Analysis

  • max time kernel
    142s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    22-07-2021 06:32

General

  • Target

    434c4d6383148ec2d1e98e455ff2629b.exe

  • Size

    1.1MB

  • MD5

    434c4d6383148ec2d1e98e455ff2629b

  • SHA1

    4fe3f1549a9ef0d6c1ff611a1a4f88cf17c8d8cb

  • SHA256

    6fa6caea53a25606c7e2991d370927d98bf3df093e77a0cea8816c30194afda0

  • SHA512

    3e83e7d70f3634418a8c1a950b43587104f6ba0213a2f49e95ab72f7e740030d3d1568b66a5938c47250daed961ea31c3a65094bc95db7d6de1c13ae36fe33ed

Malware Config

Extracted

Family

danabot

Version

1987

Botnet

4

C2

142.11.244.124:443

142.11.206.50:443

Attributes
  • embedded_hash

    6AD9FE4F9E491E785665E0D144F61DAB

rsa_privkey.plain
rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 7 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 26 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\434c4d6383148ec2d1e98e455ff2629b.exe
    "C:\Users\Admin\AppData\Local\Temp\434c4d6383148ec2d1e98e455ff2629b.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
      "C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: AddClipboardFormatListener
        PID:972
    • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
      "C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < Miele.mpeg
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1780
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1408
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^nuJmDolyOEafNkCbidgtyicKjPeDQxxFworNyycSxwBitdTxqUhgYpwdKZhOuHfxlNgFoOseVcKtGhFWVICViyHRu$" Gioco.mpeg
            5⤵
              PID:1604
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Lucca.exe.com
              Lucca.exe.com e
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1652
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Lucca.exe.com
                C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Lucca.exe.com e
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks processor information in registry
                • Modifies system certificate store
                • Suspicious use of WriteProcessMemory
                PID:584
                • C:\Users\Admin\AppData\Local\Temp\iscshsuq.exe
                  "C:\Users\Admin\AppData\Local\Temp\iscshsuq.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:1700
                  • C:\Windows\SysWOW64\rundll32.exe
                    C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\ISCSHS~1.TMP,S C:\Users\Admin\AppData\Local\Temp\iscshsuq.exe
                    8⤵
                    • Blocklisted process makes network request
                    • Loads dropped DLL
                    • Drops file in Program Files directory
                    PID:1984
                    • C:\Windows\SysWOW64\RUNDLL32.EXE
                      C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\ISCSHS~1.TMP,Lg0hbQ==
                      9⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • Checks processor information in registry
                      • Modifies system certificate store
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      PID:268
                      • C:\Windows\system32\rundll32.exe
                        C:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 29733
                        10⤵
                          PID:1692
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp4ECC.tmp.ps1"
                          10⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:892
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp6A49.tmp.ps1"
                          10⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1968
                          • C:\Windows\SysWOW64\nslookup.exe
                            "C:\Windows\system32\nslookup.exe" -type=any localhost
                            11⤵
                              PID:1616
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                            10⤵
                              PID:1232
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                              10⤵
                                PID:1788
                        • C:\Windows\SysWOW64\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wjxkiisqifj.vbs"
                          7⤵
                            PID:1652
                          • C:\Windows\SysWOW64\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\viewqbdtg.vbs"
                            7⤵
                            • Blocklisted process makes network request
                            • Modifies system certificate store
                            PID:1596
                      • C:\Windows\SysWOW64\PING.EXE
                        ping 127.0.0.1 -n 30
                        5⤵
                        • Runs ping.exe
                        PID:1580

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Defense Evasion

              Install Root Certificate

              1
              T1130

              Modify Registry

              1
              T1112

              Credential Access

              Credentials in Files

              1
              T1081

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              2
              T1082

              Remote System Discovery

              1
              T1018

              Collection

              Data from Local System

              1
              T1005

              Command and Control

              Web Service

              1
              T1102

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\PROGRA~3\Jvgzbfh.tmp
                MD5

                41c486d5eeef5e53f81e5e6f298d2e9b

                SHA1

                2ca09f905be740d3289b41e11646e9450e50a330

                SHA256

                070116928d1e038dfc77a2ddfc94390e705c1f9838a213773dbeba2f15276e50

                SHA512

                4318876030b15e96823edc5af8e0633e0e6e50dd96d2b7a27421a55e140ac70af9a767afaf2a1d506515f3f0bcdc372cab9cdbac589e2b6461124bf344e7323b

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                MD5

                85f0ad12499c6e25e9bb6f8228fa496a

                SHA1

                4a91c4fab7419e0ed2ef38a2e3f713efc10071be

                SHA256

                c064a8624cacd6d8720c34ea136cc17d0ea92573ece452d009b5c6d00893ab33

                SHA512

                0e231e376cd2db1da00c2312afa8808318ec0468b13fb7f074e3a8b4c5922b2834ccb2e0d06f586f7c26d755304e4e3b6e89035ad2cf568538cfb112857b9a1c

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_1602f747-c1a3-4345-8dec-4dcb8b1f72e5
                MD5

                02ff38ac870de39782aeee04d7b48231

                SHA1

                0390d39fa216c9b0ecdb38238304e518fb2b5095

                SHA256

                fbd66a9baf753db31b8de23f2d51b67f8676687503653103080c45b16f1dc876

                SHA512

                24a1ff76ee42ff7a5ea42843928c4df07b06178f7781cd840e1e086e88735d81506eb67259ff1e6ce5aaa7c5baea03886da265eb7e025ff4dc4c4b5f8cd3e341

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2d686436-375c-4ee1-bd4a-9e44ccd248ba
                MD5

                75a8da7754349b38d64c87c938545b1b

                SHA1

                5c28c257d51f1c1587e29164cc03ea880c21b417

                SHA256

                bf08151c174b5d00c9dbc7907b2c6a01b4be76bfa3afce1e8bd98a04ad833c96

                SHA512

                798797bc74c56c874e9a5fdcb0157c04e37a1b3cce285ef064b01bceef8cec45f11a5198918c6c647220b62883606b5e12e3cca3ea369f3a66e69dea6e15f643

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4375eeb7-a65d-43f1-a616-02c5ad6c5370
                MD5

                be4d72095faf84233ac17b94744f7084

                SHA1

                cc78ce5b9c57573bd214a8f423ee622b00ebb1ec

                SHA256

                b0d72c5c22e57913476ac8fc686a4593f137c6667d5094522c0a0685dabd7adc

                SHA512

                43856e9b1032b8690ceea810c931bed3655e9190414bb220fb6afc136f31b8335e07604dffb28405d4006f266a54cff424c527d29924b1b732c9647a3252b097

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6fe5bd95-2cea-4aea-9c8c-dd67bac4295b
                MD5

                df44874327d79bd75e4264cb8dc01811

                SHA1

                1396b06debed65ea93c24998d244edebd3c0209d

                SHA256

                55de642c5c9e436ec01c57004dae797022442c3245daf7162d19a5585f221181

                SHA512

                95dc9298b8db059bbe746f67e6a7f8515781c7053cc60c01532e47623a996be7e1bd23d1bd8f5f2045adff27454f44930d503c15b695690088841cedbd2a06c3

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_bc2fe8ee-69c0-48ce-8821-1fab80ab4eeb
                MD5

                597009ea0430a463753e0f5b1d1a249e

                SHA1

                4e38b8bb65ecbd5c9f0d3d8c47f7caba33de6c62

                SHA256

                3fd2a8217a845c43dbc0dc206c28be81d2687aa9ba62019d905aef10cfaec45d

                SHA512

                5d722fa908e64575b2497c60d142e182011a10c6ed33813b3b4796b3147ece1bc96938518b4c8911a1bac3b7560528ebe3e8e754c11015516d335df5d7c6871d

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fa12b0a1-3d6a-4bab-a74a-253a75ca0598
                MD5

                5e3c7184a75d42dda1a83606a45001d8

                SHA1

                94ca15637721d88f30eb4b6220b805c5be0360ed

                SHA256

                8278033a65d1ff48be4d86e11f87930d187692f59f8bf2f0a9d170de285afb59

                SHA512

                fae99b6e9b106e0f1c30aa4082b25ae1ad643455c1295c2c16ad534e3e611b9b08492353ffe1af1cfdddc9b2b7c330747a64012c45e62b8f4a4982dcc214e05b

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fd9bf4da-ec38-4847-85c5-d50f35796d4c
                MD5

                a725bb9fafcf91f3c6b7861a2bde6db2

                SHA1

                8bb5b83f3cc37ff1e5ea4f02acae38e72364c114

                SHA256

                51651f27f54c7261887037aa1de4eff0a26c6807906dfc34a15cd5a0b58a8431

                SHA512

                1c4b21dd5660bfec8347257bb3da64681b0a97c427790d9ab3484f687dac032bcff0e07876635953697b00cf83e7d37f97c44e0219627fd0533f60ed3024b97e

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fe80cd26-0cf7-4e38-9884-6dab53b04ca9
                MD5

                b6d38f250ccc9003dd70efd3b778117f

                SHA1

                d5a17c02cac698d4f0a4a9b7d71db2aa19e3f18a

                SHA256

                4de9d7b5ccab7b67ca8efc83084c7ee6e5e872b7216ed4683bc5da950bf41265

                SHA512

                67d8195836b7f280d3f9219fd0f58276342e55d5dfdd8a4c54355030d96685d73f1b2b6da0eb39322ec7c3a1d1c5ef06b52d22646cea30a96f822de1800d31e9

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
                MD5

                e78567d99f72cc017c58ce1dbdeead38

                SHA1

                32ba6b76b974ba6723ee512407a59893888cecd1

                SHA256

                d2abe90f1e8d0fd7502be84956fcac9296a5bab5c18ca961fcab3cc13a3140b0

                SHA512

                8417caa3f722c5fc1ce569c566c5d3a6d7af5c775300dd49532b6842d416180103c5386c122e9b5844cb859c32173dad4342e26cb0509d2a822ffb96605b7766

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esitanza.mpeg
                MD5

                427c6ebcc433964a24b02173f29f50a2

                SHA1

                8d99cd9f94f102a174a153f002a48a202c9cf086

                SHA256

                73ce8f59b6e5236e39d061984ad5d9dae9e30ce0f57947485852eff2510011e3

                SHA512

                e9cd8901cd47e006e271401e51cfcd4f8bc807a50685a6a1e632e2b7aa4dfe4936a2cdaf96798151229e24ca0b99c32ef9238793058ddc26af698524b7694d76

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Gioco.mpeg
                MD5

                3a0ff91c269582c1d565af0dc43bb90c

                SHA1

                2e30abe0a8ce9d88d30970045699bbe60f21f1bc

                SHA256

                db2812a7b23090ba287410fae0afcbee1b8bb53dcd1ce7c342005093c8cfbb2f

                SHA512

                9b14c7fb67fe331ca6dd0d445f9c449198c16939b08d53587005b70200db9f9d17d69ec65b18c84cfba4e51b1e53e72d72ddbd7c72db988cfffcffc3669ef1b8

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Lucca.exe.com
                MD5

                c56b5f0201a3b3de53e561fe76912bfd

                SHA1

                2a4062e10a5de813f5688221dbeb3f3ff33eb417

                SHA256

                237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                SHA512

                195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Lucca.exe.com
                MD5

                c56b5f0201a3b3de53e561fe76912bfd

                SHA1

                2a4062e10a5de813f5688221dbeb3f3ff33eb417

                SHA256

                237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                SHA512

                195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Lucca.exe.com
                MD5

                c56b5f0201a3b3de53e561fe76912bfd

                SHA1

                2a4062e10a5de813f5688221dbeb3f3ff33eb417

                SHA256

                237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                SHA512

                195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Miele.mpeg
                MD5

                2855e5e33ce8a671af83d926edc50ca5

                SHA1

                abaa3f3dbd2e7015a16c86061b5ed50e9d9fdfe6

                SHA256

                4b47193fc4658debb1e8e9020ffc5242870c2d7a11fbf9dd401d5746baf390dd

                SHA512

                6dcc5a75d4bc5bef801cc396eaaa66c6920aedec66a0b48d68d7382856f181043c2d0cbb11a560926160f1fdfa342c37b517f2faf5118601365efd61206cd6b1

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tue.mpeg
                MD5

                35b7b68ab0c10c09e68774cde98bd3f8

                SHA1

                4254c30bc7ca8972eb0889c62a114e9ae7db2242

                SHA256

                683e8ee070649cf1bb12c9259b5d1f557ef8e465ddb91b7c5c53db00c6ecabbc

                SHA512

                92fab930fcd0106644e09337995a019ab5f6df0bbe9fde2411714321c877df5fba331d40a4d55504c3bfba75fff041127755e7ef204bdd335bca96543c7368c8

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\e
                MD5

                427c6ebcc433964a24b02173f29f50a2

                SHA1

                8d99cd9f94f102a174a153f002a48a202c9cf086

                SHA256

                73ce8f59b6e5236e39d061984ad5d9dae9e30ce0f57947485852eff2510011e3

                SHA512

                e9cd8901cd47e006e271401e51cfcd4f8bc807a50685a6a1e632e2b7aa4dfe4936a2cdaf96798151229e24ca0b99c32ef9238793058ddc26af698524b7694d76

              • C:\Users\Admin\AppData\Local\Temp\ISCSHS~1.TMP
                MD5

                7386df2d975ef96ef522799851969ce6

                SHA1

                c8cf209f8ade0a9cbb2fb85d7c85249e72a414ae

                SHA256

                329288495b2c02eca00ae8d1c3f60131332e68bcd5aedba63f3f60807fb23ed3

                SHA512

                350221cb59e35c4e6c737d52dfb46c506dae0332f51763f371ac4ba5b064ec3d2f49b429aca6f492687aeb4aaa65a2b25885f4ec9f148e5e2ae235ab70262861

              • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
                MD5

                31b5d8e5ed683cc81b9bc86bb0e52cbf

                SHA1

                0e67c2ea30a6eea520ae7090103b40bf993912be

                SHA256

                210cf285b5e19e67f752e3cc68ceaf6a46bee8d554af6882a03bbb4723472c55

                SHA512

                4dbea8a629cad21b874a28d00061abff1a26cd4db4949cf0a7662a052a1270eab04b68eaf97e1bd724ead4a2722d27f933c0e6c8b57250a7e8f3cd5bd63be2fd

              • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
                MD5

                31b5d8e5ed683cc81b9bc86bb0e52cbf

                SHA1

                0e67c2ea30a6eea520ae7090103b40bf993912be

                SHA256

                210cf285b5e19e67f752e3cc68ceaf6a46bee8d554af6882a03bbb4723472c55

                SHA512

                4dbea8a629cad21b874a28d00061abff1a26cd4db4949cf0a7662a052a1270eab04b68eaf97e1bd724ead4a2722d27f933c0e6c8b57250a7e8f3cd5bd63be2fd

              • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
                MD5

                3e7e5920c63db4bb2e6ca27233a2dca2

                SHA1

                09dbb68babcda244a6ce0e36943493e9666dc9e4

                SHA256

                13b85b6a099f6744e182089650c5fd877331e8ca23c36f0df14587f8c05b48aa

                SHA512

                4ff2ea42da2b4cc7d76a8a4035bdf704475397b2462cd3ab9b75fb01d567f9774570d0922510f9c200b57cdeb46217102ad81990253379ef82c43c64a401117c

              • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
                MD5

                3e7e5920c63db4bb2e6ca27233a2dca2

                SHA1

                09dbb68babcda244a6ce0e36943493e9666dc9e4

                SHA256

                13b85b6a099f6744e182089650c5fd877331e8ca23c36f0df14587f8c05b48aa

                SHA512

                4ff2ea42da2b4cc7d76a8a4035bdf704475397b2462cd3ab9b75fb01d567f9774570d0922510f9c200b57cdeb46217102ad81990253379ef82c43c64a401117c

              • C:\Users\Admin\AppData\Local\Temp\iscshsuq.exe
                MD5

                52f6faca0532c27ff56d489fedfbe06f

                SHA1

                484bef833639d33a190899d7d78e78bf47199ab1

                SHA256

                7ede8f2954f1dd8de16087ee498117e51c1b7be094afaf879fe48f45dcab5c02

                SHA512

                7da1b2a60de69dbf1fa3f42f5293dea9dcbd5ece2c1f0e02ee6b4bd8185cf3ac7d2e2c654da163650676acf83e02115c0fd9c1fce6bb8a30dc02517a9be62c3d

              • C:\Users\Admin\AppData\Local\Temp\iscshsuq.exe
                MD5

                52f6faca0532c27ff56d489fedfbe06f

                SHA1

                484bef833639d33a190899d7d78e78bf47199ab1

                SHA256

                7ede8f2954f1dd8de16087ee498117e51c1b7be094afaf879fe48f45dcab5c02

                SHA512

                7da1b2a60de69dbf1fa3f42f5293dea9dcbd5ece2c1f0e02ee6b4bd8185cf3ac7d2e2c654da163650676acf83e02115c0fd9c1fce6bb8a30dc02517a9be62c3d

              • C:\Users\Admin\AppData\Local\Temp\tmp4ECC.tmp.ps1
                MD5

                bd717196034d14da764bcac50c233e62

                SHA1

                fa567e7c531f1a85dcaa4fbfeeaf7a108d76a4a5

                SHA256

                32c41ad6ccec6552dc2d83e538f4c4aa7bb669379d71a96a73efd8dfe934408d

                SHA512

                c8d466631f3de720d686d1ae48438de3e18c140c797f75d5c5b19bec8b029e8922a388d666e62e61443b61cf7a7dc0fd2181621d7d2e7a5f9d4147e462b83ea8

              • C:\Users\Admin\AppData\Local\Temp\tmp6A49.tmp.ps1
                MD5

                0cb677f6cb8761d71d24c1febe2ba7d7

                SHA1

                39252ac0d24f4b0254d0f64b3a6a39799ca88638

                SHA256

                5fb0b61528b6f6ce1ada12e80a647218e9f429ecb40524de04d172055759b8a9

                SHA512

                f2ff586767bd4d49e8b47bddd25762cdec482a00d1f057dfb67678496caf19ff18de2f5982846713551cf453a026cdebcb0883409c9f6a1fdeaeb941e54159b0

              • C:\Users\Admin\AppData\Local\Temp\tmp6A4A.tmp
                MD5

                1860260b2697808b80802352fe324782

                SHA1

                f07b4cb6a8133d8dd942fc285d63cb3ce5a1ed6b

                SHA256

                0c4bb6ae7726faa47aef8459bcf37bf9ca16f0b93fd52790932adaf7845d1fb1

                SHA512

                d9fd458e2fe871e93199d7f3783133ded898d824024d9525e8c9af2af31892b13f3fb147d3bfda7dfd7659b7072f5cd1d6c3ebfe2dbf5893afd00e59a96aa94f

              • C:\Users\Admin\AppData\Local\Temp\viewqbdtg.vbs
                MD5

                6de2e058db2926bd4ba7e08ad54e54ab

                SHA1

                df6349cd59415f86775649d3735abab8f4290128

                SHA256

                00355b979b63b680603b59f18e70cad069e21ffab6d7fb50a80cd285db5081b2

                SHA512

                e6a02af48adcbef9cc57bac68ff32dec173c19c36f498287241381fc6265603de46dd8221f2e19be1a1c19595ce9fea3c0a52eb0add0ca2767d0c7ea52b7ed6f

              • C:\Users\Admin\AppData\Local\Temp\wjxkiisqifj.vbs
                MD5

                c743f3a625936ba3c3b908a3c91f1832

                SHA1

                0a69607fd465c02e9988554865c6f4aaa2ef8d16

                SHA256

                6445e12a43f31cc4e46edea24f5e822d68bba3197ae60e39ec26e9015b808f7d

                SHA512

                0e748576aede8537894e4d3902c18169a13899512ec6a47f3aa7a5b8af097f7bfb4326295e0fbaab59071835b66d90b6618806b314361e5dd065f3455177c082

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                MD5

                ae44c9ff9d47eb0883350ea5834ae770

                SHA1

                df721c3f33f1c4ead067b68d63e3b05017473b9a

                SHA256

                c1ef87271f400892e0f2a955530f50079d0fcb511e92bd767bc39d838e01559d

                SHA512

                d3aa73bb0b188b8af7295caeefc649dc7c0a373228eb9d6d86628d9f636a0d6dfaf61bf0f9b7201a4a21ae345397b816efdbc112dd06cdb7c171c7c72e558d6c

              • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
                MD5

                31b5d8e5ed683cc81b9bc86bb0e52cbf

                SHA1

                0e67c2ea30a6eea520ae7090103b40bf993912be

                SHA256

                210cf285b5e19e67f752e3cc68ceaf6a46bee8d554af6882a03bbb4723472c55

                SHA512

                4dbea8a629cad21b874a28d00061abff1a26cd4db4949cf0a7662a052a1270eab04b68eaf97e1bd724ead4a2722d27f933c0e6c8b57250a7e8f3cd5bd63be2fd

              • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
                MD5

                31b5d8e5ed683cc81b9bc86bb0e52cbf

                SHA1

                0e67c2ea30a6eea520ae7090103b40bf993912be

                SHA256

                210cf285b5e19e67f752e3cc68ceaf6a46bee8d554af6882a03bbb4723472c55

                SHA512

                4dbea8a629cad21b874a28d00061abff1a26cd4db4949cf0a7662a052a1270eab04b68eaf97e1bd724ead4a2722d27f933c0e6c8b57250a7e8f3cd5bd63be2fd

              • \??\PIPE\srvsvc
                MD5

                d41d8cd98f00b204e9800998ecf8427e

                SHA1

                da39a3ee5e6b4b0d3255bfef95601890afd80709

                SHA256

                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                SHA512

                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

              • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\Lucca.exe.com
                MD5

                c56b5f0201a3b3de53e561fe76912bfd

                SHA1

                2a4062e10a5de813f5688221dbeb3f3ff33eb417

                SHA256

                237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                SHA512

                195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

              • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\Lucca.exe.com
                MD5

                c56b5f0201a3b3de53e561fe76912bfd

                SHA1

                2a4062e10a5de813f5688221dbeb3f3ff33eb417

                SHA256

                237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                SHA512

                195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

              • \Users\Admin\AppData\Local\Temp\ISCSHS~1.TMP
                MD5

                7386df2d975ef96ef522799851969ce6

                SHA1

                c8cf209f8ade0a9cbb2fb85d7c85249e72a414ae

                SHA256

                329288495b2c02eca00ae8d1c3f60131332e68bcd5aedba63f3f60807fb23ed3

                SHA512

                350221cb59e35c4e6c737d52dfb46c506dae0332f51763f371ac4ba5b064ec3d2f49b429aca6f492687aeb4aaa65a2b25885f4ec9f148e5e2ae235ab70262861

              • \Users\Admin\AppData\Local\Temp\ISCSHS~1.TMP
                MD5

                7386df2d975ef96ef522799851969ce6

                SHA1

                c8cf209f8ade0a9cbb2fb85d7c85249e72a414ae

                SHA256

                329288495b2c02eca00ae8d1c3f60131332e68bcd5aedba63f3f60807fb23ed3

                SHA512

                350221cb59e35c4e6c737d52dfb46c506dae0332f51763f371ac4ba5b064ec3d2f49b429aca6f492687aeb4aaa65a2b25885f4ec9f148e5e2ae235ab70262861

              • \Users\Admin\AppData\Local\Temp\New Feature\4.exe
                MD5

                31b5d8e5ed683cc81b9bc86bb0e52cbf

                SHA1

                0e67c2ea30a6eea520ae7090103b40bf993912be

                SHA256

                210cf285b5e19e67f752e3cc68ceaf6a46bee8d554af6882a03bbb4723472c55

                SHA512

                4dbea8a629cad21b874a28d00061abff1a26cd4db4949cf0a7662a052a1270eab04b68eaf97e1bd724ead4a2722d27f933c0e6c8b57250a7e8f3cd5bd63be2fd

              • \Users\Admin\AppData\Local\Temp\New Feature\4.exe
                MD5

                31b5d8e5ed683cc81b9bc86bb0e52cbf

                SHA1

                0e67c2ea30a6eea520ae7090103b40bf993912be

                SHA256

                210cf285b5e19e67f752e3cc68ceaf6a46bee8d554af6882a03bbb4723472c55

                SHA512

                4dbea8a629cad21b874a28d00061abff1a26cd4db4949cf0a7662a052a1270eab04b68eaf97e1bd724ead4a2722d27f933c0e6c8b57250a7e8f3cd5bd63be2fd

              • \Users\Admin\AppData\Local\Temp\New Feature\4.exe
                MD5

                31b5d8e5ed683cc81b9bc86bb0e52cbf

                SHA1

                0e67c2ea30a6eea520ae7090103b40bf993912be

                SHA256

                210cf285b5e19e67f752e3cc68ceaf6a46bee8d554af6882a03bbb4723472c55

                SHA512

                4dbea8a629cad21b874a28d00061abff1a26cd4db4949cf0a7662a052a1270eab04b68eaf97e1bd724ead4a2722d27f933c0e6c8b57250a7e8f3cd5bd63be2fd

              • \Users\Admin\AppData\Local\Temp\New Feature\4.exe
                MD5

                31b5d8e5ed683cc81b9bc86bb0e52cbf

                SHA1

                0e67c2ea30a6eea520ae7090103b40bf993912be

                SHA256

                210cf285b5e19e67f752e3cc68ceaf6a46bee8d554af6882a03bbb4723472c55

                SHA512

                4dbea8a629cad21b874a28d00061abff1a26cd4db4949cf0a7662a052a1270eab04b68eaf97e1bd724ead4a2722d27f933c0e6c8b57250a7e8f3cd5bd63be2fd

              • \Users\Admin\AppData\Local\Temp\New Feature\4.exe
                MD5

                31b5d8e5ed683cc81b9bc86bb0e52cbf

                SHA1

                0e67c2ea30a6eea520ae7090103b40bf993912be

                SHA256

                210cf285b5e19e67f752e3cc68ceaf6a46bee8d554af6882a03bbb4723472c55

                SHA512

                4dbea8a629cad21b874a28d00061abff1a26cd4db4949cf0a7662a052a1270eab04b68eaf97e1bd724ead4a2722d27f933c0e6c8b57250a7e8f3cd5bd63be2fd

              • \Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
                MD5

                3e7e5920c63db4bb2e6ca27233a2dca2

                SHA1

                09dbb68babcda244a6ce0e36943493e9666dc9e4

                SHA256

                13b85b6a099f6744e182089650c5fd877331e8ca23c36f0df14587f8c05b48aa

                SHA512

                4ff2ea42da2b4cc7d76a8a4035bdf704475397b2462cd3ab9b75fb01d567f9774570d0922510f9c200b57cdeb46217102ad81990253379ef82c43c64a401117c

              • \Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
                MD5

                3e7e5920c63db4bb2e6ca27233a2dca2

                SHA1

                09dbb68babcda244a6ce0e36943493e9666dc9e4

                SHA256

                13b85b6a099f6744e182089650c5fd877331e8ca23c36f0df14587f8c05b48aa

                SHA512

                4ff2ea42da2b4cc7d76a8a4035bdf704475397b2462cd3ab9b75fb01d567f9774570d0922510f9c200b57cdeb46217102ad81990253379ef82c43c64a401117c

              • \Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
                MD5

                3e7e5920c63db4bb2e6ca27233a2dca2

                SHA1

                09dbb68babcda244a6ce0e36943493e9666dc9e4

                SHA256

                13b85b6a099f6744e182089650c5fd877331e8ca23c36f0df14587f8c05b48aa

                SHA512

                4ff2ea42da2b4cc7d76a8a4035bdf704475397b2462cd3ab9b75fb01d567f9774570d0922510f9c200b57cdeb46217102ad81990253379ef82c43c64a401117c

              • \Users\Admin\AppData\Local\Temp\iscshsuq.exe
                MD5

                52f6faca0532c27ff56d489fedfbe06f

                SHA1

                484bef833639d33a190899d7d78e78bf47199ab1

                SHA256

                7ede8f2954f1dd8de16087ee498117e51c1b7be094afaf879fe48f45dcab5c02

                SHA512

                7da1b2a60de69dbf1fa3f42f5293dea9dcbd5ece2c1f0e02ee6b4bd8185cf3ac7d2e2c654da163650676acf83e02115c0fd9c1fce6bb8a30dc02517a9be62c3d

              • \Users\Admin\AppData\Local\Temp\iscshsuq.exe
                MD5

                52f6faca0532c27ff56d489fedfbe06f

                SHA1

                484bef833639d33a190899d7d78e78bf47199ab1

                SHA256

                7ede8f2954f1dd8de16087ee498117e51c1b7be094afaf879fe48f45dcab5c02

                SHA512

                7da1b2a60de69dbf1fa3f42f5293dea9dcbd5ece2c1f0e02ee6b4bd8185cf3ac7d2e2c654da163650676acf83e02115c0fd9c1fce6bb8a30dc02517a9be62c3d

              • \Users\Admin\AppData\Local\Temp\iscshsuq.exe
                MD5

                52f6faca0532c27ff56d489fedfbe06f

                SHA1

                484bef833639d33a190899d7d78e78bf47199ab1

                SHA256

                7ede8f2954f1dd8de16087ee498117e51c1b7be094afaf879fe48f45dcab5c02

                SHA512

                7da1b2a60de69dbf1fa3f42f5293dea9dcbd5ece2c1f0e02ee6b4bd8185cf3ac7d2e2c654da163650676acf83e02115c0fd9c1fce6bb8a30dc02517a9be62c3d

              • \Users\Admin\AppData\Local\Temp\iscshsuq.exe
                MD5

                52f6faca0532c27ff56d489fedfbe06f

                SHA1

                484bef833639d33a190899d7d78e78bf47199ab1

                SHA256

                7ede8f2954f1dd8de16087ee498117e51c1b7be094afaf879fe48f45dcab5c02

                SHA512

                7da1b2a60de69dbf1fa3f42f5293dea9dcbd5ece2c1f0e02ee6b4bd8185cf3ac7d2e2c654da163650676acf83e02115c0fd9c1fce6bb8a30dc02517a9be62c3d

              • \Users\Admin\AppData\Local\Temp\nsn87E6.tmp\UAC.dll
                MD5

                adb29e6b186daa765dc750128649b63d

                SHA1

                160cbdc4cb0ac2c142d361df138c537aa7e708c9

                SHA256

                2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

                SHA512

                b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

              • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
                MD5

                31b5d8e5ed683cc81b9bc86bb0e52cbf

                SHA1

                0e67c2ea30a6eea520ae7090103b40bf993912be

                SHA256

                210cf285b5e19e67f752e3cc68ceaf6a46bee8d554af6882a03bbb4723472c55

                SHA512

                4dbea8a629cad21b874a28d00061abff1a26cd4db4949cf0a7662a052a1270eab04b68eaf97e1bd724ead4a2722d27f933c0e6c8b57250a7e8f3cd5bd63be2fd

              • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
                MD5

                31b5d8e5ed683cc81b9bc86bb0e52cbf

                SHA1

                0e67c2ea30a6eea520ae7090103b40bf993912be

                SHA256

                210cf285b5e19e67f752e3cc68ceaf6a46bee8d554af6882a03bbb4723472c55

                SHA512

                4dbea8a629cad21b874a28d00061abff1a26cd4db4949cf0a7662a052a1270eab04b68eaf97e1bd724ead4a2722d27f933c0e6c8b57250a7e8f3cd5bd63be2fd

              • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
                MD5

                31b5d8e5ed683cc81b9bc86bb0e52cbf

                SHA1

                0e67c2ea30a6eea520ae7090103b40bf993912be

                SHA256

                210cf285b5e19e67f752e3cc68ceaf6a46bee8d554af6882a03bbb4723472c55

                SHA512

                4dbea8a629cad21b874a28d00061abff1a26cd4db4949cf0a7662a052a1270eab04b68eaf97e1bd724ead4a2722d27f933c0e6c8b57250a7e8f3cd5bd63be2fd

              • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
                MD5

                31b5d8e5ed683cc81b9bc86bb0e52cbf

                SHA1

                0e67c2ea30a6eea520ae7090103b40bf993912be

                SHA256

                210cf285b5e19e67f752e3cc68ceaf6a46bee8d554af6882a03bbb4723472c55

                SHA512

                4dbea8a629cad21b874a28d00061abff1a26cd4db4949cf0a7662a052a1270eab04b68eaf97e1bd724ead4a2722d27f933c0e6c8b57250a7e8f3cd5bd63be2fd

              • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
                MD5

                31b5d8e5ed683cc81b9bc86bb0e52cbf

                SHA1

                0e67c2ea30a6eea520ae7090103b40bf993912be

                SHA256

                210cf285b5e19e67f752e3cc68ceaf6a46bee8d554af6882a03bbb4723472c55

                SHA512

                4dbea8a629cad21b874a28d00061abff1a26cd4db4949cf0a7662a052a1270eab04b68eaf97e1bd724ead4a2722d27f933c0e6c8b57250a7e8f3cd5bd63be2fd

              • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
                MD5

                31b5d8e5ed683cc81b9bc86bb0e52cbf

                SHA1

                0e67c2ea30a6eea520ae7090103b40bf993912be

                SHA256

                210cf285b5e19e67f752e3cc68ceaf6a46bee8d554af6882a03bbb4723472c55

                SHA512

                4dbea8a629cad21b874a28d00061abff1a26cd4db4949cf0a7662a052a1270eab04b68eaf97e1bd724ead4a2722d27f933c0e6c8b57250a7e8f3cd5bd63be2fd

              • memory/268-147-0x00000000001D0000-0x00000000001DF000-memory.dmp
                Filesize

                60KB

              • memory/268-145-0x00000000025B0000-0x0000000003846000-memory.dmp
                Filesize

                18.6MB

              • memory/268-140-0x0000000000B10000-0x0000000000C6E000-memory.dmp
                Filesize

                1.4MB

              • memory/268-137-0x0000000000000000-mapping.dmp
              • memory/584-95-0x0000000000000000-mapping.dmp
              • memory/584-112-0x0000000000170000-0x0000000000171000-memory.dmp
                Filesize

                4KB

              • memory/892-155-0x0000000004BE2000-0x0000000004BE3000-memory.dmp
                Filesize

                4KB

              • memory/892-152-0x0000000002360000-0x0000000002361000-memory.dmp
                Filesize

                4KB

              • memory/892-176-0x0000000006760000-0x0000000006761000-memory.dmp
                Filesize

                4KB

              • memory/892-175-0x000000007EF30000-0x000000007EF31000-memory.dmp
                Filesize

                4KB

              • memory/892-174-0x0000000006530000-0x0000000006531000-memory.dmp
                Filesize

                4KB

              • memory/892-156-0x00000000027B0000-0x00000000027B1000-memory.dmp
                Filesize

                4KB

              • memory/892-167-0x0000000006450000-0x0000000006451000-memory.dmp
                Filesize

                4KB

              • memory/892-154-0x0000000004BE0000-0x0000000004BE1000-memory.dmp
                Filesize

                4KB

              • memory/892-166-0x0000000006380000-0x0000000006381000-memory.dmp
                Filesize

                4KB

              • memory/892-150-0x0000000000000000-mapping.dmp
              • memory/892-157-0x0000000004B70000-0x0000000004B71000-memory.dmp
                Filesize

                4KB

              • memory/892-153-0x0000000004C20000-0x0000000004C21000-memory.dmp
                Filesize

                4KB

              • memory/892-161-0x0000000006320000-0x0000000006321000-memory.dmp
                Filesize

                4KB

              • memory/972-111-0x0000000000400000-0x0000000002B7B000-memory.dmp
                Filesize

                39.5MB

              • memory/972-102-0x0000000000000000-mapping.dmp
              • memory/1036-59-0x0000000075721000-0x0000000075723000-memory.dmp
                Filesize

                8KB

              • memory/1232-201-0x0000000000000000-mapping.dmp
              • memory/1408-80-0x0000000000000000-mapping.dmp
              • memory/1580-88-0x0000000000000000-mapping.dmp
              • memory/1596-131-0x0000000000000000-mapping.dmp
              • memory/1604-82-0x0000000000000000-mapping.dmp
              • memory/1616-198-0x0000000000000000-mapping.dmp
              • memory/1652-87-0x0000000000000000-mapping.dmp
              • memory/1652-121-0x0000000000000000-mapping.dmp
              • memory/1692-148-0x0000000000190000-0x0000000000330000-memory.dmp
                Filesize

                1.6MB

              • memory/1692-146-0x00000000FF023CEC-mapping.dmp
              • memory/1692-149-0x0000000001EF0000-0x00000000020A1000-memory.dmp
                Filesize

                1.7MB

              • memory/1700-115-0x0000000000000000-mapping.dmp
              • memory/1700-129-0x0000000003280000-0x0000000005AD0000-memory.dmp
                Filesize

                40.3MB

              • memory/1700-130-0x0000000000400000-0x0000000002C50000-memory.dmp
                Filesize

                40.3MB

              • memory/1780-77-0x0000000000000000-mapping.dmp
              • memory/1788-203-0x0000000000000000-mapping.dmp
              • memory/1964-67-0x0000000000000000-mapping.dmp
              • memory/1968-197-0x0000000006330000-0x0000000006331000-memory.dmp
                Filesize

                4KB

              • memory/1968-186-0x0000000004C30000-0x0000000004C31000-memory.dmp
                Filesize

                4KB

              • memory/1968-177-0x0000000000000000-mapping.dmp
              • memory/1968-187-0x0000000004C32000-0x0000000004C33000-memory.dmp
                Filesize

                4KB

              • memory/1968-184-0x0000000002A30000-0x0000000002A31000-memory.dmp
                Filesize

                4KB

              • memory/1968-183-0x0000000002820000-0x0000000002821000-memory.dmp
                Filesize

                4KB

              • memory/1968-181-0x0000000002170000-0x0000000002171000-memory.dmp
                Filesize

                4KB

              • memory/1968-182-0x0000000004C70000-0x0000000004C71000-memory.dmp
                Filesize

                4KB

              • memory/1984-144-0x00000000026C0000-0x0000000003956000-memory.dmp
                Filesize

                18.6MB

              • memory/1984-124-0x0000000000000000-mapping.dmp
              • memory/1984-128-0x0000000000B50000-0x0000000000CAE000-memory.dmp
                Filesize

                1.4MB

              • memory/1984-110-0x0000000000400000-0x0000000002B7B000-memory.dmp
                Filesize

                39.5MB

              • memory/1984-109-0x0000000000240000-0x0000000000266000-memory.dmp
                Filesize

                152KB

              • memory/1984-63-0x0000000000000000-mapping.dmp