Analysis

  • max time kernel
    131s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    30-10-2021 06:12

General

  • Target

    d14b20c4eb8676d6b311af2e9dde7f93.exe

  • Size

    124KB

  • MD5

    d14b20c4eb8676d6b311af2e9dde7f93

  • SHA1

    83fc9c84a0e1c37c2144a3ef9bec83a0569847bb

  • SHA256

    a3cf60a275c70b3b79a12f40ef477ceacc35b66209856fafe770df228df08de4

  • SHA512

    cbc5bcfd7251ffb7c8b7d5c9795a2f502f52dde24b7b475996684ad080b808b0996ffeb43020bd31c8453d2243e0d23d108fc8255aea2f48de62d9572a510014

Malware Config

Extracted

Family

redline

C2

80.66.87.50:80

Extracted

Family

smokeloader

Version

2020

C2

http://planilhasvba.com.br/wp-admin/js/k/index.php

http://rpk32ubon.ac.th/backup/k/index.php

http://4urhappiness.com/app/k/index.php

http://swedenkhabar.com/wp-admin/js/k/index.php

http://cio.lankapanel.net/wp-admin/js/k/index.php

http://fcmsites.com.br/canal/wp-admin/js/k/index.php

http://lacoibipitanga.com.br/maxart/k/index.php

http://lacoibipitanga.com.br/cgi-bin/k/index.php

http://video.nalahotel.com/k/index.php

http://diving-phocea.com/wp-admin/k/index.php

http://phocea-sudan.com/cgi-bin/k/index.php

http://rpk32ubon.ac.th/wp-admin/js/k/index.php

https://www.twinrealty.com/vworker/k/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

223

C2

23.94.183.146:60709

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Windows security bypass 2 TTPs
  • Nirsoft 14 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 11 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d14b20c4eb8676d6b311af2e9dde7f93.exe
    "C:\Users\Admin\AppData\Local\Temp\d14b20c4eb8676d6b311af2e9dde7f93.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Users\Admin\AppData\Local\Temp\136.exe
      "C:\Users\Admin\AppData\Local\Temp\136.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:832
    • C:\Users\Admin\AppData\Local\Temp\NIKE.exe
      "C:\Users\Admin\AppData\Local\Temp\NIKE.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1324
  • C:\Users\Admin\AppData\Local\Temp\8F54.exe
    C:\Users\Admin\AppData\Local\Temp\8F54.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Windows security modification
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Cursors\ꁂꀯꁚꀩꁫꀪꀫꀫꀰꁝꁡꁎꀰꀧꀭ\svchost.exe" -Force
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1632
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\8F54.exe" -Force
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1836
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Cursors\ꁂꀯꁚꀩꁫꀪꀫꀫꀰꁝꁡꁎꀰꀧꀭ\svchost.exe" -Force
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:832
    • C:\Users\Admin\AppData\Local\Temp\55c858bc-33fe-4672-8b33-589220209e5e\AdvancedRun.exe
      "C:\Users\Admin\AppData\Local\Temp\55c858bc-33fe-4672-8b33-589220209e5e\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\55c858bc-33fe-4672-8b33-589220209e5e\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Users\Admin\AppData\Local\Temp\55c858bc-33fe-4672-8b33-589220209e5e\AdvancedRun.exe
        "C:\Users\Admin\AppData\Local\Temp\55c858bc-33fe-4672-8b33-589220209e5e\AdvancedRun.exe" /SpecialRun 4101d8 1608
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1744
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\8F54.exe" -Force
      2⤵
        PID:612
      • C:\Users\Admin\AppData\Local\Temp\8F54.exe
        C:\Users\Admin\AppData\Local\Temp\8F54.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1300
      • C:\Users\Admin\AppData\Local\Temp\8F54.exe
        C:\Users\Admin\AppData\Local\Temp\8F54.exe
        2⤵
          PID:1752
      • C:\Users\Admin\AppData\Local\Temp\9A6C.exe
        C:\Users\Admin\AppData\Local\Temp\9A6C.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:948
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Cursors\㴊㳭㳷㳽㳺㴇㳔㴉㳜㴒㴉㴇㳝㳥㳬\svchost.exe" -Force
          2⤵
            PID:1948
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\9A6C.exe" -Force
            2⤵
              PID:1592
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Cursors\㴊㳭㳷㳽㳺㴇㳔㴉㳜㴒㴉㴇㳝㳥㳬\svchost.exe" -Force
              2⤵
                PID:856
              • C:\Users\Admin\AppData\Local\Temp\5c7f0d20-7d57-4e23-95a2-201dc52dd76e\AdvancedRun.exe
                "C:\Users\Admin\AppData\Local\Temp\5c7f0d20-7d57-4e23-95a2-201dc52dd76e\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\5c7f0d20-7d57-4e23-95a2-201dc52dd76e\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
                2⤵
                  PID:1300
                  • C:\Users\Admin\AppData\Local\Temp\5c7f0d20-7d57-4e23-95a2-201dc52dd76e\AdvancedRun.exe
                    "C:\Users\Admin\AppData\Local\Temp\5c7f0d20-7d57-4e23-95a2-201dc52dd76e\AdvancedRun.exe" /SpecialRun 4101d8 1300
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1616
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\9A6C.exe" -Force
                  2⤵
                    PID:1356
                  • C:\Users\Admin\AppData\Local\Temp\9A6C.exe
                    C:\Users\Admin\AppData\Local\Temp\9A6C.exe
                    2⤵
                      PID:1600
                  • C:\Users\Admin\AppData\Local\Temp\A621.exe
                    C:\Users\Admin\AppData\Local\Temp\A621.exe
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2032
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 1576
                      2⤵
                      • Program crash
                      PID:1104
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:1848
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      1⤵
                        PID:1152
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                          PID:676
                          • C:\Windows\Cursors\ꁂꀯꁚꀩꁫꀪꀫꀫꀰꁝꁡꁎꀰꀧꀭ\svchost.exe
                            "C:\Windows\Cursors\ꁂꀯꁚꀩꁫꀪꀫꀫꀰꁝꁡꁎꀰꀧꀭ\svchost.exe"
                            2⤵
                              PID:900
                            • C:\Windows\Cursors\㴊㳭㳷㳽㳺㴇㳔㴉㳜㴒㴉㴇㳝㳥㳬\svchost.exe
                              "C:\Windows\Cursors\㴊㳭㳷㳽㳺㴇㳔㴉㳜㴒㴉㴇㳝㳥㳬\svchost.exe"
                              2⤵
                                PID:784

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Persistence

                            Modify Existing Service

                            1
                            T1031

                            Registry Run Keys / Startup Folder

                            1
                            T1060

                            Defense Evasion

                            Modify Registry

                            4
                            T1112

                            Disabling Security Tools

                            3
                            T1089

                            Credential Access

                            Credentials in Files

                            2
                            T1081

                            Discovery

                            Query Registry

                            2
                            T1012

                            System Information Discovery

                            2
                            T1082

                            Peripheral Device Discovery

                            1
                            T1120

                            Collection

                            Data from Local System

                            2
                            T1005

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\136.exe
                              MD5

                              db9a089c112621e85cc2d4c80fed0f18

                              SHA1

                              da57e61cdd11fb924f5db5a4b093c25d37f040cf

                              SHA256

                              9c53ac5c4df5af245263ee0d01c159378b285911fe85e10b7669b9224570a5dd

                              SHA512

                              a853e2e559a521b5cc273cd170cacbe81fed256547c0174a2b8e5d9aadc5f78ef6b6b9ea90f879fbdfd9db9ab98a702ec2dc048d48db754360cfe5c8031e7a5d

                            • C:\Users\Admin\AppData\Local\Temp\136.exe
                              MD5

                              db9a089c112621e85cc2d4c80fed0f18

                              SHA1

                              da57e61cdd11fb924f5db5a4b093c25d37f040cf

                              SHA256

                              9c53ac5c4df5af245263ee0d01c159378b285911fe85e10b7669b9224570a5dd

                              SHA512

                              a853e2e559a521b5cc273cd170cacbe81fed256547c0174a2b8e5d9aadc5f78ef6b6b9ea90f879fbdfd9db9ab98a702ec2dc048d48db754360cfe5c8031e7a5d

                            • C:\Users\Admin\AppData\Local\Temp\55c858bc-33fe-4672-8b33-589220209e5e\AdvancedRun.exe
                              MD5

                              17fc12902f4769af3a9271eb4e2dacce

                              SHA1

                              9a4a1581cc3971579574f837e110f3bd6d529dab

                              SHA256

                              29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                              SHA512

                              036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                            • C:\Users\Admin\AppData\Local\Temp\55c858bc-33fe-4672-8b33-589220209e5e\AdvancedRun.exe
                              MD5

                              17fc12902f4769af3a9271eb4e2dacce

                              SHA1

                              9a4a1581cc3971579574f837e110f3bd6d529dab

                              SHA256

                              29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                              SHA512

                              036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                            • C:\Users\Admin\AppData\Local\Temp\55c858bc-33fe-4672-8b33-589220209e5e\AdvancedRun.exe
                              MD5

                              17fc12902f4769af3a9271eb4e2dacce

                              SHA1

                              9a4a1581cc3971579574f837e110f3bd6d529dab

                              SHA256

                              29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                              SHA512

                              036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                            • C:\Users\Admin\AppData\Local\Temp\5c7f0d20-7d57-4e23-95a2-201dc52dd76e\AdvancedRun.exe
                              MD5

                              17fc12902f4769af3a9271eb4e2dacce

                              SHA1

                              9a4a1581cc3971579574f837e110f3bd6d529dab

                              SHA256

                              29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                              SHA512

                              036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                            • C:\Users\Admin\AppData\Local\Temp\5c7f0d20-7d57-4e23-95a2-201dc52dd76e\AdvancedRun.exe
                              MD5

                              17fc12902f4769af3a9271eb4e2dacce

                              SHA1

                              9a4a1581cc3971579574f837e110f3bd6d529dab

                              SHA256

                              29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                              SHA512

                              036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                            • C:\Users\Admin\AppData\Local\Temp\5c7f0d20-7d57-4e23-95a2-201dc52dd76e\AdvancedRun.exe
                              MD5

                              17fc12902f4769af3a9271eb4e2dacce

                              SHA1

                              9a4a1581cc3971579574f837e110f3bd6d529dab

                              SHA256

                              29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                              SHA512

                              036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                            • C:\Users\Admin\AppData\Local\Temp\8F54.exe
                              MD5

                              7bfd6e9bbe0fc1e00d94b16bdff563ee

                              SHA1

                              a78268391d07ab1afbeaa17d2211292c7d0663e1

                              SHA256

                              9e8bbc3cd87e16335a700fee228e9fa3ed6f67209b0297f5997c50097b7f8386

                              SHA512

                              20a10a4c5f4168a9e83aae21aacf5e53c868b7bc268e31a6a372273f53ae27419f49837030a8203ce375f78ce56b655d1ddb3bbc2d19a91f65585bf37900512c

                            • C:\Users\Admin\AppData\Local\Temp\8F54.exe
                              MD5

                              7bfd6e9bbe0fc1e00d94b16bdff563ee

                              SHA1

                              a78268391d07ab1afbeaa17d2211292c7d0663e1

                              SHA256

                              9e8bbc3cd87e16335a700fee228e9fa3ed6f67209b0297f5997c50097b7f8386

                              SHA512

                              20a10a4c5f4168a9e83aae21aacf5e53c868b7bc268e31a6a372273f53ae27419f49837030a8203ce375f78ce56b655d1ddb3bbc2d19a91f65585bf37900512c

                            • C:\Users\Admin\AppData\Local\Temp\8F54.exe
                              MD5

                              7bfd6e9bbe0fc1e00d94b16bdff563ee

                              SHA1

                              a78268391d07ab1afbeaa17d2211292c7d0663e1

                              SHA256

                              9e8bbc3cd87e16335a700fee228e9fa3ed6f67209b0297f5997c50097b7f8386

                              SHA512

                              20a10a4c5f4168a9e83aae21aacf5e53c868b7bc268e31a6a372273f53ae27419f49837030a8203ce375f78ce56b655d1ddb3bbc2d19a91f65585bf37900512c

                            • C:\Users\Admin\AppData\Local\Temp\9A6C.exe
                              MD5

                              e32a8ebbfc2bef53571a92eaa335a61f

                              SHA1

                              5cbaa1a754960c239c2d72ae1ad029d51476ef7d

                              SHA256

                              0ab795074e75a90975dd30d5e2b2331e87b65c17f2bdf2b796b83dccaf524019

                              SHA512

                              3c8ea009f3243df27afb38f107e09ddb4bb280398de8b807e3a229f5d5edb772023c1899a0b545084cb02c4898846d738fe2942d79cfdbc48968f4e4d9948d4d

                            • C:\Users\Admin\AppData\Local\Temp\9A6C.exe
                              MD5

                              e32a8ebbfc2bef53571a92eaa335a61f

                              SHA1

                              5cbaa1a754960c239c2d72ae1ad029d51476ef7d

                              SHA256

                              0ab795074e75a90975dd30d5e2b2331e87b65c17f2bdf2b796b83dccaf524019

                              SHA512

                              3c8ea009f3243df27afb38f107e09ddb4bb280398de8b807e3a229f5d5edb772023c1899a0b545084cb02c4898846d738fe2942d79cfdbc48968f4e4d9948d4d

                            • C:\Users\Admin\AppData\Local\Temp\9A6C.exe
                              MD5

                              e32a8ebbfc2bef53571a92eaa335a61f

                              SHA1

                              5cbaa1a754960c239c2d72ae1ad029d51476ef7d

                              SHA256

                              0ab795074e75a90975dd30d5e2b2331e87b65c17f2bdf2b796b83dccaf524019

                              SHA512

                              3c8ea009f3243df27afb38f107e09ddb4bb280398de8b807e3a229f5d5edb772023c1899a0b545084cb02c4898846d738fe2942d79cfdbc48968f4e4d9948d4d

                            • C:\Users\Admin\AppData\Local\Temp\A621.exe
                              MD5

                              5a69c3f0d4c4680a6c58735983bfd1b8

                              SHA1

                              4c8d9a6ad637f057c554834f94d0c52a3e3341a2

                              SHA256

                              dca30184f7d26505407363fb0cbc66f8a64abab97405c159bdc518a23cb291c2

                              SHA512

                              6f36f5354bcf332fe8366b23dfa6bb5bf226f6ad62cc0fad76ed84810b0768992ca0cbb24aff19e0414bd3a782feafab62dab2c2762928ec1e945fdcad9fa530

                            • C:\Users\Admin\AppData\Local\Temp\A621.exe
                              MD5

                              5a69c3f0d4c4680a6c58735983bfd1b8

                              SHA1

                              4c8d9a6ad637f057c554834f94d0c52a3e3341a2

                              SHA256

                              dca30184f7d26505407363fb0cbc66f8a64abab97405c159bdc518a23cb291c2

                              SHA512

                              6f36f5354bcf332fe8366b23dfa6bb5bf226f6ad62cc0fad76ed84810b0768992ca0cbb24aff19e0414bd3a782feafab62dab2c2762928ec1e945fdcad9fa530

                            • C:\Users\Admin\AppData\Local\Temp\NIKE.exe
                              MD5

                              09b913231f2c98169c57c9b2e981a220

                              SHA1

                              69e79c25d23e84f8fea9d9b27e2be0a62850981a

                              SHA256

                              b51f47e14c1c008e40daeaa223daa815b60f8008911ecfacca4aa8f0f5ec747e

                              SHA512

                              d066fe12a22f9c3a9eef9f04545d77e9e6076a061b12e7c060f0556c23fc920bd460d2c07ee7e7ab4f6da8194932ef86ca48b0878dba04ea874c2977d5357e03

                            • C:\Users\Admin\AppData\Local\Temp\NIKE.exe
                              MD5

                              09b913231f2c98169c57c9b2e981a220

                              SHA1

                              69e79c25d23e84f8fea9d9b27e2be0a62850981a

                              SHA256

                              b51f47e14c1c008e40daeaa223daa815b60f8008911ecfacca4aa8f0f5ec747e

                              SHA512

                              d066fe12a22f9c3a9eef9f04545d77e9e6076a061b12e7c060f0556c23fc920bd460d2c07ee7e7ab4f6da8194932ef86ca48b0878dba04ea874c2977d5357e03

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                              MD5

                              5cd7d8656ca0dc23a42bcd1cc9b11edd

                              SHA1

                              b5b77bdd35687a88ced5cb69323b5f1b768568de

                              SHA256

                              5927616e0d13d2594fe7a80c95a6cf7f0bebf7a5bca0651c146b5c57bb679904

                              SHA512

                              9963ad83eadf19b9a44daf04b253086c447dd66932df2993825acdd18443518e01fd06f4a1eac20c07eabd73184702b191c6cf7159c497fef4a2c5921f85481e

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                              MD5

                              5cd7d8656ca0dc23a42bcd1cc9b11edd

                              SHA1

                              b5b77bdd35687a88ced5cb69323b5f1b768568de

                              SHA256

                              5927616e0d13d2594fe7a80c95a6cf7f0bebf7a5bca0651c146b5c57bb679904

                              SHA512

                              9963ad83eadf19b9a44daf04b253086c447dd66932df2993825acdd18443518e01fd06f4a1eac20c07eabd73184702b191c6cf7159c497fef4a2c5921f85481e

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                              MD5

                              5cd7d8656ca0dc23a42bcd1cc9b11edd

                              SHA1

                              b5b77bdd35687a88ced5cb69323b5f1b768568de

                              SHA256

                              5927616e0d13d2594fe7a80c95a6cf7f0bebf7a5bca0651c146b5c57bb679904

                              SHA512

                              9963ad83eadf19b9a44daf04b253086c447dd66932df2993825acdd18443518e01fd06f4a1eac20c07eabd73184702b191c6cf7159c497fef4a2c5921f85481e

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                              MD5

                              5cd7d8656ca0dc23a42bcd1cc9b11edd

                              SHA1

                              b5b77bdd35687a88ced5cb69323b5f1b768568de

                              SHA256

                              5927616e0d13d2594fe7a80c95a6cf7f0bebf7a5bca0651c146b5c57bb679904

                              SHA512

                              9963ad83eadf19b9a44daf04b253086c447dd66932df2993825acdd18443518e01fd06f4a1eac20c07eabd73184702b191c6cf7159c497fef4a2c5921f85481e

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                              MD5

                              5cd7d8656ca0dc23a42bcd1cc9b11edd

                              SHA1

                              b5b77bdd35687a88ced5cb69323b5f1b768568de

                              SHA256

                              5927616e0d13d2594fe7a80c95a6cf7f0bebf7a5bca0651c146b5c57bb679904

                              SHA512

                              9963ad83eadf19b9a44daf04b253086c447dd66932df2993825acdd18443518e01fd06f4a1eac20c07eabd73184702b191c6cf7159c497fef4a2c5921f85481e

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                              MD5

                              5cd7d8656ca0dc23a42bcd1cc9b11edd

                              SHA1

                              b5b77bdd35687a88ced5cb69323b5f1b768568de

                              SHA256

                              5927616e0d13d2594fe7a80c95a6cf7f0bebf7a5bca0651c146b5c57bb679904

                              SHA512

                              9963ad83eadf19b9a44daf04b253086c447dd66932df2993825acdd18443518e01fd06f4a1eac20c07eabd73184702b191c6cf7159c497fef4a2c5921f85481e

                            • C:\Windows\Cursors\㴊㳭㳷㳽㳺㴇㳔㴉㳜㴒㴉㴇㳝㳥㳬\svchost.exe
                              MD5

                              e32a8ebbfc2bef53571a92eaa335a61f

                              SHA1

                              5cbaa1a754960c239c2d72ae1ad029d51476ef7d

                              SHA256

                              0ab795074e75a90975dd30d5e2b2331e87b65c17f2bdf2b796b83dccaf524019

                              SHA512

                              3c8ea009f3243df27afb38f107e09ddb4bb280398de8b807e3a229f5d5edb772023c1899a0b545084cb02c4898846d738fe2942d79cfdbc48968f4e4d9948d4d

                            • C:\Windows\Cursors\㴊㳭㳷㳽㳺㴇㳔㴉㳜㴒㴉㴇㳝㳥㳬\svchost.exe
                              MD5

                              c81009211f7113f822eebac70ccdb4fe

                              SHA1

                              5dc84022109c414473f7527e121cbdeaa21b055d

                              SHA256

                              eb89b40cc174424e062ae6b7e637f9b1526f06c7cfe8255210ec8bfabf7371be

                              SHA512

                              75d64a1a842e9a5836992774994a5160e0d7bc630d4d1302e60f40f46f526afc9e800bdb15e5a3828509316004aa1ead67778bab34707362fe0ccf0e42cf6d5f

                            • C:\Windows\Cursors\ꁂꀯꁚꀩꁫꀪꀫꀫꀰꁝꁡꁎꀰꀧꀭ\svchost.exe
                              MD5

                              384c4fe4fa91083a754272d2c19ee449

                              SHA1

                              8d33aba1f81e95234b3e40284ec35e8d510493bb

                              SHA256

                              2cd5bc063749011f5c2d905cf0524af3f3ecc3599a5d8b952c33dd3642013013

                              SHA512

                              dfd57c9731e5e67e3925385b656c448beb7f8ca871c857d5b5a49a1b578d304b142fbf26a4946de96b2b6595abf2545a539a7e3492b16acd89de792b0a250469

                            • C:\Windows\Cursors\ꁂꀯꁚꀩꁫꀪꀫꀫꀰꁝꁡꁎꀰꀧꀭ\svchost.exe
                              MD5

                              7bfd6e9bbe0fc1e00d94b16bdff563ee

                              SHA1

                              a78268391d07ab1afbeaa17d2211292c7d0663e1

                              SHA256

                              9e8bbc3cd87e16335a700fee228e9fa3ed6f67209b0297f5997c50097b7f8386

                              SHA512

                              20a10a4c5f4168a9e83aae21aacf5e53c868b7bc268e31a6a372273f53ae27419f49837030a8203ce375f78ce56b655d1ddb3bbc2d19a91f65585bf37900512c

                            • \Users\Admin\AppData\Local\Temp\55c858bc-33fe-4672-8b33-589220209e5e\AdvancedRun.exe
                              MD5

                              17fc12902f4769af3a9271eb4e2dacce

                              SHA1

                              9a4a1581cc3971579574f837e110f3bd6d529dab

                              SHA256

                              29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                              SHA512

                              036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                            • \Users\Admin\AppData\Local\Temp\55c858bc-33fe-4672-8b33-589220209e5e\AdvancedRun.exe
                              MD5

                              17fc12902f4769af3a9271eb4e2dacce

                              SHA1

                              9a4a1581cc3971579574f837e110f3bd6d529dab

                              SHA256

                              29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                              SHA512

                              036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                            • \Users\Admin\AppData\Local\Temp\55c858bc-33fe-4672-8b33-589220209e5e\AdvancedRun.exe
                              MD5

                              17fc12902f4769af3a9271eb4e2dacce

                              SHA1

                              9a4a1581cc3971579574f837e110f3bd6d529dab

                              SHA256

                              29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                              SHA512

                              036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                            • \Users\Admin\AppData\Local\Temp\55c858bc-33fe-4672-8b33-589220209e5e\AdvancedRun.exe
                              MD5

                              17fc12902f4769af3a9271eb4e2dacce

                              SHA1

                              9a4a1581cc3971579574f837e110f3bd6d529dab

                              SHA256

                              29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                              SHA512

                              036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                            • \Users\Admin\AppData\Local\Temp\5c7f0d20-7d57-4e23-95a2-201dc52dd76e\AdvancedRun.exe
                              MD5

                              17fc12902f4769af3a9271eb4e2dacce

                              SHA1

                              9a4a1581cc3971579574f837e110f3bd6d529dab

                              SHA256

                              29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                              SHA512

                              036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                            • \Users\Admin\AppData\Local\Temp\5c7f0d20-7d57-4e23-95a2-201dc52dd76e\AdvancedRun.exe
                              MD5

                              17fc12902f4769af3a9271eb4e2dacce

                              SHA1

                              9a4a1581cc3971579574f837e110f3bd6d529dab

                              SHA256

                              29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                              SHA512

                              036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                            • \Users\Admin\AppData\Local\Temp\5c7f0d20-7d57-4e23-95a2-201dc52dd76e\AdvancedRun.exe
                              MD5

                              17fc12902f4769af3a9271eb4e2dacce

                              SHA1

                              9a4a1581cc3971579574f837e110f3bd6d529dab

                              SHA256

                              29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                              SHA512

                              036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                            • \Users\Admin\AppData\Local\Temp\5c7f0d20-7d57-4e23-95a2-201dc52dd76e\AdvancedRun.exe
                              MD5

                              17fc12902f4769af3a9271eb4e2dacce

                              SHA1

                              9a4a1581cc3971579574f837e110f3bd6d529dab

                              SHA256

                              29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                              SHA512

                              036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                            • \Users\Admin\AppData\Local\Temp\8F54.exe
                              MD5

                              7bfd6e9bbe0fc1e00d94b16bdff563ee

                              SHA1

                              a78268391d07ab1afbeaa17d2211292c7d0663e1

                              SHA256

                              9e8bbc3cd87e16335a700fee228e9fa3ed6f67209b0297f5997c50097b7f8386

                              SHA512

                              20a10a4c5f4168a9e83aae21aacf5e53c868b7bc268e31a6a372273f53ae27419f49837030a8203ce375f78ce56b655d1ddb3bbc2d19a91f65585bf37900512c

                            • \Users\Admin\AppData\Local\Temp\8F54.exe
                              MD5

                              7bfd6e9bbe0fc1e00d94b16bdff563ee

                              SHA1

                              a78268391d07ab1afbeaa17d2211292c7d0663e1

                              SHA256

                              9e8bbc3cd87e16335a700fee228e9fa3ed6f67209b0297f5997c50097b7f8386

                              SHA512

                              20a10a4c5f4168a9e83aae21aacf5e53c868b7bc268e31a6a372273f53ae27419f49837030a8203ce375f78ce56b655d1ddb3bbc2d19a91f65585bf37900512c

                            • \Users\Admin\AppData\Local\Temp\9A6C.exe
                              MD5

                              e32a8ebbfc2bef53571a92eaa335a61f

                              SHA1

                              5cbaa1a754960c239c2d72ae1ad029d51476ef7d

                              SHA256

                              0ab795074e75a90975dd30d5e2b2331e87b65c17f2bdf2b796b83dccaf524019

                              SHA512

                              3c8ea009f3243df27afb38f107e09ddb4bb280398de8b807e3a229f5d5edb772023c1899a0b545084cb02c4898846d738fe2942d79cfdbc48968f4e4d9948d4d

                            • \Users\Admin\AppData\Local\Temp\A621.exe
                              MD5

                              5a69c3f0d4c4680a6c58735983bfd1b8

                              SHA1

                              4c8d9a6ad637f057c554834f94d0c52a3e3341a2

                              SHA256

                              dca30184f7d26505407363fb0cbc66f8a64abab97405c159bdc518a23cb291c2

                              SHA512

                              6f36f5354bcf332fe8366b23dfa6bb5bf226f6ad62cc0fad76ed84810b0768992ca0cbb24aff19e0414bd3a782feafab62dab2c2762928ec1e945fdcad9fa530

                            • \Users\Admin\AppData\Local\Temp\A621.exe
                              MD5

                              5a69c3f0d4c4680a6c58735983bfd1b8

                              SHA1

                              4c8d9a6ad637f057c554834f94d0c52a3e3341a2

                              SHA256

                              dca30184f7d26505407363fb0cbc66f8a64abab97405c159bdc518a23cb291c2

                              SHA512

                              6f36f5354bcf332fe8366b23dfa6bb5bf226f6ad62cc0fad76ed84810b0768992ca0cbb24aff19e0414bd3a782feafab62dab2c2762928ec1e945fdcad9fa530

                            • \Users\Admin\AppData\Local\Temp\A621.exe
                              MD5

                              5a69c3f0d4c4680a6c58735983bfd1b8

                              SHA1

                              4c8d9a6ad637f057c554834f94d0c52a3e3341a2

                              SHA256

                              dca30184f7d26505407363fb0cbc66f8a64abab97405c159bdc518a23cb291c2

                              SHA512

                              6f36f5354bcf332fe8366b23dfa6bb5bf226f6ad62cc0fad76ed84810b0768992ca0cbb24aff19e0414bd3a782feafab62dab2c2762928ec1e945fdcad9fa530

                            • \Users\Admin\AppData\Local\Temp\A621.exe
                              MD5

                              5a69c3f0d4c4680a6c58735983bfd1b8

                              SHA1

                              4c8d9a6ad637f057c554834f94d0c52a3e3341a2

                              SHA256

                              dca30184f7d26505407363fb0cbc66f8a64abab97405c159bdc518a23cb291c2

                              SHA512

                              6f36f5354bcf332fe8366b23dfa6bb5bf226f6ad62cc0fad76ed84810b0768992ca0cbb24aff19e0414bd3a782feafab62dab2c2762928ec1e945fdcad9fa530

                            • \Users\Admin\AppData\Local\Temp\A621.exe
                              MD5

                              5a69c3f0d4c4680a6c58735983bfd1b8

                              SHA1

                              4c8d9a6ad637f057c554834f94d0c52a3e3341a2

                              SHA256

                              dca30184f7d26505407363fb0cbc66f8a64abab97405c159bdc518a23cb291c2

                              SHA512

                              6f36f5354bcf332fe8366b23dfa6bb5bf226f6ad62cc0fad76ed84810b0768992ca0cbb24aff19e0414bd3a782feafab62dab2c2762928ec1e945fdcad9fa530

                            • \Users\Admin\AppData\Local\Temp\BC84.tmp
                              MD5

                              d124f55b9393c976963407dff51ffa79

                              SHA1

                              2c7bbedd79791bfb866898c85b504186db610b5d

                              SHA256

                              ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

                              SHA512

                              278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

                            • memory/612-161-0x00000000024A0000-0x00000000030EA000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/612-124-0x0000000000000000-mapping.dmp
                            • memory/612-160-0x00000000024A0000-0x00000000030EA000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/612-158-0x00000000024A0000-0x00000000030EA000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/676-190-0x000007FEFB5D1000-0x000007FEFB5D3000-memory.dmp
                              Filesize

                              8KB

                            • memory/752-57-0x0000000000820000-0x0000000000836000-memory.dmp
                              Filesize

                              88KB

                            • memory/752-65-0x000000001B5F0000-0x000000001B5F2000-memory.dmp
                              Filesize

                              8KB

                            • memory/752-56-0x00000000007D0000-0x000000000080D000-memory.dmp
                              Filesize

                              244KB

                            • memory/752-54-0x000000013F2C0000-0x000000013F2C1000-memory.dmp
                              Filesize

                              4KB

                            • memory/784-195-0x0000000000000000-mapping.dmp
                            • memory/832-60-0x0000000076201000-0x0000000076203000-memory.dmp
                              Filesize

                              8KB

                            • memory/832-108-0x00000000024C0000-0x000000000310A000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/832-58-0x0000000000000000-mapping.dmp
                            • memory/832-91-0x0000000000000000-mapping.dmp
                            • memory/856-185-0x0000000002510000-0x000000000315A000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/856-179-0x0000000002510000-0x000000000315A000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/856-126-0x0000000000000000-mapping.dmp
                            • memory/856-162-0x0000000002510000-0x000000000315A000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/900-192-0x0000000000000000-mapping.dmp
                            • memory/900-196-0x0000000001000000-0x0000000001001000-memory.dmp
                              Filesize

                              4KB

                            • memory/948-86-0x0000000000F50000-0x0000000000F51000-memory.dmp
                              Filesize

                              4KB

                            • memory/948-82-0x0000000001120000-0x0000000001121000-memory.dmp
                              Filesize

                              4KB

                            • memory/948-79-0x0000000000000000-mapping.dmp
                            • memory/948-119-0x0000000000550000-0x00000000005C5000-memory.dmp
                              Filesize

                              468KB

                            • memory/1104-159-0x0000000000000000-mapping.dmp
                            • memory/1104-186-0x0000000000900000-0x000000000096E000-memory.dmp
                              Filesize

                              440KB

                            • memory/1152-148-0x00000000000F0000-0x00000000000F7000-memory.dmp
                              Filesize

                              28KB

                            • memory/1152-149-0x00000000000E0000-0x00000000000EC000-memory.dmp
                              Filesize

                              48KB

                            • memory/1152-140-0x0000000000000000-mapping.dmp
                            • memory/1300-137-0x0000000000000000-mapping.dmp
                            • memory/1324-66-0x00000000000A0000-0x00000000000A1000-memory.dmp
                              Filesize

                              4KB

                            • memory/1324-68-0x00000000047C0000-0x00000000047C1000-memory.dmp
                              Filesize

                              4KB

                            • memory/1324-61-0x0000000000000000-mapping.dmp
                            • memory/1356-182-0x0000000001F30000-0x0000000001F31000-memory.dmp
                              Filesize

                              4KB

                            • memory/1356-188-0x0000000001F32000-0x0000000001F34000-memory.dmp
                              Filesize

                              8KB

                            • memory/1356-187-0x0000000001F31000-0x0000000001F32000-memory.dmp
                              Filesize

                              4KB

                            • memory/1356-169-0x0000000000000000-mapping.dmp
                            • memory/1428-69-0x00000000025D0000-0x00000000025E6000-memory.dmp
                              Filesize

                              88KB

                            • memory/1592-123-0x0000000000000000-mapping.dmp
                            • memory/1592-154-0x0000000002450000-0x000000000309A000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/1592-153-0x0000000002450000-0x000000000309A000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/1592-147-0x0000000002450000-0x000000000309A000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/1600-189-0x0000000000400000-0x000000000041F000-memory.dmp
                              Filesize

                              124KB

                            • memory/1600-181-0x0000000000407CA0-mapping.dmp
                            • memory/1600-178-0x0000000000400000-0x000000000041F000-memory.dmp
                              Filesize

                              124KB

                            • memory/1608-97-0x0000000000000000-mapping.dmp
                            • memory/1616-144-0x0000000000000000-mapping.dmp
                            • memory/1632-88-0x0000000000000000-mapping.dmp
                            • memory/1632-106-0x0000000002350000-0x0000000002F9A000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/1720-78-0x0000000004800000-0x0000000004801000-memory.dmp
                              Filesize

                              4KB

                            • memory/1720-77-0x0000000000450000-0x0000000000453000-memory.dmp
                              Filesize

                              12KB

                            • memory/1720-71-0x0000000000000000-mapping.dmp
                            • memory/1720-87-0x0000000005420000-0x0000000005496000-memory.dmp
                              Filesize

                              472KB

                            • memory/1720-74-0x0000000001210000-0x0000000001211000-memory.dmp
                              Filesize

                              4KB

                            • memory/1744-103-0x0000000000000000-mapping.dmp
                            • memory/1752-172-0x0000000000400000-0x0000000000420000-memory.dmp
                              Filesize

                              128KB

                            • memory/1752-173-0x0000000000418D26-mapping.dmp
                            • memory/1752-176-0x0000000000400000-0x0000000000420000-memory.dmp
                              Filesize

                              128KB

                            • memory/1752-184-0x0000000004A50000-0x0000000004A51000-memory.dmp
                              Filesize

                              4KB

                            • memory/1836-109-0x00000000024E0000-0x000000000312A000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/1836-89-0x0000000000000000-mapping.dmp
                            • memory/1836-110-0x00000000024E0000-0x000000000312A000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/1836-107-0x00000000024E0000-0x000000000312A000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/1848-120-0x0000000000000000-mapping.dmp
                            • memory/1848-150-0x00000000000F0000-0x0000000000165000-memory.dmp
                              Filesize

                              468KB

                            • memory/1848-133-0x000000006F711000-0x000000006F713000-memory.dmp
                              Filesize

                              8KB

                            • memory/1848-151-0x0000000000080000-0x00000000000EB000-memory.dmp
                              Filesize

                              428KB

                            • memory/1948-152-0x00000000023B0000-0x0000000002FFA000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/1948-121-0x0000000000000000-mapping.dmp
                            • memory/1948-157-0x00000000023B0000-0x0000000002FFA000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/1948-156-0x00000000023B0000-0x0000000002FFA000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/2032-111-0x0000000000000000-mapping.dmp
                            • memory/2032-155-0x0000000001F00000-0x0000000001F67000-memory.dmp
                              Filesize

                              412KB

                            • memory/2032-118-0x0000000004D70000-0x0000000004D71000-memory.dmp
                              Filesize

                              4KB

                            • memory/2032-114-0x0000000000880000-0x0000000000881000-memory.dmp
                              Filesize

                              4KB