Analysis

  • max time kernel
    101s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-05-2024 22:58

General

  • Target

    5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe

  • Size

    389KB

  • MD5

    b8974e005f6850373862db8ec43c739d

  • SHA1

    da18ff2135677c6e6ec438fd5a3cc86f274b2072

  • SHA256

    5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f

  • SHA512

    79d002d26fabbcf9807d7b4ceec0244b27a192601f4c654438324153a258dff165925cca6d882a297240d335e935cda0dab25af67666596bc7142f1ef4ace385

  • SSDEEP

    6144:VoavxgYvX2ZXThTtP8KVa2txCbPhou247E/VnX+Q2EVGxm5mwhQ4bkSp:VoaJgnXTpR8KVatbV8OEIralJ

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Signatures

  • Detect ZGRat V1 3 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 18 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 8 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 20 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Drops startup file 7 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 8 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 3 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe
    "C:\Users\Admin\AppData\Local\Temp\5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:524
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\5654c63a63abcd7abe77c36cdb8c6e68379694ba69d38c0c0fed37be52c5a09f.exe" -Force
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2680
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3612
      • C:\Users\Admin\Pictures\dTeKNkc9OawaO1sVTZuEd1xs.exe
        "C:\Users\Admin\Pictures\dTeKNkc9OawaO1sVTZuEd1xs.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4636
        • C:\Users\Admin\AppData\Local\Temp\u3ks.0.exe
          "C:\Users\Admin\AppData\Local\Temp\u3ks.0.exe"
          4⤵
          • Blocklisted process makes network request
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:1324
        • C:\Users\Admin\AppData\Local\Temp\u3ks.1.exe
          "C:\Users\Admin\AppData\Local\Temp\u3ks.1.exe"
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4608
          • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
            "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3036
      • C:\Users\Admin\Pictures\GGsU4X6VMQN31vaf0D0hEU8V.exe
        "C:\Users\Admin\Pictures\GGsU4X6VMQN31vaf0D0hEU8V.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2512
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2484
        • C:\Users\Admin\Pictures\GGsU4X6VMQN31vaf0D0hEU8V.exe
          "C:\Users\Admin\Pictures\GGsU4X6VMQN31vaf0D0hEU8V.exe"
          4⤵
          • Windows security bypass
          • Executes dropped EXE
          • Windows security modification
          • Adds Run key to start application
          • Checks for VirtualBox DLLs, possible anti-VM trick
          • Drops file in Windows directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2492
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5060
          • C:\Windows\System32\cmd.exe
            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2376
            • C:\Windows\system32\netsh.exe
              netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
              6⤵
              • Modifies Windows Firewall
              PID:4952
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:504
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:2896
          • C:\Windows\rss\csrss.exe
            C:\Windows\rss\csrss.exe
            5⤵
            • Executes dropped EXE
            PID:4368
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              6⤵
              • Command and Scripting Interpreter: PowerShell
              PID:1660
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
              6⤵
              • Creates scheduled task(s)
              PID:1948
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /delete /tn ScheduledUpdate /f
              6⤵
                PID:1324
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                6⤵
                • Command and Scripting Interpreter: PowerShell
                PID:4604
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                6⤵
                • Command and Scripting Interpreter: PowerShell
                PID:4976
              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                6⤵
                  PID:1312
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                  6⤵
                  • Creates scheduled task(s)
                  PID:1968
                • C:\Windows\windefender.exe
                  "C:\Windows\windefender.exe"
                  6⤵
                    PID:4036
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                      7⤵
                        PID:1780
                        • C:\Windows\SysWOW64\sc.exe
                          sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                          8⤵
                          • Launches sc.exe
                          PID:4200
              • C:\Users\Admin\Pictures\WtsViihOsPSQ7UUIBzLVgqLq.exe
                "C:\Users\Admin\Pictures\WtsViihOsPSQ7UUIBzLVgqLq.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:920
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4052
                • C:\Users\Admin\Pictures\WtsViihOsPSQ7UUIBzLVgqLq.exe
                  "C:\Users\Admin\Pictures\WtsViihOsPSQ7UUIBzLVgqLq.exe"
                  4⤵
                  • Windows security bypass
                  • Executes dropped EXE
                  • Windows security modification
                  • Adds Run key to start application
                  • Checks for VirtualBox DLLs, possible anti-VM trick
                  • Drops file in Windows directory
                  • Suspicious use of WriteProcessMemory
                  PID:192
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2520
                  • C:\Windows\System32\cmd.exe
                    C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                    5⤵
                      PID:4684
                      • C:\Windows\system32\netsh.exe
                        netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                        6⤵
                        • Modifies Windows Firewall
                        PID:4164
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      5⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1968
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      5⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4112
                • C:\Users\Admin\Pictures\llfKXf1yeHXHusdsJEOuEUmt.exe
                  "C:\Users\Admin\Pictures\llfKXf1yeHXHusdsJEOuEUmt.exe"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1828
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    4⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:512
                  • C:\Users\Admin\Pictures\llfKXf1yeHXHusdsJEOuEUmt.exe
                    "C:\Users\Admin\Pictures\llfKXf1yeHXHusdsJEOuEUmt.exe"
                    4⤵
                    • Executes dropped EXE
                    • Checks for VirtualBox DLLs, possible anti-VM trick
                    PID:2500
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      5⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2204
                    • C:\Windows\System32\cmd.exe
                      C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                      5⤵
                        PID:748
                        • C:\Windows\system32\netsh.exe
                          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                          6⤵
                          • Modifies Windows Firewall
                          PID:516
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        5⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4472
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        5⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3560
                  • C:\Users\Admin\Pictures\wLkK5x9eg8eXLZKKRbVLP7BN.exe
                    "C:\Users\Admin\Pictures\wLkK5x9eg8eXLZKKRbVLP7BN.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4148
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      4⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1448
                    • C:\Users\Admin\Pictures\wLkK5x9eg8eXLZKKRbVLP7BN.exe
                      "C:\Users\Admin\Pictures\wLkK5x9eg8eXLZKKRbVLP7BN.exe"
                      4⤵
                      • Executes dropped EXE
                      PID:1844
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        5⤵
                        • Command and Scripting Interpreter: PowerShell
                        PID:4472
                      • C:\Windows\System32\cmd.exe
                        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                        5⤵
                          PID:3528
                          • C:\Windows\system32\netsh.exe
                            netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                            6⤵
                            • Modifies Windows Firewall
                            PID:4488
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          5⤵
                          • Command and Scripting Interpreter: PowerShell
                          PID:1784
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          5⤵
                          • Command and Scripting Interpreter: PowerShell
                          PID:4320
                • C:\Windows\windefender.exe
                  C:\Windows\windefender.exe
                  1⤵
                    PID:1936

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\ProgramData\Are.docx

                    Filesize

                    11KB

                    MD5

                    a33e5b189842c5867f46566bdbf7a095

                    SHA1

                    e1c06359f6a76da90d19e8fd95e79c832edb3196

                    SHA256

                    5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

                    SHA512

                    f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

                  • C:\ProgramData\mozglue.dll

                    Filesize

                    593KB

                    MD5

                    c8fd9be83bc728cc04beffafc2907fe9

                    SHA1

                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                    SHA256

                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                    SHA512

                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                    Filesize

                    2KB

                    MD5

                    1c19c16e21c97ed42d5beabc93391fc5

                    SHA1

                    8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                    SHA256

                    1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                    SHA512

                    7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    19KB

                    MD5

                    27994b31c693a5b6447dbbb7753f1569

                    SHA1

                    4771802dbacf5f1f2132cef4db4703000842eb70

                    SHA256

                    75efe12cf71737d2cb76e532978a1d0da62200ffa97539e1d7427f00430685d8

                    SHA512

                    2fa1d013e630ae0bc58244a238c204ef2b60538d719eed774d1280ec0357e6afae223b92a109a0db816c8207b51f08bca708ed199d05bf6781c8d671c9a820a4

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    19KB

                    MD5

                    6a195225b902318a70dfb4d66a20803f

                    SHA1

                    c9a5f886bfb8ced376ada34a5a6d069cd634789a

                    SHA256

                    8f42f0379f1998fc2f3815a640fe4c62099464e6f9d0d44a95a476dd7c9af750

                    SHA512

                    500f3f90d722c14a5e30c0604796d7feff83e064c6ac3ba8f8ab696a73524caad545959f66336a22977b3ff108b1e92ebbcd230be379157b2bbba94fc61dd4bf

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    19KB

                    MD5

                    fde35998ebc02cae4bb8d22139bf5ea9

                    SHA1

                    62d2ac16c20bd2af1d7695d6624ee405bd0fd226

                    SHA256

                    512ba43b0ec696803d3a000cb6031ae8beb7ed1ecd081a217785018471fef96b

                    SHA512

                    5b2395cc059846ac2531957731b953d7c94a07a426edbf0a5ba6ffabe8e411a23ade7ba3e2cd287a7f7f6bad3efec7f82ec9847eca1ae25260d040e1193f5c87

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ht4qmzab.swu.ps1

                    Filesize

                    1B

                    MD5

                    c4ca4238a0b923820dcc509a6f75849b

                    SHA1

                    356a192b7913b04c54574d18c28d46e6395428ab

                    SHA256

                    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                    SHA512

                    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                    Filesize

                    281KB

                    MD5

                    d98e33b66343e7c96158444127a117f6

                    SHA1

                    bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                    SHA256

                    5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                    SHA512

                    705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                  • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

                    Filesize

                    3KB

                    MD5

                    571244e983c64dd39af6023ef9cff0d6

                    SHA1

                    3a6248c9bbc3cea185424b28d7875fe20b3b855a

                    SHA256

                    0130acefaf21d6a9c13ed714097e3881082d4347ba87323ccc8d6787d0e61b1f

                    SHA512

                    b63e1b072c6460c74cf2473bc47fc185a471b81d3578f4b05caf189997c8790c44116e42ed7504984d91f6ccaa19393527cf8176754ce8129862a71964abb618

                  • C:\Users\Admin\AppData\Local\Temp\u3ks.0.exe

                    Filesize

                    206KB

                    MD5

                    0917be53327ea132956255dcab650a82

                    SHA1

                    b60818917f645a8a9af3b530e3ae37c1f002be2f

                    SHA256

                    211c34660898480e0777c6ef6f61bf2111f6550e00b40cab859543d567dc455a

                    SHA512

                    a72acc24ba813d983bbf2ecab7929d0aab4e25637ae43e85b973a5105429bd15c061415fd855737620caaf81b456b2d6ba57f85566245efbe5f8b5db5560932a

                  • C:\Users\Admin\AppData\Local\Temp\u3ks.1.exe

                    Filesize

                    4.6MB

                    MD5

                    397926927bca55be4a77839b1c44de6e

                    SHA1

                    e10f3434ef3021c399dbba047832f02b3c898dbd

                    SHA256

                    4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

                    SHA512

                    cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

                  • C:\Users\Admin\Pictures\ArVLPiVQhkTN5pxDoK0ronit.exe

                    Filesize

                    7KB

                    MD5

                    77f762f953163d7639dff697104e1470

                    SHA1

                    ade9fff9ffc2d587d50c636c28e4cd8dd99548d3

                    SHA256

                    d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea

                    SHA512

                    d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499

                  • C:\Users\Admin\Pictures\GGsU4X6VMQN31vaf0D0hEU8V.exe

                    Filesize

                    4.1MB

                    MD5

                    f6156b63d313f7247432a693de39daef

                    SHA1

                    bff890bf23551db49d04af57779630bea35356a9

                    SHA256

                    f148a51481ad34b81dbdc1c27873ca0e4d56c83729dcf8ed891f4443f5492620

                    SHA512

                    54c61e755d5661da14ebfef93b9fa61d02f59fb43edc1310cf21c0780479bc54be973836286f0d5104a946e9d511e94162d38e2a5471f0f386b7b7e396e7f759

                  • C:\Users\Admin\Pictures\POntO2UCrfTLODKZgf7uas9y.exe

                    Filesize

                    18KB

                    MD5

                    949f191270e024e75823b32174f15754

                    SHA1

                    e2685aee44aaee2bc87888ee7c86d77bba313eae

                    SHA256

                    c3356a89f9d9962232df6a5d6dbfb42a9e2b2578b2a8d89c20b61c4c2e72c71c

                    SHA512

                    d3eea70b18938ab93b4d659a0dcb793ab1f440614763b005c9e3f9bf36e4ad49c87cd9d436d2821c34c194a6ec384c57351be4bf9164caaf269046d29c01a55a

                  • C:\Users\Admin\Pictures\WtsViihOsPSQ7UUIBzLVgqLq.exe

                    Filesize

                    4.1MB

                    MD5

                    0ed8d071deae90ff638cb070d0b9559d

                    SHA1

                    9b39b4703ccd78d9ca56bbf2f4c168d71a7bcfda

                    SHA256

                    691bddda01382e95f74905b1fc77da9acbb73383734ca3116075be2c7d62cf99

                    SHA512

                    960a5a4e2b4f82bb7273cbab8bf622933c6e603cdc44b59b409c285b62c3a2c741bca7692ed77864520aa95c85a2f3fc31ddc9383caada588828d953346c2729

                  • C:\Users\Admin\Pictures\dTeKNkc9OawaO1sVTZuEd1xs.exe

                    Filesize

                    384KB

                    MD5

                    a09d068dbe8e20e489d1d16a67fa9c92

                    SHA1

                    1ab47f34b06ce91e99ed260563ff431b776df525

                    SHA256

                    3a6571ca197b5ee4a0bf6d2cf32e4f35c133ce313253c9ed2b07977c22518842

                    SHA512

                    ea4a0b72c3dbdee23413216a3740826ff19db61a14724541d7046c1ae590392a235c58763524f7c490bd9d34f112f511c86669cd019c6b4dcd48ef47157892c5

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    18KB

                    MD5

                    535e663188020110bb570f5298534579

                    SHA1

                    89e8e954446b4cbab9bd0a89d6cef8395b438b07

                    SHA256

                    bf7b1e1c450321217916a3eab63aef5f61f0ffd1cb0268511e7bbb1be9fb0d1d

                    SHA512

                    5cdd951b3d9f6439b27499542ce892a6459bfee965fae5c7db22e16fb765d37a7fae4e0fc4e23c2a7d46b474222e30ece5578fc4f5b5b6a1bb1e73f8182cb2a2

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    18KB

                    MD5

                    47189053c3cdc5ccdbed853c21813d3f

                    SHA1

                    44cae175853c3ad24e9c34b82eddb861a3530d23

                    SHA256

                    afb3f88e9d8bee2d354a89ae9a57ce60c5d818e52166f707342df7204ab2ad99

                    SHA512

                    5aff4d3390235d33d9f48e2fff2d4c51e7612b09c45c80956abc7ca48e9142e1cee76673de4ac88dff1cc407e4d11ddd5f34c459dfb253ea5f1e7a3a1d76b4af

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    18KB

                    MD5

                    c5f70626b31a7992d1cf3c0dd0df2f5a

                    SHA1

                    0e54481ed2433422d1913adbaef0a61aeca0bf0e

                    SHA256

                    03ccff5cd54d6a45c230f0915fd67da4ad459a728690d1bde43f22b06e637057

                    SHA512

                    d4f9190f3f07d1438f79681bb3a92132c2321e368ee56c1a069dee96073fbc42451a9db26688e924c0760ee35b8d29a88556b0cee8e1abc9d26f662c7d4c1eac

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    18KB

                    MD5

                    f9855ba44d975b755ac00879e40eae9b

                    SHA1

                    532cf7289942d16a74cb27c63215d41ee9508b21

                    SHA256

                    77899e1e661ffd7b0f39f39d765275dbb0f4f874f9b0ae1304aa0414403f40a3

                    SHA512

                    673ffe4cec75b2424d327b43b75c382201130a70eb6abc6c5f92296af34ff61ba08b6c3ada40c2ccc880f68c47bc0fcc9ca1c28821dee7e17310c40155ff6ac2

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    18KB

                    MD5

                    76d7528e9ef41cdb96dc6fe63f422884

                    SHA1

                    f9e88a28fdd2e358afeb94631afbabb0b2945cde

                    SHA256

                    fc65bbfb54fbf2273ddcb61bf0a41541a0319d88fbca87ad8afe2692be923d21

                    SHA512

                    61e549c0683bc0eee16c3ace98faedab57c682658d4791c23015ecb2d7bc4cd4f5802ab9af7e5bd8f0ea0e4b4a637303502d54270eebc3766a716bdbc20f1a58

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    18KB

                    MD5

                    10b869d34eb842c17167bf65daeb28c3

                    SHA1

                    ffde178a40d5c56c73d46d19a5101d8365a3dc07

                    SHA256

                    5404ea2530bda1704bdc2a11fcc3f8adf13ac82f2bb84e632779c7d3c9430161

                    SHA512

                    03f139eb84ce079e577facd92ef2ed81762070726d0cad756675d90d8e11edea5e1bb3c300fc7f671839cf8e83a95be77966f8508e18f0a72b60647ece4de413

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    18KB

                    MD5

                    cd4704699a42c862a75926c70ac84c05

                    SHA1

                    99d5052e96af1dbb0c974346a70cd419dd6b1307

                    SHA256

                    9891a37fe77048309b9da4ecd43212e887915f65ead0b94b73493825874055b2

                    SHA512

                    7ee3c1a43ec4895ce654c785a697ea404f0647b7cf1bdc6821b09efd4d66aff44d2e799abe5542ec1d4c69e3febe39e2b97515deb75e6c650dd55619fd611f92

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    18KB

                    MD5

                    0eb067f72dcce7bea6e0e24da64206d5

                    SHA1

                    6a55c7cb6cd1fe39b022b566bf95895eb092b8d8

                    SHA256

                    de5346d8ef765d337f01e778d2d71830ca55111ce100e7891a99eb21249f06eb

                    SHA512

                    ac23e32488c5d980f3c384ec5c9b230b46011d686a9e2bddf9215e57ad0796fb5dfe3c0d1400138f0bcde649e15a058faa6e54208e04953f8f1f357a8965146e

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    18KB

                    MD5

                    7ff829e4e4a09126837828b899ea4842

                    SHA1

                    777a49df3327550839c7046847d3955c9c71b9bb

                    SHA256

                    84dbe7d8a63523e568e1ca008e5aee7670527320370c167bd00358eee8cedcdf

                    SHA512

                    fd546f72051a75b9db54775da73a11379d1a23fcca263de611438c347043c9b4cc82c0684b58e7dacb40af96e8cd6767ac24a779cfae232a2fe4ec4901140014

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    18KB

                    MD5

                    a5ecab279b9aceb29ac72de80f0f0d88

                    SHA1

                    57a7585e1799245f03ad68b2771e1f0c8e550b32

                    SHA256

                    3890ee352578cdfd7303bba09c6723a8fa2b549667ddb8dcb4af32269a127486

                    SHA512

                    38f3c1155f171f498620259d52cfab88e627222e94284bd5f5784b6caf91ab9e3de303dc7046f4d6acb07d1709176448b7da4c6b2ac55e01bc1c92cf8b719672

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    18KB

                    MD5

                    f157810b3eb026c09e6bf447eff5e2c0

                    SHA1

                    eb908b2910dec87f008ccbcd2a2a0ed06080e178

                    SHA256

                    6d8273ee566e1a5df764b872f0a946cfb1a93216f83e60798eaf67e0030adb7f

                    SHA512

                    464c733e413be5e56f98c2d3f8b619b3639c4af72c3c69079340f62a45210f86afebf096de67e878b9c9e509306c1dae33dca891a60867296b22666f50fc4210

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    18KB

                    MD5

                    753d79b892721c479aaca41f1258fcd0

                    SHA1

                    7d54a903f00a63e68b760d3923e2396983411060

                    SHA256

                    e227b9def6cf8884358d99635c8fb9d63a9c14cf8203409914fd41077dac3145

                    SHA512

                    a402d01205eb285113b9abd49a508ef9aa6df3d6c92022b7bbf5c5080cdf4237fd90de266b3b0f99b197d0f432b948fb7ec116740563649d03de6c4d214352ee

                  • C:\Windows\rss\csrss.exe

                    Filesize

                    3.6MB

                    MD5

                    284eed1a8b6af9f60ddc64d1019163cc

                    SHA1

                    ab44d6ca9df9587719a38c398978c0b9453d0583

                    SHA256

                    b33e8b9c2ba6e4acb040e0c206b26f726a6c6848368f122fc8d0abe2d12170b2

                    SHA512

                    224b75f102c810cc8ac9f69f58aca8ccdfb88eb3cd15d02c67dd0b7db125b3b3f5110f83bdb1ba2025e0f2190f0f1b17d4c7ce3179cced3ce1271357f71471ce

                  • C:\Windows\windefender.exe

                    Filesize

                    2.0MB

                    MD5

                    8e67f58837092385dcf01e8a2b4f5783

                    SHA1

                    012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                    SHA256

                    166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                    SHA512

                    40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                  • \ProgramData\nss3.dll

                    Filesize

                    448KB

                    MD5

                    443fe66e1060dc0d7348b12abadf1e11

                    SHA1

                    33993c07da0464d5582a7449ed323384deb24d92

                    SHA256

                    c1166b3cf1d10e26724bcfacfa93c9d8b77706132cfd8ed357c34759341c0a5d

                    SHA512

                    3c335e57a4e4693d6dcffdacc0e5b8dbb8b5a29eef8bce913c256a159529855f6aa30a041c8254e6787ef488d585c85646a1307aa4bbb701ea9ede13205db024

                  • memory/192-2814-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/504-1622-0x000000006F3B0000-0x000000006F3FB000-memory.dmp

                    Filesize

                    300KB

                  • memory/504-1601-0x0000000007B00000-0x0000000007E50000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/504-1623-0x000000006E880000-0x000000006EBD0000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/504-1628-0x0000000009620000-0x00000000096C5000-memory.dmp

                    Filesize

                    660KB

                  • memory/504-1603-0x00000000080A0000-0x00000000080EB000-memory.dmp

                    Filesize

                    300KB

                  • memory/512-692-0x0000000007A20000-0x0000000007D70000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/512-694-0x0000000008070000-0x00000000080BB000-memory.dmp

                    Filesize

                    300KB

                  • memory/512-755-0x000000000A050000-0x000000000A0F5000-memory.dmp

                    Filesize

                    660KB

                  • memory/512-750-0x000000006EDD0000-0x000000006F120000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/512-749-0x000000006F230000-0x000000006F27B000-memory.dmp

                    Filesize

                    300KB

                  • memory/524-99-0x00007FFE78560000-0x00007FFE78F4C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/524-97-0x00007FFE78563000-0x00007FFE78564000-memory.dmp

                    Filesize

                    4KB

                  • memory/524-1-0x00007FFE78563000-0x00007FFE78564000-memory.dmp

                    Filesize

                    4KB

                  • memory/524-0-0x0000022E963C0000-0x0000022E963CA000-memory.dmp

                    Filesize

                    40KB

                  • memory/524-2-0x0000022EB0950000-0x0000022EB09AE000-memory.dmp

                    Filesize

                    376KB

                  • memory/524-3-0x00007FFE78560000-0x00007FFE78F4C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/920-687-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/1324-989-0x0000000000400000-0x0000000002AF1000-memory.dmp

                    Filesize

                    38.9MB

                  • memory/1324-1697-0x0000000000400000-0x0000000002AF1000-memory.dmp

                    Filesize

                    38.9MB

                  • memory/1324-1034-0x0000000000400000-0x0000000002AF1000-memory.dmp

                    Filesize

                    38.9MB

                  • memory/1324-2917-0x0000000000400000-0x0000000002AF1000-memory.dmp

                    Filesize

                    38.9MB

                  • memory/1324-3302-0x0000000000400000-0x0000000002AF1000-memory.dmp

                    Filesize

                    38.9MB

                  • memory/1324-973-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                    Filesize

                    972KB

                  • memory/1448-1094-0x000000006DFF0000-0x000000006E03B000-memory.dmp

                    Filesize

                    300KB

                  • memory/1448-1039-0x0000000007B90000-0x0000000007BDB000-memory.dmp

                    Filesize

                    300KB

                  • memory/1448-1095-0x000000006E060000-0x000000006E3B0000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/1448-1100-0x0000000009AF0000-0x0000000009B95000-memory.dmp

                    Filesize

                    660KB

                  • memory/1448-1037-0x0000000007450000-0x00000000077A0000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/1828-969-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/1844-4733-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/1936-4993-0x0000000000400000-0x00000000008DF000-memory.dmp

                    Filesize

                    4.9MB

                  • memory/1968-2338-0x000000006E880000-0x000000006EBD0000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/1968-2337-0x000000006F3B0000-0x000000006F3FB000-memory.dmp

                    Filesize

                    300KB

                  • memory/2204-2823-0x0000000007F30000-0x0000000007F7B000-memory.dmp

                    Filesize

                    300KB

                  • memory/2204-2842-0x000000006EE20000-0x000000006EE6B000-memory.dmp

                    Filesize

                    300KB

                  • memory/2204-2821-0x00000000072D0000-0x0000000007620000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/2204-2843-0x000000006E8D0000-0x000000006EC20000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/2204-2848-0x0000000008F70000-0x0000000009015000-memory.dmp

                    Filesize

                    660KB

                  • memory/2484-116-0x0000000007AE0000-0x0000000007B2B000-memory.dmp

                    Filesize

                    300KB

                  • memory/2484-113-0x0000000006E20000-0x0000000006E86000-memory.dmp

                    Filesize

                    408KB

                  • memory/2484-111-0x0000000006D10000-0x0000000006D32000-memory.dmp

                    Filesize

                    136KB

                  • memory/2484-112-0x0000000006DB0000-0x0000000006E16000-memory.dmp

                    Filesize

                    408KB

                  • memory/2484-191-0x0000000009CB0000-0x0000000009D44000-memory.dmp

                    Filesize

                    592KB

                  • memory/2484-384-0x0000000009C10000-0x0000000009C2A000-memory.dmp

                    Filesize

                    104KB

                  • memory/2484-389-0x0000000009BF0000-0x0000000009BF8000-memory.dmp

                    Filesize

                    32KB

                  • memory/2484-190-0x0000000009A90000-0x0000000009B35000-memory.dmp

                    Filesize

                    660KB

                  • memory/2484-110-0x0000000006F00000-0x0000000007528000-memory.dmp

                    Filesize

                    6.2MB

                  • memory/2484-182-0x0000000009A50000-0x0000000009A83000-memory.dmp

                    Filesize

                    204KB

                  • memory/2484-109-0x00000000045F0000-0x0000000004626000-memory.dmp

                    Filesize

                    216KB

                  • memory/2484-114-0x0000000007790000-0x0000000007AE0000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/2484-184-0x000000006EDB0000-0x000000006F100000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/2484-115-0x0000000007650000-0x000000000766C000-memory.dmp

                    Filesize

                    112KB

                  • memory/2484-185-0x0000000009A30000-0x0000000009A4E000-memory.dmp

                    Filesize

                    120KB

                  • memory/2484-143-0x0000000008020000-0x000000000805C000-memory.dmp

                    Filesize

                    240KB

                  • memory/2484-175-0x0000000008CB0000-0x0000000008D26000-memory.dmp

                    Filesize

                    472KB

                  • memory/2484-183-0x000000006ED60000-0x000000006EDAB000-memory.dmp

                    Filesize

                    300KB

                  • memory/2492-1597-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/2492-2082-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/2500-3549-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/2512-152-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/2512-683-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/2520-2102-0x000000006F3B0000-0x000000006F3FB000-memory.dmp

                    Filesize

                    300KB

                  • memory/2520-2103-0x000000006E880000-0x000000006EBD0000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/2680-13-0x000001DCD6E20000-0x000001DCD6E96000-memory.dmp

                    Filesize

                    472KB

                  • memory/2680-27-0x00007FFE78560000-0x00007FFE78F4C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2680-52-0x00007FFE78560000-0x00007FFE78F4C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2680-17-0x00007FFE78560000-0x00007FFE78F4C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2680-12-0x00007FFE78560000-0x00007FFE78F4C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2680-9-0x000001DCD6B50000-0x000001DCD6B72000-memory.dmp

                    Filesize

                    136KB

                  • memory/2896-1862-0x000000006E880000-0x000000006EBD0000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/2896-1861-0x000000006F3B0000-0x000000006F3FB000-memory.dmp

                    Filesize

                    300KB

                  • memory/3036-1368-0x0000015CEBB90000-0x0000015CEBB9A000-memory.dmp

                    Filesize

                    40KB

                  • memory/3036-1442-0x0000015CEBBA0000-0x0000015CEBBAA000-memory.dmp

                    Filesize

                    40KB

                  • memory/3036-1349-0x0000015CE7ED0000-0x0000015CEB704000-memory.dmp

                    Filesize

                    56.2MB

                  • memory/3036-1354-0x0000015CED480000-0x0000015CED48C000-memory.dmp

                    Filesize

                    48KB

                  • memory/3036-1582-0x0000015CF2510000-0x0000015CF2518000-memory.dmp

                    Filesize

                    32KB

                  • memory/3036-1584-0x0000015CF2570000-0x0000015CF2578000-memory.dmp

                    Filesize

                    32KB

                  • memory/3036-1588-0x0000015CF36C0000-0x0000015CF3722000-memory.dmp

                    Filesize

                    392KB

                  • memory/3036-1596-0x0000015CEE6D0000-0x0000015CEE6DC000-memory.dmp

                    Filesize

                    48KB

                  • memory/3036-1593-0x0000015CF3C70000-0x0000015CF4196000-memory.dmp

                    Filesize

                    5.1MB

                  • memory/3036-1591-0x0000015CF3720000-0x0000015CF3742000-memory.dmp

                    Filesize

                    136KB

                  • memory/3036-1587-0x0000015CF36A0000-0x0000015CF36AA000-memory.dmp

                    Filesize

                    40KB

                  • memory/3036-1583-0x0000015CF33A0000-0x0000015CF33D8000-memory.dmp

                    Filesize

                    224KB

                  • memory/3036-1352-0x0000015CEDEA0000-0x0000015CEDFAA000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/3036-1356-0x0000015CEE0B0000-0x0000015CEE0D4000-memory.dmp

                    Filesize

                    144KB

                  • memory/3036-1355-0x0000015CEBBB0000-0x0000015CEBBC4000-memory.dmp

                    Filesize

                    80KB

                  • memory/3036-1840-0x0000015CEE710000-0x0000015CEE72E000-memory.dmp

                    Filesize

                    120KB

                  • memory/3036-1446-0x0000015CEE3D0000-0x0000015CEE6D0000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/3036-1353-0x0000015CEBB70000-0x0000015CEBB80000-memory.dmp

                    Filesize

                    64KB

                  • memory/3036-1370-0x0000015CEE250000-0x0000015CEE302000-memory.dmp

                    Filesize

                    712KB

                  • memory/3036-1369-0x0000015CEE220000-0x0000015CEE24A000-memory.dmp

                    Filesize

                    168KB

                  • memory/3036-1371-0x0000015CEE350000-0x0000015CEE3A0000-memory.dmp

                    Filesize

                    320KB

                  • memory/3560-3309-0x0000000007330000-0x0000000007680000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/3560-3336-0x0000000008F00000-0x0000000008FA5000-memory.dmp

                    Filesize

                    660KB

                  • memory/3560-3331-0x000000006EF90000-0x000000006F2E0000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/3560-3330-0x000000006EF20000-0x000000006EF6B000-memory.dmp

                    Filesize

                    300KB

                  • memory/3560-3311-0x0000000007ED0000-0x0000000007F1B000-memory.dmp

                    Filesize

                    300KB

                  • memory/3612-4-0x0000000000400000-0x0000000000408000-memory.dmp

                    Filesize

                    32KB

                  • memory/4036-4986-0x0000000000400000-0x00000000008DF000-memory.dmp

                    Filesize

                    4.9MB

                  • memory/4052-465-0x000000006EDB0000-0x000000006F100000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/4052-464-0x000000006ED60000-0x000000006EDAB000-memory.dmp

                    Filesize

                    300KB

                  • memory/4112-2580-0x000000006E880000-0x000000006EBD0000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/4112-2579-0x000000006F3B0000-0x000000006F3FB000-memory.dmp

                    Filesize

                    300KB

                  • memory/4148-1328-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4148-1275-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4368-4996-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4368-4754-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4368-5010-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4368-5008-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4368-5006-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4368-5004-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4368-5002-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4368-5000-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4368-4998-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4368-4994-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4368-4992-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4368-4987-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4368-4990-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4368-4978-0x0000000000400000-0x0000000002ED5000-memory.dmp

                    Filesize

                    42.8MB

                  • memory/4472-3552-0x0000000007FC0000-0x0000000008310000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/4472-3573-0x000000006F2F0000-0x000000006F33B000-memory.dmp

                    Filesize

                    300KB

                  • memory/4472-3083-0x000000006EE20000-0x000000006EE6B000-memory.dmp

                    Filesize

                    300KB

                  • memory/4472-3554-0x0000000008A10000-0x0000000008A5B000-memory.dmp

                    Filesize

                    300KB

                  • memory/4472-3084-0x000000006E8D0000-0x000000006EC20000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/4608-1336-0x0000000000400000-0x00000000008AD000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4608-1276-0x0000000000400000-0x00000000008AD000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4636-106-0x0000000000400000-0x0000000002B1E000-memory.dmp

                    Filesize

                    39.1MB

                  • memory/4636-1004-0x0000000000400000-0x0000000002B1E000-memory.dmp

                    Filesize

                    39.1MB

                  • memory/4636-98-0x0000000000400000-0x0000000002B1E000-memory.dmp

                    Filesize

                    39.1MB

                  • memory/5060-1361-0x000000006E450000-0x000000006E49B000-memory.dmp

                    Filesize

                    300KB

                  • memory/5060-1362-0x000000006DFE0000-0x000000006E330000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/5060-1367-0x0000000009420000-0x00000000094C5000-memory.dmp

                    Filesize

                    660KB

                  • memory/5060-1335-0x0000000007F00000-0x0000000007F4B000-memory.dmp

                    Filesize

                    300KB

                  • memory/5060-1334-0x0000000007A90000-0x0000000007DE0000-memory.dmp

                    Filesize

                    3.3MB