Analysis

  • max time kernel
    129s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    18-05-2022 13:48

General

  • Target

    e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe

  • Size

    28.0MB

  • MD5

    05b666fa594fabf1f40b331f75609091

  • SHA1

    9ea91b4d0e830bedaa11bcb3835c415527035692

  • SHA256

    e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea

  • SHA512

    e3bb4a1833759acd5987c72954df220a3c49e9671412d28ff29a0397cf881aabab9c23e1689fe6bc94d8831287c082b4b94668653d9751abd3235f3fa7c410f7

Malware Config

Extracted

Family

amadey

Version

3.07

C2

89.163.249.231/panel/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Executes dropped EXE 8 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 24 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 49 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe
    "C:\Users\Admin\AppData\Local\Temp\e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Users\Admin\service32.exe
      "C:\Users\Admin\service32.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:908
      • C:\Windows\system32\cmd.exe
        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9F3D.tmp\9F3E.tmp\9F3F.bat C:\Users\Admin\service32.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1572
        • C:\Windows\system32\net.exe
          net stop ???Security Center???
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1940
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop ???Security Center???
            5⤵
              PID:1192
          • C:\Windows\system32\netsh.exe
            netsh firewall set opmode mode=disable
            4⤵
              PID:764
            • C:\Windows\system32\tskill.exe
              tskill /A av*
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1976
            • C:\Windows\system32\tskill.exe
              tskill /A fire*
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1216
            • C:\Windows\system32\tskill.exe
              tskill /A anti*
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1072
            • C:\Windows\system32\tskill.exe
              tskill /A spy*
              4⤵
                PID:1972
              • C:\Windows\system32\tskill.exe
                tskill /A bullguard
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:316
              • C:\Windows\system32\tskill.exe
                tskill /A PersFw
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:660
              • C:\Windows\system32\tskill.exe
                tskill /A ZONEALARM
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1740
              • C:\Windows\system32\tskill.exe
                tskill /A SAFEWEB
                4⤵
                  PID:1664
                • C:\Windows\system32\tskill.exe
                  tskill /A KAV*
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1820
                • C:\Windows\system32\tskill.exe
                  tskill /A spy*
                  4⤵
                    PID:1088
                  • C:\Windows\system32\tskill.exe
                    tskill /A bullguard
                    4⤵
                      PID:2032
                    • C:\Windows\system32\tskill.exe
                      tskill /A PersFw
                      4⤵
                        PID:1780
                      • C:\Windows\system32\tskill.exe
                        tskill /A KAV*
                        4⤵
                          PID:1892
                        • C:\Windows\system32\tskill.exe
                          tskill /A ZONEALARM
                          4⤵
                            PID:1776
                          • C:\Windows\system32\tskill.exe
                            tskill /A SAFEWEB
                            4⤵
                              PID:960
                            • C:\Windows\system32\tskill.exe
                              tskill /A OUTPOST
                              4⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1540
                            • C:\Windows\system32\tskill.exe
                              tskill /A nv*
                              4⤵
                                PID:980
                              • C:\Windows\system32\tskill.exe
                                tskill /A nav*
                                4⤵
                                  PID:1644
                                • C:\Windows\system32\tskill.exe
                                  tskill /A F-*
                                  4⤵
                                    PID:1456
                                  • C:\Windows\system32\tskill.exe
                                    tskill /A cle
                                    4⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1004
                                  • C:\Windows\system32\tskill.exe
                                    tskill /A ESAFE
                                    4⤵
                                      PID:1292
                                    • C:\Windows\system32\tskill.exe
                                      tskill /A BLACKICE
                                      4⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1544
                                    • C:\Windows\system32\tskill.exe
                                      tskill /A def*
                                      4⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1536
                                    • C:\Windows\system32\tskill.exe
                                      tskill /A kav
                                      4⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1492
                                    • C:\Windows\system32\tskill.exe
                                      tskill /A kav*
                                      4⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:580
                                    • C:\Windows\system32\tskill.exe
                                      tskill /A avg*
                                      4⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:700
                                    • C:\Windows\system32\tskill.exe
                                      tskill /A ash*
                                      4⤵
                                        PID:568
                                      • C:\Windows\system32\tskill.exe
                                        tskill /A aswupdsv
                                        4⤵
                                          PID:904
                                        • C:\Windows\system32\tskill.exe
                                          tskill /A ewid*
                                          4⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1628
                                        • C:\Windows\system32\tskill.exe
                                          tskill /A guard*
                                          4⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1032
                                        • C:\Windows\system32\tskill.exe
                                          tskill /A guar*
                                          4⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1200
                                        • C:\Windows\system32\tskill.exe
                                          tskill /A gcasDt*
                                          4⤵
                                            PID:1792
                                          • C:\Windows\system32\tskill.exe
                                            tskill /A msmp*
                                            4⤵
                                              PID:288
                                            • C:\Windows\system32\tskill.exe
                                              tskill /A mcafe*
                                              4⤵
                                                PID:764
                                              • C:\Windows\system32\tskill.exe
                                                tskill /A mghtml
                                                4⤵
                                                  PID:1676
                                                • C:\Windows\system32\tskill.exe
                                                  tskill /A msiexec
                                                  4⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:1972
                                                • C:\Windows\system32\tskill.exe
                                                  tskill /A outpost
                                                  4⤵
                                                    PID:1772
                                                  • C:\Windows\system32\tskill.exe
                                                    tskill /A isafe
                                                    4⤵
                                                      PID:1120
                                                    • C:\Windows\system32\tskill.exe
                                                      tskill /A zap*cls
                                                      4⤵
                                                        PID:1992
                                                      • C:\Windows\system32\tskill.exe
                                                        tskill /A upd*
                                                        4⤵
                                                          PID:604
                                                        • C:\Windows\system32\tskill.exe
                                                          tskill /A zauinst
                                                          4⤵
                                                            PID:1500
                                                          • C:\Windows\system32\tskill.exe
                                                            tskill /A zlclien*
                                                            4⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:1664
                                                          • C:\Windows\system32\tskill.exe
                                                            tskill /A minilog
                                                            4⤵
                                                              PID:1980
                                                            • C:\Windows\system32\tskill.exe
                                                              tskill /A cc*
                                                              4⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:2032
                                                            • C:\Windows\system32\tskill.exe
                                                              tskill /A norton*
                                                              4⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:1780
                                                            • C:\Windows\system32\tskill.exe
                                                              tskill /A ccc*
                                                              4⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:1776
                                                            • C:\Windows\system32\tskill.exe
                                                              tskill /A norton au*
                                                              4⤵
                                                                PID:976
                                                              • C:\Windows\system32\tskill.exe
                                                                tskill /A npfmn*
                                                                4⤵
                                                                  PID:1264
                                                                • C:\Windows\system32\tskill.exe
                                                                  tskill /A loge*
                                                                  4⤵
                                                                    PID:584
                                                                  • C:\Windows\system32\tskill.exe
                                                                    tskill /A tmp*
                                                                    4⤵
                                                                      PID:1600
                                                                    • C:\Windows\system32\tskill.exe
                                                                      tskill /A tmn*
                                                                      4⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:1292
                                                                    • C:\Windows\system32\tskill.exe
                                                                      tskill /A pcc*
                                                                      4⤵
                                                                        PID:1720
                                                                      • C:\Windows\system32\tskill.exe
                                                                        tskill /A pav*
                                                                        4⤵
                                                                          PID:1520
                                                                        • C:\Windows\system32\tskill.exe
                                                                          tskill /A panda*
                                                                          4⤵
                                                                            PID:1516
                                                                          • C:\Windows\system32\tskill.exe
                                                                            tskill /A avsch*
                                                                            4⤵
                                                                              PID:768
                                                                            • C:\Windows\system32\tskill.exe
                                                                              tskill /A padmincls
                                                                              4⤵
                                                                                PID:540
                                                                              • C:\Windows\system32\tskill.exe
                                                                                tskill /A sche*
                                                                                4⤵
                                                                                  PID:688
                                                                                • C:\Windows\system32\tskill.exe
                                                                                  tskill /A syman*
                                                                                  4⤵
                                                                                    PID:576
                                                                                  • C:\Windows\system32\tskill.exe
                                                                                    tskill /A virus*
                                                                                    4⤵
                                                                                      PID:588
                                                                                    • C:\Windows\system32\tskill.exe
                                                                                      tskill /A realm*cls
                                                                                      4⤵
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:568
                                                                                    • C:\Windows\system32\tskill.exe
                                                                                      tskill /A sweep*
                                                                                      4⤵
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:904
                                                                                    • C:\Windows\system32\tskill.exe
                                                                                      tskill /A safe*
                                                                                      4⤵
                                                                                        PID:1716
                                                                                      • C:\Windows\system32\tskill.exe
                                                                                        tskill /A avas*
                                                                                        4⤵
                                                                                          PID:1788
                                                                                        • C:\Windows\system32\tskill.exe
                                                                                          tskill /A norm*
                                                                                          4⤵
                                                                                            PID:1724
                                                                                          • C:\Windows\system32\tskill.exe
                                                                                            tskill /A offg*
                                                                                            4⤵
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:1792
                                                                                          • C:\Windows\system32\tskill.exe
                                                                                            tskill /A ad-*
                                                                                            4⤵
                                                                                              PID:1624
                                                                                            • C:\Windows\system32\tskill.exe
                                                                                              tskill /A scan*
                                                                                              4⤵
                                                                                                PID:1688
                                                                                              • C:\Windows\system32\tskill.exe
                                                                                                tskill /A pop*
                                                                                                4⤵
                                                                                                  PID:1460
                                                                                                • C:\Windows\system32\tskill.exe
                                                                                                  tskill /A cpd*
                                                                                                  4⤵
                                                                                                    PID:1696
                                                                                                  • C:\Windows\system32\tskill.exe
                                                                                                    tskill /A issvc
                                                                                                    4⤵
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    PID:1644
                                                                                                  • C:\Windows\system32\tskill.exe
                                                                                                    tskill /A nisum*
                                                                                                    4⤵
                                                                                                      PID:2024
                                                                                                • C:\Users\Admin\services32.exe
                                                                                                  "C:\Users\Admin\services32.exe"
                                                                                                  2⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:1648
                                                                                                  • C:\Windows\system32\WerFault.exe
                                                                                                    C:\Windows\system32\WerFault.exe -u -p 1648 -s 536
                                                                                                    3⤵
                                                                                                    • Program crash
                                                                                                    PID:1832
                                                                                                • C:\Users\Admin\svchost32.exe
                                                                                                  "C:\Users\Admin\svchost32.exe"
                                                                                                  2⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Adds Run key to start application
                                                                                                  • Suspicious behavior: AddClipboardFormatListener
                                                                                                  PID:840
                                                                                                • C:\Users\Admin\system32.exe
                                                                                                  "C:\Users\Admin\system32.exe"
                                                                                                  2⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Loads dropped DLL
                                                                                                  PID:632
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe"
                                                                                                    3⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:1824
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\4186feeda5\
                                                                                                      4⤵
                                                                                                        PID:2004
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\4186feeda5\
                                                                                                          5⤵
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          PID:960
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ftewk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe" /F
                                                                                                        4⤵
                                                                                                        • Creates scheduled task(s)
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        PID:1088
                                                                                                  • C:\Users\Admin\windows_7_extreme.exe
                                                                                                    "C:\Users\Admin\windows_7_extreme.exe"
                                                                                                    2⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Checks computer location settings
                                                                                                    • Enumerates connected drives
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:1244
                                                                                                • C:\Windows\system32\conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe "2523005311191347511-1866935443-203056995-611547848-7801642306340344571968975471"
                                                                                                  1⤵
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:1892
                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                  1⤵
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:1456
                                                                                                • C:\Windows\System32\slui.exe
                                                                                                  C:\Windows\System32\slui.exe -Embedding
                                                                                                  1⤵
                                                                                                    PID:588
                                                                                                  • C:\Windows\system32\taskeng.exe
                                                                                                    taskeng.exe {9ED2C078-1BF3-4E24-9BEE-424285FC99C4} S-1-5-21-1083475884-596052423-1669053738-1000:WYZSGDWS\Admin:Interactive:[1]
                                                                                                    1⤵
                                                                                                      PID:1572
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe
                                                                                                        2⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:1264
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe
                                                                                                        2⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:1884

                                                                                                    Network

                                                                                                    MITRE ATT&CK Matrix ATT&CK v6

                                                                                                    Execution

                                                                                                    Scheduled Task

                                                                                                    1
                                                                                                    T1053

                                                                                                    Persistence

                                                                                                    Modify Existing Service

                                                                                                    1
                                                                                                    T1031

                                                                                                    Registry Run Keys / Startup Folder

                                                                                                    1
                                                                                                    T1060

                                                                                                    Scheduled Task

                                                                                                    1
                                                                                                    T1053

                                                                                                    Privilege Escalation

                                                                                                    Scheduled Task

                                                                                                    1
                                                                                                    T1053

                                                                                                    Defense Evasion

                                                                                                    Modify Registry

                                                                                                    1
                                                                                                    T1112

                                                                                                    Discovery

                                                                                                    Query Registry

                                                                                                    2
                                                                                                    T1012

                                                                                                    System Information Discovery

                                                                                                    3
                                                                                                    T1082

                                                                                                    Peripheral Device Discovery

                                                                                                    1
                                                                                                    T1120

                                                                                                    Replay Monitor

                                                                                                    Loading Replay Monitor...

                                                                                                    Downloads

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe
                                                                                                      Filesize

                                                                                                      326KB

                                                                                                      MD5

                                                                                                      38affbc2e16fc5da92cca17ddc669372

                                                                                                      SHA1

                                                                                                      24d9518d25853552b496ce5626913eaf44f1ae9a

                                                                                                      SHA256

                                                                                                      4a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f

                                                                                                      SHA512

                                                                                                      fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe
                                                                                                      Filesize

                                                                                                      326KB

                                                                                                      MD5

                                                                                                      38affbc2e16fc5da92cca17ddc669372

                                                                                                      SHA1

                                                                                                      24d9518d25853552b496ce5626913eaf44f1ae9a

                                                                                                      SHA256

                                                                                                      4a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f

                                                                                                      SHA512

                                                                                                      fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe
                                                                                                      Filesize

                                                                                                      326KB

                                                                                                      MD5

                                                                                                      38affbc2e16fc5da92cca17ddc669372

                                                                                                      SHA1

                                                                                                      24d9518d25853552b496ce5626913eaf44f1ae9a

                                                                                                      SHA256

                                                                                                      4a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f

                                                                                                      SHA512

                                                                                                      fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe
                                                                                                      Filesize

                                                                                                      326KB

                                                                                                      MD5

                                                                                                      38affbc2e16fc5da92cca17ddc669372

                                                                                                      SHA1

                                                                                                      24d9518d25853552b496ce5626913eaf44f1ae9a

                                                                                                      SHA256

                                                                                                      4a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f

                                                                                                      SHA512

                                                                                                      fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\9F3D.tmp\9F3E.tmp\9F3F.bat
                                                                                                      Filesize

                                                                                                      2KB

                                                                                                      MD5

                                                                                                      7705e93746d9943208b5b2eec0ab7894

                                                                                                      SHA1

                                                                                                      91784e04b65c3ff0c8ffd940ea5928cb7153119d

                                                                                                      SHA256

                                                                                                      c761e7ee00239460bba3b0ba8b1cde6d32adba765465aff2fd97a3aac7be6789

                                                                                                      SHA512

                                                                                                      4255d61bf217b7217badb317fbf14a3e0a835d5f54f44a34b7256953c464bc68858b0dd6df7406430e71b4b9065580c134537c60515871991ab65b08106e622d

                                                                                                    • C:\Users\Admin\service32.exe
                                                                                                      Filesize

                                                                                                      99KB

                                                                                                      MD5

                                                                                                      adfe04204c8ffee48851fb7b1770a407

                                                                                                      SHA1

                                                                                                      b0db70c025b899fee56a1544111f2660100aa449

                                                                                                      SHA256

                                                                                                      7d7fb8d26e3a8cf4d2bf48f1ec3ca95443cb34c48167057395ec0fddf1ecc4ba

                                                                                                      SHA512

                                                                                                      a1a8a8d859d9d85fbb8bfc4cd249a71608e90e35bf692fb88746e5084ccc2f10ffc50eceb67aff4c8f7853aa96010d91fc72d7d0f6c26ba2f6e74ec5eb2ec9ab

                                                                                                    • C:\Users\Admin\services32.exe
                                                                                                      Filesize

                                                                                                      40KB

                                                                                                      MD5

                                                                                                      9fec413d7e5cb7dd9ddac94988a1b222

                                                                                                      SHA1

                                                                                                      416e0310942f5f0c9d87e8ba50ea916cd8364c0f

                                                                                                      SHA256

                                                                                                      6cf4fd07962aa1ca5df3f2b05462eb561a09f4419fbcdaaafbd9ff7e965e1ce4

                                                                                                      SHA512

                                                                                                      51d42b8cadac3c863d6403b3360e8f7942e77cb8817767dcbe2096475d114568272bd4f22110aa5fd4cf3330fc69fcc5f71094624554da956698d7662a746f66

                                                                                                    • C:\Users\Admin\services32.exe
                                                                                                      Filesize

                                                                                                      40KB

                                                                                                      MD5

                                                                                                      9fec413d7e5cb7dd9ddac94988a1b222

                                                                                                      SHA1

                                                                                                      416e0310942f5f0c9d87e8ba50ea916cd8364c0f

                                                                                                      SHA256

                                                                                                      6cf4fd07962aa1ca5df3f2b05462eb561a09f4419fbcdaaafbd9ff7e965e1ce4

                                                                                                      SHA512

                                                                                                      51d42b8cadac3c863d6403b3360e8f7942e77cb8817767dcbe2096475d114568272bd4f22110aa5fd4cf3330fc69fcc5f71094624554da956698d7662a746f66

                                                                                                    • C:\Users\Admin\svchost32.exe
                                                                                                      Filesize

                                                                                                      548KB

                                                                                                      MD5

                                                                                                      00f0626488ae3052737b0620ec73f62c

                                                                                                      SHA1

                                                                                                      3315c50c894cec9298b1021015df22b99fb2678b

                                                                                                      SHA256

                                                                                                      7b8bbaab3614d71120895c684feebb5e0ecda47367fa967e7133966744ba575b

                                                                                                      SHA512

                                                                                                      a1d5ba849c866426e3760725d113e0c31fdff30c9b2c6a0391320c49df0d060f851d88fb9be1220b8c99a6ca88442b520159709ea49acd3175bc4ff9f327b3bb

                                                                                                    • C:\Users\Admin\system32.exe
                                                                                                      Filesize

                                                                                                      326KB

                                                                                                      MD5

                                                                                                      38affbc2e16fc5da92cca17ddc669372

                                                                                                      SHA1

                                                                                                      24d9518d25853552b496ce5626913eaf44f1ae9a

                                                                                                      SHA256

                                                                                                      4a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f

                                                                                                      SHA512

                                                                                                      fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51

                                                                                                    • C:\Users\Admin\system32.exe
                                                                                                      Filesize

                                                                                                      326KB

                                                                                                      MD5

                                                                                                      38affbc2e16fc5da92cca17ddc669372

                                                                                                      SHA1

                                                                                                      24d9518d25853552b496ce5626913eaf44f1ae9a

                                                                                                      SHA256

                                                                                                      4a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f

                                                                                                      SHA512

                                                                                                      fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51

                                                                                                    • C:\Users\Admin\windows_7_extreme.exe
                                                                                                      Filesize

                                                                                                      26.8MB

                                                                                                      MD5

                                                                                                      8f9ccbdb647d6a7ff0c693a2700727aa

                                                                                                      SHA1

                                                                                                      5a703b7fd91ade87e63ecfe890e49761d596b1eb

                                                                                                      SHA256

                                                                                                      9df418c9b62ae059279babe614a6649d7a714ef12c06f11f104f33155d7a2b7d

                                                                                                      SHA512

                                                                                                      1a2311734d5bfffd951fc89a0970c05b46b8fce46e1de86e1d47fcd83e443740dd64a0d08acbc70969deb8ae5dd993c4d358c47ad0b90e3e60d32b5e23bfb10c

                                                                                                    • \Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe
                                                                                                      Filesize

                                                                                                      326KB

                                                                                                      MD5

                                                                                                      38affbc2e16fc5da92cca17ddc669372

                                                                                                      SHA1

                                                                                                      24d9518d25853552b496ce5626913eaf44f1ae9a

                                                                                                      SHA256

                                                                                                      4a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f

                                                                                                      SHA512

                                                                                                      fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51

                                                                                                    • \Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe
                                                                                                      Filesize

                                                                                                      326KB

                                                                                                      MD5

                                                                                                      38affbc2e16fc5da92cca17ddc669372

                                                                                                      SHA1

                                                                                                      24d9518d25853552b496ce5626913eaf44f1ae9a

                                                                                                      SHA256

                                                                                                      4a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f

                                                                                                      SHA512

                                                                                                      fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51

                                                                                                    • \Users\Admin\service32.exe
                                                                                                      Filesize

                                                                                                      99KB

                                                                                                      MD5

                                                                                                      adfe04204c8ffee48851fb7b1770a407

                                                                                                      SHA1

                                                                                                      b0db70c025b899fee56a1544111f2660100aa449

                                                                                                      SHA256

                                                                                                      7d7fb8d26e3a8cf4d2bf48f1ec3ca95443cb34c48167057395ec0fddf1ecc4ba

                                                                                                      SHA512

                                                                                                      a1a8a8d859d9d85fbb8bfc4cd249a71608e90e35bf692fb88746e5084ccc2f10ffc50eceb67aff4c8f7853aa96010d91fc72d7d0f6c26ba2f6e74ec5eb2ec9ab

                                                                                                    • \Users\Admin\service32.exe
                                                                                                      Filesize

                                                                                                      99KB

                                                                                                      MD5

                                                                                                      adfe04204c8ffee48851fb7b1770a407

                                                                                                      SHA1

                                                                                                      b0db70c025b899fee56a1544111f2660100aa449

                                                                                                      SHA256

                                                                                                      7d7fb8d26e3a8cf4d2bf48f1ec3ca95443cb34c48167057395ec0fddf1ecc4ba

                                                                                                      SHA512

                                                                                                      a1a8a8d859d9d85fbb8bfc4cd249a71608e90e35bf692fb88746e5084ccc2f10ffc50eceb67aff4c8f7853aa96010d91fc72d7d0f6c26ba2f6e74ec5eb2ec9ab

                                                                                                    • \Users\Admin\service32.exe
                                                                                                      Filesize

                                                                                                      99KB

                                                                                                      MD5

                                                                                                      adfe04204c8ffee48851fb7b1770a407

                                                                                                      SHA1

                                                                                                      b0db70c025b899fee56a1544111f2660100aa449

                                                                                                      SHA256

                                                                                                      7d7fb8d26e3a8cf4d2bf48f1ec3ca95443cb34c48167057395ec0fddf1ecc4ba

                                                                                                      SHA512

                                                                                                      a1a8a8d859d9d85fbb8bfc4cd249a71608e90e35bf692fb88746e5084ccc2f10ffc50eceb67aff4c8f7853aa96010d91fc72d7d0f6c26ba2f6e74ec5eb2ec9ab

                                                                                                    • \Users\Admin\service32.exe
                                                                                                      Filesize

                                                                                                      99KB

                                                                                                      MD5

                                                                                                      adfe04204c8ffee48851fb7b1770a407

                                                                                                      SHA1

                                                                                                      b0db70c025b899fee56a1544111f2660100aa449

                                                                                                      SHA256

                                                                                                      7d7fb8d26e3a8cf4d2bf48f1ec3ca95443cb34c48167057395ec0fddf1ecc4ba

                                                                                                      SHA512

                                                                                                      a1a8a8d859d9d85fbb8bfc4cd249a71608e90e35bf692fb88746e5084ccc2f10ffc50eceb67aff4c8f7853aa96010d91fc72d7d0f6c26ba2f6e74ec5eb2ec9ab

                                                                                                    • \Users\Admin\services32.exe
                                                                                                      Filesize

                                                                                                      40KB

                                                                                                      MD5

                                                                                                      9fec413d7e5cb7dd9ddac94988a1b222

                                                                                                      SHA1

                                                                                                      416e0310942f5f0c9d87e8ba50ea916cd8364c0f

                                                                                                      SHA256

                                                                                                      6cf4fd07962aa1ca5df3f2b05462eb561a09f4419fbcdaaafbd9ff7e965e1ce4

                                                                                                      SHA512

                                                                                                      51d42b8cadac3c863d6403b3360e8f7942e77cb8817767dcbe2096475d114568272bd4f22110aa5fd4cf3330fc69fcc5f71094624554da956698d7662a746f66

                                                                                                    • \Users\Admin\services32.exe
                                                                                                      Filesize

                                                                                                      40KB

                                                                                                      MD5

                                                                                                      9fec413d7e5cb7dd9ddac94988a1b222

                                                                                                      SHA1

                                                                                                      416e0310942f5f0c9d87e8ba50ea916cd8364c0f

                                                                                                      SHA256

                                                                                                      6cf4fd07962aa1ca5df3f2b05462eb561a09f4419fbcdaaafbd9ff7e965e1ce4

                                                                                                      SHA512

                                                                                                      51d42b8cadac3c863d6403b3360e8f7942e77cb8817767dcbe2096475d114568272bd4f22110aa5fd4cf3330fc69fcc5f71094624554da956698d7662a746f66

                                                                                                    • \Users\Admin\services32.exe
                                                                                                      Filesize

                                                                                                      40KB

                                                                                                      MD5

                                                                                                      9fec413d7e5cb7dd9ddac94988a1b222

                                                                                                      SHA1

                                                                                                      416e0310942f5f0c9d87e8ba50ea916cd8364c0f

                                                                                                      SHA256

                                                                                                      6cf4fd07962aa1ca5df3f2b05462eb561a09f4419fbcdaaafbd9ff7e965e1ce4

                                                                                                      SHA512

                                                                                                      51d42b8cadac3c863d6403b3360e8f7942e77cb8817767dcbe2096475d114568272bd4f22110aa5fd4cf3330fc69fcc5f71094624554da956698d7662a746f66

                                                                                                    • \Users\Admin\services32.exe
                                                                                                      Filesize

                                                                                                      40KB

                                                                                                      MD5

                                                                                                      9fec413d7e5cb7dd9ddac94988a1b222

                                                                                                      SHA1

                                                                                                      416e0310942f5f0c9d87e8ba50ea916cd8364c0f

                                                                                                      SHA256

                                                                                                      6cf4fd07962aa1ca5df3f2b05462eb561a09f4419fbcdaaafbd9ff7e965e1ce4

                                                                                                      SHA512

                                                                                                      51d42b8cadac3c863d6403b3360e8f7942e77cb8817767dcbe2096475d114568272bd4f22110aa5fd4cf3330fc69fcc5f71094624554da956698d7662a746f66

                                                                                                    • \Users\Admin\svchost32.exe
                                                                                                      Filesize

                                                                                                      548KB

                                                                                                      MD5

                                                                                                      00f0626488ae3052737b0620ec73f62c

                                                                                                      SHA1

                                                                                                      3315c50c894cec9298b1021015df22b99fb2678b

                                                                                                      SHA256

                                                                                                      7b8bbaab3614d71120895c684feebb5e0ecda47367fa967e7133966744ba575b

                                                                                                      SHA512

                                                                                                      a1d5ba849c866426e3760725d113e0c31fdff30c9b2c6a0391320c49df0d060f851d88fb9be1220b8c99a6ca88442b520159709ea49acd3175bc4ff9f327b3bb

                                                                                                    • \Users\Admin\svchost32.exe
                                                                                                      Filesize

                                                                                                      548KB

                                                                                                      MD5

                                                                                                      00f0626488ae3052737b0620ec73f62c

                                                                                                      SHA1

                                                                                                      3315c50c894cec9298b1021015df22b99fb2678b

                                                                                                      SHA256

                                                                                                      7b8bbaab3614d71120895c684feebb5e0ecda47367fa967e7133966744ba575b

                                                                                                      SHA512

                                                                                                      a1d5ba849c866426e3760725d113e0c31fdff30c9b2c6a0391320c49df0d060f851d88fb9be1220b8c99a6ca88442b520159709ea49acd3175bc4ff9f327b3bb

                                                                                                    • \Users\Admin\svchost32.exe
                                                                                                      Filesize

                                                                                                      548KB

                                                                                                      MD5

                                                                                                      00f0626488ae3052737b0620ec73f62c

                                                                                                      SHA1

                                                                                                      3315c50c894cec9298b1021015df22b99fb2678b

                                                                                                      SHA256

                                                                                                      7b8bbaab3614d71120895c684feebb5e0ecda47367fa967e7133966744ba575b

                                                                                                      SHA512

                                                                                                      a1d5ba849c866426e3760725d113e0c31fdff30c9b2c6a0391320c49df0d060f851d88fb9be1220b8c99a6ca88442b520159709ea49acd3175bc4ff9f327b3bb

                                                                                                    • \Users\Admin\svchost32.exe
                                                                                                      Filesize

                                                                                                      548KB

                                                                                                      MD5

                                                                                                      00f0626488ae3052737b0620ec73f62c

                                                                                                      SHA1

                                                                                                      3315c50c894cec9298b1021015df22b99fb2678b

                                                                                                      SHA256

                                                                                                      7b8bbaab3614d71120895c684feebb5e0ecda47367fa967e7133966744ba575b

                                                                                                      SHA512

                                                                                                      a1d5ba849c866426e3760725d113e0c31fdff30c9b2c6a0391320c49df0d060f851d88fb9be1220b8c99a6ca88442b520159709ea49acd3175bc4ff9f327b3bb

                                                                                                    • \Users\Admin\svchost32.exe
                                                                                                      Filesize

                                                                                                      548KB

                                                                                                      MD5

                                                                                                      00f0626488ae3052737b0620ec73f62c

                                                                                                      SHA1

                                                                                                      3315c50c894cec9298b1021015df22b99fb2678b

                                                                                                      SHA256

                                                                                                      7b8bbaab3614d71120895c684feebb5e0ecda47367fa967e7133966744ba575b

                                                                                                      SHA512

                                                                                                      a1d5ba849c866426e3760725d113e0c31fdff30c9b2c6a0391320c49df0d060f851d88fb9be1220b8c99a6ca88442b520159709ea49acd3175bc4ff9f327b3bb

                                                                                                    • \Users\Admin\system32.exe
                                                                                                      Filesize

                                                                                                      326KB

                                                                                                      MD5

                                                                                                      38affbc2e16fc5da92cca17ddc669372

                                                                                                      SHA1

                                                                                                      24d9518d25853552b496ce5626913eaf44f1ae9a

                                                                                                      SHA256

                                                                                                      4a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f

                                                                                                      SHA512

                                                                                                      fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51

                                                                                                    • \Users\Admin\system32.exe
                                                                                                      Filesize

                                                                                                      326KB

                                                                                                      MD5

                                                                                                      38affbc2e16fc5da92cca17ddc669372

                                                                                                      SHA1

                                                                                                      24d9518d25853552b496ce5626913eaf44f1ae9a

                                                                                                      SHA256

                                                                                                      4a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f

                                                                                                      SHA512

                                                                                                      fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51

                                                                                                    • \Users\Admin\system32.exe
                                                                                                      Filesize

                                                                                                      326KB

                                                                                                      MD5

                                                                                                      38affbc2e16fc5da92cca17ddc669372

                                                                                                      SHA1

                                                                                                      24d9518d25853552b496ce5626913eaf44f1ae9a

                                                                                                      SHA256

                                                                                                      4a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f

                                                                                                      SHA512

                                                                                                      fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51

                                                                                                    • \Users\Admin\system32.exe
                                                                                                      Filesize

                                                                                                      326KB

                                                                                                      MD5

                                                                                                      38affbc2e16fc5da92cca17ddc669372

                                                                                                      SHA1

                                                                                                      24d9518d25853552b496ce5626913eaf44f1ae9a

                                                                                                      SHA256

                                                                                                      4a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f

                                                                                                      SHA512

                                                                                                      fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51

                                                                                                    • \Users\Admin\system32.exe
                                                                                                      Filesize

                                                                                                      326KB

                                                                                                      MD5

                                                                                                      38affbc2e16fc5da92cca17ddc669372

                                                                                                      SHA1

                                                                                                      24d9518d25853552b496ce5626913eaf44f1ae9a

                                                                                                      SHA256

                                                                                                      4a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f

                                                                                                      SHA512

                                                                                                      fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51

                                                                                                    • \Users\Admin\windows_7_extreme.exe
                                                                                                      Filesize

                                                                                                      26.8MB

                                                                                                      MD5

                                                                                                      8f9ccbdb647d6a7ff0c693a2700727aa

                                                                                                      SHA1

                                                                                                      5a703b7fd91ade87e63ecfe890e49761d596b1eb

                                                                                                      SHA256

                                                                                                      9df418c9b62ae059279babe614a6649d7a714ef12c06f11f104f33155d7a2b7d

                                                                                                      SHA512

                                                                                                      1a2311734d5bfffd951fc89a0970c05b46b8fce46e1de86e1d47fcd83e443740dd64a0d08acbc70969deb8ae5dd993c4d358c47ad0b90e3e60d32b5e23bfb10c

                                                                                                    • \Users\Admin\windows_7_extreme.exe
                                                                                                      Filesize

                                                                                                      26.8MB

                                                                                                      MD5

                                                                                                      8f9ccbdb647d6a7ff0c693a2700727aa

                                                                                                      SHA1

                                                                                                      5a703b7fd91ade87e63ecfe890e49761d596b1eb

                                                                                                      SHA256

                                                                                                      9df418c9b62ae059279babe614a6649d7a714ef12c06f11f104f33155d7a2b7d

                                                                                                      SHA512

                                                                                                      1a2311734d5bfffd951fc89a0970c05b46b8fce46e1de86e1d47fcd83e443740dd64a0d08acbc70969deb8ae5dd993c4d358c47ad0b90e3e60d32b5e23bfb10c

                                                                                                    • \Users\Admin\windows_7_extreme.exe
                                                                                                      Filesize

                                                                                                      26.8MB

                                                                                                      MD5

                                                                                                      8f9ccbdb647d6a7ff0c693a2700727aa

                                                                                                      SHA1

                                                                                                      5a703b7fd91ade87e63ecfe890e49761d596b1eb

                                                                                                      SHA256

                                                                                                      9df418c9b62ae059279babe614a6649d7a714ef12c06f11f104f33155d7a2b7d

                                                                                                      SHA512

                                                                                                      1a2311734d5bfffd951fc89a0970c05b46b8fce46e1de86e1d47fcd83e443740dd64a0d08acbc70969deb8ae5dd993c4d358c47ad0b90e3e60d32b5e23bfb10c

                                                                                                    • \Users\Admin\windows_7_extreme.exe
                                                                                                      Filesize

                                                                                                      26.8MB

                                                                                                      MD5

                                                                                                      8f9ccbdb647d6a7ff0c693a2700727aa

                                                                                                      SHA1

                                                                                                      5a703b7fd91ade87e63ecfe890e49761d596b1eb

                                                                                                      SHA256

                                                                                                      9df418c9b62ae059279babe614a6649d7a714ef12c06f11f104f33155d7a2b7d

                                                                                                      SHA512

                                                                                                      1a2311734d5bfffd951fc89a0970c05b46b8fce46e1de86e1d47fcd83e443740dd64a0d08acbc70969deb8ae5dd993c4d358c47ad0b90e3e60d32b5e23bfb10c

                                                                                                    • memory/288-134-0x0000000000000000-mapping.dmp
                                                                                                    • memory/316-94-0x0000000000000000-mapping.dmp
                                                                                                    • memory/568-126-0x0000000000000000-mapping.dmp
                                                                                                    • memory/580-121-0x0000000000000000-mapping.dmp
                                                                                                    • memory/584-159-0x0000000000000000-mapping.dmp
                                                                                                    • memory/604-151-0x0000000000000000-mapping.dmp
                                                                                                    • memory/632-84-0x0000000000000000-mapping.dmp
                                                                                                    • memory/632-145-0x000000000030E000-0x000000000032B000-memory.dmp
                                                                                                      Filesize

                                                                                                      116KB

                                                                                                    • memory/632-148-0x0000000000400000-0x0000000000480000-memory.dmp
                                                                                                      Filesize

                                                                                                      512KB

                                                                                                    • memory/632-146-0x00000000001B0000-0x00000000001E8000-memory.dmp
                                                                                                      Filesize

                                                                                                      224KB

                                                                                                    • memory/660-95-0x0000000000000000-mapping.dmp
                                                                                                    • memory/700-123-0x0000000000000000-mapping.dmp
                                                                                                    • memory/764-135-0x0000000000000000-mapping.dmp
                                                                                                    • memory/764-88-0x000007FEFBCB1000-0x000007FEFBCB3000-memory.dmp
                                                                                                      Filesize

                                                                                                      8KB

                                                                                                    • memory/764-87-0x0000000000000000-mapping.dmp
                                                                                                    • memory/840-122-0x000000000061C000-0x000000000065B000-memory.dmp
                                                                                                      Filesize

                                                                                                      252KB

                                                                                                    • memory/840-124-0x0000000000220000-0x0000000000267000-memory.dmp
                                                                                                      Filesize

                                                                                                      284KB

                                                                                                    • memory/840-125-0x0000000000400000-0x000000000050C000-memory.dmp
                                                                                                      Filesize

                                                                                                      1.0MB

                                                                                                    • memory/840-76-0x0000000000000000-mapping.dmp
                                                                                                    • memory/904-127-0x0000000000000000-mapping.dmp
                                                                                                    • memory/908-59-0x0000000000000000-mapping.dmp
                                                                                                    • memory/960-111-0x0000000000000000-mapping.dmp
                                                                                                    • memory/976-156-0x0000000000000000-mapping.dmp
                                                                                                    • memory/980-113-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1004-117-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1032-130-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1072-92-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1088-106-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1120-147-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1192-86-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1200-131-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1216-90-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1244-129-0x0000000074780000-0x00000000748B0000-memory.dmp
                                                                                                      Filesize

                                                                                                      1.2MB

                                                                                                    • memory/1244-102-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1264-171-0x0000000000400000-0x0000000000480000-memory.dmp
                                                                                                      Filesize

                                                                                                      512KB

                                                                                                    • memory/1264-170-0x000000000066E000-0x000000000068C000-memory.dmp
                                                                                                      Filesize

                                                                                                      120KB

                                                                                                    • memory/1264-158-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1292-116-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1292-163-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1456-115-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1476-54-0x00000000755C1000-0x00000000755C3000-memory.dmp
                                                                                                      Filesize

                                                                                                      8KB

                                                                                                    • memory/1492-120-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1500-150-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1536-119-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1540-112-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1544-118-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1572-63-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1600-162-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1628-128-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1644-161-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1644-114-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1648-91-0x0000000000EB0000-0x0000000000EBE000-memory.dmp
                                                                                                      Filesize

                                                                                                      56KB

                                                                                                    • memory/1648-67-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1664-152-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1664-105-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1676-138-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1740-101-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1772-144-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1776-110-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1776-157-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1780-108-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1780-155-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1792-132-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1820-100-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1824-166-0x0000000000400000-0x0000000000480000-memory.dmp
                                                                                                      Filesize

                                                                                                      512KB

                                                                                                    • memory/1824-165-0x000000000055E000-0x000000000057C000-memory.dmp
                                                                                                      Filesize

                                                                                                      120KB

                                                                                                    • memory/1824-142-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1832-133-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1884-175-0x0000000000400000-0x0000000000480000-memory.dmp
                                                                                                      Filesize

                                                                                                      512KB

                                                                                                    • memory/1884-174-0x000000000066E000-0x000000000068C000-memory.dmp
                                                                                                      Filesize

                                                                                                      120KB

                                                                                                    • memory/1892-109-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1940-78-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1972-93-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1972-139-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1976-89-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1980-153-0x0000000000000000-mapping.dmp
                                                                                                    • memory/1992-149-0x0000000000000000-mapping.dmp
                                                                                                    • memory/2024-160-0x0000000000000000-mapping.dmp
                                                                                                    • memory/2032-107-0x0000000000000000-mapping.dmp
                                                                                                    • memory/2032-154-0x0000000000000000-mapping.dmp