef479b49f3e52

                                                        SHA1

                                                        2e52d479233235a3dfb3a3062afb6703ca136757

                                                        SHA256

                                                        74242b7eda0f783a96583f3d1afc2ad5510fc8ebb36061a76a320ee7ab3af462

                                                        SHA512

                                                        e7ed12c8c2e488e8d6071d022d58edb2b1ef02069f6555bd07c9580fdf002c11d39b70091172b4fb35e02e0ef118b6466eb522c1f5ce4bb42af1afbe5da37f28

                                                      • C:\Users\Admin\Pictures\WlAxwviXwTMIchh9XFtEwmDY.exe

                                                        Filesize

                                                        4.1MB

                                                        MD5

                                                        782bd8a27c54fc9c58ea40e8a3e8f03c

                                                        SHA1

                                                        2b500d25ce1260d21ac710665a63f4ba3f239272

                                                        SHA256

                                                        9c3a3426921d1425ffae5e2da871be86df71a75413f63a0b07a07f29c6267d57

                                                        SHA512

                                                        972e24980c5d571e75ebe49f5779d9950d9afebc1e301746c6b16115139abf2893c8135b04c358284b30c1ca31872d1f542d41a5ccc794256f0e2b0641c272ed

                                                      • C:\Users\Admin\Pictures\jwERrkI7whaOAjJuxIc6T2Xw.exe

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        5b423612b36cde7f2745455c5dd82577

                                                        SHA1

                                                        0187c7c80743b44e9e0c193e993294e3b969cc3d

                                                        SHA256

                                                        e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                                        SHA512

                                                        c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                                      • C:\Users\Public\Desktop\Google Chrome.lnk

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        ded923608e0c1a64ee39b7a09b7f8629

                                                        SHA1

                                                        9140fc51e1cfa580941accabb9586622c278dab3

                                                        SHA256

                                                        15df7e8886dbb0f7e43f792416d5f8122e276a1b50a3f9ca4c5e326dc2eac62b

                                                        SHA512

                                                        06b4d11ba1a218f654679adb5fd0753b85213bb6b035b1ca3d57cd5735017b830c17a4858b9287bb28928ecddeb412c91952d148406679f10e06e1958d1788a5

                                                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        d0c46cad6c0778401e21910bd6b56b70

                                                        SHA1

                                                        7be418951ea96326aca445b8dfe449b2bfa0dca6

                                                        SHA256

                                                        9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

                                                        SHA512

                                                        057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

                                                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                        Filesize

                                                        19KB

                                                        MD5

                                                        074834b3a447f0efd0cc89d9e2666911

                                                        SHA1

                                                        3498520d02ae592db0ac65a4590836119f492c5f

                                                        SHA256

                                                        bf8a77923931b0d5457ff6f16986c8cf8274a1a24301dc1ddc618d1ef8ca9f6f

                                                        SHA512

                                                        caa2b9def393cb71593dfefe9e7ead3639b66df364dd6de58d682a13f6f0bf0aa2db475538a9bb45f605e69412f7a60dc1f84859310564c479a6be3c87a63ead

                                                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                        Filesize

                                                        19KB

                                                        MD5

                                                        68a0374ff5973e9b7e2f6b1135955401

                                                        SHA1

                                                        320c1772de1792a7e7d95bb77ad7e8501f80555d

                                                        SHA256

                                                        29b6a67aa1a8bfe9661c2b05c7c9b6dea472dd633c1898da295a4b113ff4a94b

                                                        SHA512

                                                        de31211e80d495ad070d503911d756de640b196e672eba921dc2b9b215860d0d80283140708ba02b414fab191aae36bf34ecb757a2ffb8686f64842818f9915d

                                                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                        Filesize

                                                        19KB

                                                        MD5

                                                        1284016cbdd24690353d076e5b0f8e55

                                                        SHA1

                                                        b110bfd2b266affae8fc90833e745e4308b0384a

                                                        SHA256

                                                        1eceb150a367fa8d55d28782df6da162768bb6d178dbf9453a72c8db893b4cae

                                                        SHA512

                                                        9d07f8ba91df48be73665cacc46fb431bef52c87aa78a7ce274b269be9236b3fd8de44d80d765c51e53fa5859302df066f53754a6d9b7f343bc68234c55eb9ee

                                                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                        Filesize

                                                        19KB

                                                        MD5

                                                        183bf35ddcfb0cd8e15bb3539d2f7590

                                                        SHA1

                                                        06028a4d59c62606fbba7d7c2993ce8ff14451e2

                                                        SHA256

                                                        428cb9cf0e17d267a0ed0e6d78dcb96fe099e3ab2a19727dd7f1fcf7c60fe37c

                                                        SHA512

                                                        35c8e11dfc42897a5d40d7595488198608c8d97c89d36f3a1c805cb3628df1a69a82840abf434f411d59f0e16ada2a9de10766969ea3a1357359428ce704475a

                                                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                        Filesize

                                                        19KB

                                                        MD5

                                                        5e5aff2a5d127a819636a78cfab997c5

                                                        SHA1

                                                        ffae752d372193ccedcc9fc9442a534cc851efdf

                                                        SHA256

                                                        e8f1e6c7d67b5332eaff9e4c85ca36b625522cc6469822fa81e5e4bbfae90fb8

                                                        SHA512

                                                        5c32e2ed18035b32589a63d3bdd12c8cfa86c6dc080a9fe9255873f8b1d8835fdac04b1cc6aeccabfcc093198b5a6d93ba5fc40f66cd2d392aaed1181ab55d33

                                                      • C:\Windows\System32\GroupPolicy\gpt.ini

                                                        Filesize

                                                        127B

                                                        MD5

                                                        8ef9853d1881c5fe4d681bfb31282a01

                                                        SHA1

                                                        a05609065520e4b4e553784c566430ad9736f19f

                                                        SHA256

                                                        9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

                                                        SHA512

                                                        5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

                                                      • memory/556-85-0x00000217464B0000-0x00000217464BA000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/556-82-0x000002175E6E0000-0x000002175E6F0000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/556-83-0x000002175E6E0000-0x000002175E6F0000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/556-84-0x000002175E6A0000-0x000002175E6B2000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/556-91-0x00007FFD45150000-0x00007FFD45C12000-memory.dmp

                                                        Filesize

                                                        10.8MB

                                                      • memory/556-77-0x0000021746470000-0x0000021746492000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/556-81-0x00007FFD45150000-0x00007FFD45C12000-memory.dmp

                                                        Filesize

                                                        10.8MB

                                                      • memory/700-53-0x0000000000400000-0x000000000044C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/700-50-0x0000000000400000-0x000000000044C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/700-55-0x0000000001430000-0x0000000001431000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/700-56-0x0000000000400000-0x000000000044C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/1220-2-0x0000000000C80000-0x0000000001151000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1220-1-0x0000000077BC6000-0x0000000077BC8000-memory.dmp

                                                        Filesize

                                                        8KB

                                                      • memory/1220-6-0x0000000005410000-0x0000000005411000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/1220-7-0x0000000005420000-0x0000000005421000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/1220-3-0x0000000005440000-0x0000000005441000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/1220-14-0x0000000000C80000-0x0000000001151000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1220-5-0x0000000005470000-0x0000000005471000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/1220-4-0x0000000005430000-0x0000000005431000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/1220-0-0x0000000000C80000-0x0000000001151000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1220-8-0x0000000005490000-0x0000000005491000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/1220-9-0x0000000005480000-0x0000000005481000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/1916-47-0x0000000073580000-0x0000000073D31000-memory.dmp

                                                        Filesize

                                                        7.7MB

                                                      • memory/1916-57-0x0000000073580000-0x0000000073D31000-memory.dmp

                                                        Filesize

                                                        7.7MB

                                                      • memory/1916-46-0x0000000000FD0000-0x0000000001022000-memory.dmp

                                                        Filesize

                                                        328KB

                                                      • memory/1916-54-0x0000000003550000-0x0000000005550000-memory.dmp

                                                        Filesize

                                                        32.0MB

                                                      • memory/2028-882-0x0000000000400000-0x0000000001DEE000-memory.dmp

                                                        Filesize

                                                        25.9MB

                                                      • memory/2192-206-0x0000000000400000-0x0000000000452000-memory.dmp

                                                        Filesize

                                                        328KB

                                                      • memory/2192-208-0x0000000073580000-0x0000000073D31000-memory.dmp

                                                        Filesize

                                                        7.7MB

                                                      • memory/2192-210-0x0000000005580000-0x0000000005590000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/2204-606-0x0000000000400000-0x0000000001DEE000-memory.dmp

                                                        Filesize

                                                        25.9MB

                                                      • memory/2384-706-0x0000000000400000-0x0000000001DEE000-memory.dmp

                                                        Filesize

                                                        25.9MB

                                                      • memory/2384-801-0x0000000000400000-0x0000000001DEE000-memory.dmp

                                                        Filesize

                                                        25.9MB

                                                      • memory/2732-117-0x0000000000400000-0x0000000000592000-memory.dmp

                                                        Filesize

                                                        1.6MB

                                                      • memory/2732-125-0x0000000073580000-0x0000000073D31000-memory.dmp

                                                        Filesize

                                                        7.7MB

                                                      • memory/2732-124-0x00000000058A0000-0x00000000058B0000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/2864-439-0x0000000000400000-0x000000000041C000-memory.dmp

                                                        Filesize

                                                        112KB

                                                      • memory/2960-112-0x0000000000950000-0x0000000000B0C000-memory.dmp

                                                        Filesize

                                                        1.7MB

                                                      • memory/2960-113-0x0000000073580000-0x0000000073D31000-memory.dmp

                                                        Filesize

                                                        7.7MB

                                                      • memory/2960-114-0x0000000005590000-0x00000000055A0000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/2960-120-0x0000000002FE0000-0x0000000004FE0000-memory.dmp

                                                        Filesize

                                                        32.0MB

                                                      • memory/2960-121-0x0000000073580000-0x0000000073D31000-memory.dmp

                                                        Filesize

                                                        7.7MB

                                                      • memory/3020-705-0x0000000000400000-0x0000000001DEE000-memory.dmp

                                                        Filesize

                                                        25.9MB

                                                      • memory/3020-806-0x0000000000400000-0x0000000001DEE000-memory.dmp

                                                        Filesize

                                                        25.9MB

                                                      • memory/3476-230-0x000000001DD10000-0x000000001DE1A000-memory.dmp

                                                        Filesize

                                                        1.0MB

                                                      • memory/3476-150-0x00007FFD45150000-0x00007FFD45C12000-memory.dmp

                                                        Filesize

                                                        10.8MB

                                                      • memory/3476-154-0x000000001B830000-0x000000001B840000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/3476-231-0x000000001B800000-0x000000001B812000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/3476-232-0x000000001C630000-0x000000001C66C000-memory.dmp

                                                        Filesize

                                                        240KB

                                                      • memory/3476-151-0x0000000000A30000-0x0000000000ABC000-memory.dmp

                                                        Filesize

                                                        560KB

                                                      • memory/3596-503-0x0000000002450000-0x0000000002451000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3644-603-0x0000000000400000-0x0000000001DEE000-memory.dmp

                                                        Filesize

                                                        25.9MB

                                                      • memory/3732-396-0x0000000000DC0000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3732-20-0x00000000055D0000-0x00000000055D1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3732-59-0x0000000000DC0000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3732-92-0x0000000000DC0000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3732-341-0x0000000000DC0000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3732-26-0x0000000005600000-0x0000000005601000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3732-388-0x0000000000DC0000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3732-646-0x0000000000DC0000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3732-17-0x0000000000DC0000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3732-418-0x0000000000DC0000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3732-849-0x0000000000DC0000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3732-18-0x0000000000DC0000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3732-205-0x0000000000DC0000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3732-23-0x0000000005590000-0x0000000005591000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3732-24-0x00000000055A0000-0x00000000055A1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3732-266-0x0000000000DC0000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3732-767-0x0000000000DC0000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3732-21-0x00000000055B0000-0x00000000055B1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3732-523-0x0000000000DC0000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3732-58-0x0000000000DC0000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3732-22-0x00000000055F0000-0x00000000055F1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3732-19-0x00000000055C0000-0x00000000055C1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3732-25-0x0000000005610000-0x0000000005611000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3804-175-0x0000000006970000-0x0000000006982000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/3804-146-0x0000000000970000-0x00000000009C2000-memory.dmp

                                                        Filesize

                                                        328KB

                                                      • memory/3804-170-0x00000000067A0000-0x00000000067BE000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/3804-169-0x0000000005E80000-0x0000000005EF6000-memory.dmp

                                                        Filesize

                                                        472KB

                                                      • memory/3804-174-0x0000000006A30000-0x0000000006B3A000-memory.dmp

                                                        Filesize

                                                        1.0MB

                                                      • memory/3804-176-0x00000000069D0000-0x0000000006A0C000-memory.dmp

                                                        Filesize

                                                        240KB

                                                      • memory/3804-173-0x0000000006EE0000-0x00000000074F8000-memory.dmp

                                                        Filesize

                                                        6.1MB

                                                      • memory/3804-153-0x0000000005550000-0x0000000005560000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/3804-177-0x0000000006B40000-0x0000000006B8C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/3804-152-0x0000000005360000-0x000000000536A000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/3804-145-0x0000000073580000-0x0000000073D31000-memory.dmp

                                                        Filesize

                                                        7.7MB

                                                      • memory/3804-149-0x00000000053C0000-0x0000000005452000-memory.dmp

                                                        Filesize

                                                        584KB

                                                      • memory/3804-147-0x00000000058D0000-0x0000000005E76000-memory.dmp

                                                        Filesize

                                                        5.6MB

                                                      • memory/3884-915-0x00007FF7254F0000-0x00007FF725C26000-memory.dmp

                                                        Filesize

                                                        7.2MB

                                                      • memory/3884-917-0x00007FF7254F0000-0x00007FF725C26000-memory.dmp

                                                        Filesize

                                                        7.2MB

                                                      • memory/3884-922-0x00007FF7254F0000-0x00007FF725C26000-memory.dmp

                                                        Filesize

                                                        7.2MB

                                                      • memory/3884-921-0x00007FF7254F0000-0x00007FF725C26000-memory.dmp

                                                        Filesize

                                                        7.2MB

                                                      • memory/3884-912-0x00007FF7254F0000-0x00007FF725C26000-memory.dmp

                                                        Filesize

                                                        7.2MB

                                                      • memory/3884-910-0x00007FF7254F0000-0x00007FF725C26000-memory.dmp

                                                        Filesize

                                                        7.2MB

                                                      • memory/3884-920-0x00007FF7254F0000-0x00007FF725C26000-memory.dmp

                                                        Filesize

                                                        7.2MB

                                                      • memory/3884-919-0x00007FF7254F0000-0x00007FF725C26000-memory.dmp

                                                        Filesize

                                                        7.2MB

                                                      • memory/4116-345-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                        Filesize

                                                        972KB

                                                      • memory/4116-335-0x0000000000400000-0x000000000063B000-memory.dmp

                                                        Filesize

                                                        2.2MB

                                                      • memory/4116-331-0x0000000000400000-0x000000000063B000-memory.dmp

                                                        Filesize

                                                        2.2MB

                                                      • memory/4228-419-0x0000000000400000-0x0000000000408000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/4600-207-0x0000000000410000-0x000000000048D000-memory.dmp

                                                        Filesize

                                                        500KB

                                                      • memory/4600-209-0x0000000000410000-0x000000000048D000-memory.dmp

                                                        Filesize

                                                        500KB

                                                      • memory/4876-513-0x0000000000400000-0x0000000000416000-memory.dmp

                                                        Filesize

                                                        88KB