Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 12:52

General

  • Target

    5b3bf042e0715803aac90a52aaa425b826a48ea2478138c57512fd87e323d316.exe

  • Size

    147KB

  • MD5

    fc97fcaa8fc062962d1d8e1c124ce2fd

  • SHA1

    8a2056907c85bd24560c2709e163085643e74c2e

  • SHA256

    5b3bf042e0715803aac90a52aaa425b826a48ea2478138c57512fd87e323d316

  • SHA512

    0799108b8713a3d405192fa5f542bb29b8a6f776486300a266090b12a23775793b5a774db7acde0e7739e21d99fd49b2cbb49dda7d55b99af268fb8913503f3c

  • SSDEEP

    3072:H0MAu+SI6av5Oi11lX95MjZZ+TxTxiydHLVWFnE37:/N+H6jiJt2r+dTxi2LVcS

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.194/h49vlBP/index.php

Extracted

Family

djvu

C2

http://fresherlights.com/lancer/get.php

Attributes
  • extension

    .kcbu

  • offline_id

    hlqzhQ6w5SquNDF4Ul2XBDJQkSIKbAT6rmRBTit1

  • payload_url

    http://uaery.top/dl/build2.exe

    http://fresherlights.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-lj5qINGbTc Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0608Jhyjd

rsa_pubkey.plain

Extracted

Family

laplas

C2

clipper.guru

Attributes
  • api_key

    ace492e9661223449782fcc8096dc6ef6289032d08d03a7b0a92179622c35bdb

Extracted

Family

vidar

Version

55.9

Botnet

517

C2

https://t.me/headshotsonly

https://steamcommunity.com/profiles/76561199436777531

Attributes
  • profile_id

    517

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 2 IoCs
  • Detected Djvu ransomware 10 IoCs
  • Detects Smokeloader packer 2 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Laplas Clipper

    Laplas is a crypto wallet stealer with two variants written in Golang and C#.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 17 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b3bf042e0715803aac90a52aaa425b826a48ea2478138c57512fd87e323d316.exe
    "C:\Users\Admin\AppData\Local\Temp\5b3bf042e0715803aac90a52aaa425b826a48ea2478138c57512fd87e323d316.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3836
  • C:\Users\Admin\AppData\Local\Temp\474.exe
    C:\Users\Admin\AppData\Local\Temp\474.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3748
    • C:\Users\Admin\AppData\Local\Temp\474.exe
      C:\Users\Admin\AppData\Local\Temp\474.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3116
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\c645368a-aa63-4482-bdbf-efce497a5777" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:748
      • C:\Users\Admin\AppData\Local\Temp\474.exe
        "C:\Users\Admin\AppData\Local\Temp\474.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1524
        • C:\Users\Admin\AppData\Local\Temp\474.exe
          "C:\Users\Admin\AppData\Local\Temp\474.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          PID:1020
          • C:\Users\Admin\AppData\Local\7a7bd71b-b7ec-42d6-82ee-0153bfbb2858\build2.exe
            "C:\Users\Admin\AppData\Local\7a7bd71b-b7ec-42d6-82ee-0153bfbb2858\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:4364
            • C:\Users\Admin\AppData\Local\7a7bd71b-b7ec-42d6-82ee-0153bfbb2858\build2.exe
              "C:\Users\Admin\AppData\Local\7a7bd71b-b7ec-42d6-82ee-0153bfbb2858\build2.exe"
              6⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Loads dropped DLL
              • Checks processor information in registry
              PID:1664
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\7a7bd71b-b7ec-42d6-82ee-0153bfbb2858\build2.exe" & exit
                7⤵
                  PID:4780
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 6
                    8⤵
                    • Delays execution with timeout.exe
                    PID:2040
            • C:\Users\Admin\AppData\Local\7a7bd71b-b7ec-42d6-82ee-0153bfbb2858\build3.exe
              "C:\Users\Admin\AppData\Local\7a7bd71b-b7ec-42d6-82ee-0153bfbb2858\build3.exe"
              5⤵
              • Executes dropped EXE
              PID:4900
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                6⤵
                • Creates scheduled task(s)
                PID:3856
    • C:\Windows\system32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\64A.dll
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3992
      • C:\Windows\SysWOW64\regsvr32.exe
        /s C:\Users\Admin\AppData\Local\Temp\64A.dll
        2⤵
        • Loads dropped DLL
        PID:3764
    • C:\Users\Admin\AppData\Local\Temp\810.exe
      C:\Users\Admin\AppData\Local\Temp\810.exe
      1⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3080
      • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
        "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5092
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F
          3⤵
          • Creates scheduled task(s)
          PID:4552
        • C:\Users\Admin\AppData\Local\Temp\1000146001\anon.exe
          "C:\Users\Admin\AppData\Local\Temp\1000146001\anon.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4448
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 1240
            4⤵
            • Program crash
            PID:3904
        • C:\Users\Admin\AppData\Local\Temp\1000147001\gala.exe
          "C:\Users\Admin\AppData\Local\Temp\1000147001\gala.exe"
          3⤵
          • Executes dropped EXE
          PID:400
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /C schtasks /create /tn KaAOqfgxzZ /tr C:\Users\Admin\AppData\Roaming\KaAOqfgxzZ\JnEdxrtoRb.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f
            4⤵
              PID:4776
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn KaAOqfgxzZ /tr C:\Users\Admin\AppData\Roaming\KaAOqfgxzZ\JnEdxrtoRb.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f
                5⤵
                • Creates scheduled task(s)
                PID:5104
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Accesses Microsoft Outlook profiles
            • outlook_win_path
            PID:2200
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 884
          2⤵
          • Program crash
          PID:5028
      • C:\Users\Admin\AppData\Local\Temp\8EC.exe
        C:\Users\Admin\AppData\Local\Temp\8EC.exe
        1⤵
        • Executes dropped EXE
        PID:4208
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 444
          2⤵
          • Program crash
          PID:2396
      • C:\Users\Admin\AppData\Local\Temp\B5E.exe
        C:\Users\Admin\AppData\Local\Temp\B5E.exe
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:3032
      • C:\Users\Admin\AppData\Local\Temp\C3A.exe
        C:\Users\Admin\AppData\Local\Temp\C3A.exe
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:4708
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
        • Accesses Microsoft Outlook profiles
        • outlook_office_path
        PID:4408
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        1⤵
          PID:3376
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3080 -ip 3080
          1⤵
            PID:1840
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4208 -ip 4208
            1⤵
              PID:2896
            • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
              C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
              1⤵
              • Executes dropped EXE
              PID:4276
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                2⤵
                • Creates scheduled task(s)
                PID:4424
            • C:\Users\Admin\AppData\Roaming\KaAOqfgxzZ\JnEdxrtoRb.exe
              C:\Users\Admin\AppData\Roaming\KaAOqfgxzZ\JnEdxrtoRb.exe
              1⤵
              • Executes dropped EXE
              PID:3016
            • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
              C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
              1⤵
              • Executes dropped EXE
              PID:2756
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4448 -ip 4448
              1⤵
                PID:5096

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              File Permissions Modification

              1
              T1222

              Modify Registry

              1
              T1112

              Credential Access

              Credentials in Files

              4
              T1081

              Discovery

              Query Registry

              4
              T1012

              System Information Discovery

              4
              T1082

              Peripheral Device Discovery

              1
              T1120

              Collection

              Data from Local System

              4
              T1005

              Email Collection

              1
              T1114

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\mozglue.dll
                Filesize

                593KB

                MD5

                c8fd9be83bc728cc04beffafc2907fe9

                SHA1

                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                SHA256

                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                SHA512

                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

              • C:\ProgramData\nss3.dll
                Filesize

                2.0MB

                MD5

                1cc453cdf74f31e4d913ff9c10acdde2

                SHA1

                6e85eae544d6e965f15fa5c39700fa7202f3aafe

                SHA256

                ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                SHA512

                dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
                Filesize

                2KB

                MD5

                8cd381eca2d5342e36b1e65a9b7f82d5

                SHA1

                d9b529576e1ea26e8daf88fcda26b7a0069da217

                SHA256

                17ff373fb2deb3ef3931ae098202097211226848ea6c581ceb9514e7a6e49369

                SHA512

                c888bcac5413df3eac3b068d37c866362d37915f1a25508743d818f79ce5b0518fe7ec7a4ff29be51d2404eb5f999b5d2238e60a8670375b82a8a96566101154

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                Filesize

                1KB

                MD5

                8641ac0a62e1e72023be75ceed4638a9

                SHA1

                a347dbd79e99d81cdd6ec77783008fec9f7e7d42

                SHA256

                d291f90a287f0bf8702208bab880ef95c5b2bd22a2c21762e828a707a004da2c

                SHA512

                9a12e4baf2ca8bc5c4ca5a8606a9200241da8fb413e50ef6c0b6b4597c25a2636915bd9dfd7e9a97e0f58a15859629bad9222188dccdaf4efdbb8e14884d0ffe

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
                Filesize

                488B

                MD5

                b5a1790b81a9bf4a52a9c50745d6b756

                SHA1

                a0db954bf141c80cbd19bb8716166ecf07618eb9

                SHA256

                bd5be17d2c9454152789ac1ce6c15ca8216311c8cb0ce8194be4eb729c04d1b9

                SHA512

                81a00a7b13b759f24aebc57a80ec501d5e9eceaf03dc761b83fb0267df29bfe45c98c4fe9cde7f5169ca58ecd650d6c49939af0e97c0eefbded47fdc7ac79610

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                Filesize

                482B

                MD5

                7fafeb0ed6ec7982f2020efb46fee053

                SHA1

                8d99cddb2ef89df2a87250e033a94f94aa9a6896

                SHA256

                844c0ad4fd0b62fa0f28490173f4ece7f15ea3c42a2290a8099210b984a98551

                SHA512

                857eebd02f3f4d44c04834d856e6845a940d28badbb3548271feca9cdbf5a36561a82871ee668f32a1013261edf73d5d2462f2effd337f10fe6106756fee9b81

              • C:\Users\Admin\AppData\Local\7a7bd71b-b7ec-42d6-82ee-0153bfbb2858\build2.exe
                Filesize

                299KB

                MD5

                03ddc9dc7312d33ad1c5f6ed2d167645

                SHA1

                e75de38aee3b0beb5cc91334ecbd8a876c8351a6

                SHA256

                60724da01de35adee6cb34317cd2947fbcb791a8381386d79072857a19a58708

                SHA512

                9a23eb681563719a6ad9202038a307e842b9a60c16aec2f01ce422feca11ac8d6e1d0e9a30e110e17bec4421121643ac87f075eae8bf127dca2213f7a2c6f1aa

              • C:\Users\Admin\AppData\Local\7a7bd71b-b7ec-42d6-82ee-0153bfbb2858\build2.exe
                Filesize

                299KB

                MD5

                03ddc9dc7312d33ad1c5f6ed2d167645

                SHA1

                e75de38aee3b0beb5cc91334ecbd8a876c8351a6

                SHA256

                60724da01de35adee6cb34317cd2947fbcb791a8381386d79072857a19a58708

                SHA512

                9a23eb681563719a6ad9202038a307e842b9a60c16aec2f01ce422feca11ac8d6e1d0e9a30e110e17bec4421121643ac87f075eae8bf127dca2213f7a2c6f1aa

              • C:\Users\Admin\AppData\Local\7a7bd71b-b7ec-42d6-82ee-0153bfbb2858\build2.exe
                Filesize

                299KB

                MD5

                03ddc9dc7312d33ad1c5f6ed2d167645

                SHA1

                e75de38aee3b0beb5cc91334ecbd8a876c8351a6

                SHA256

                60724da01de35adee6cb34317cd2947fbcb791a8381386d79072857a19a58708

                SHA512

                9a23eb681563719a6ad9202038a307e842b9a60c16aec2f01ce422feca11ac8d6e1d0e9a30e110e17bec4421121643ac87f075eae8bf127dca2213f7a2c6f1aa

              • C:\Users\Admin\AppData\Local\7a7bd71b-b7ec-42d6-82ee-0153bfbb2858\build3.exe
                Filesize

                9KB

                MD5

                9ead10c08e72ae41921191f8db39bc16

                SHA1

                abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                SHA256

                8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                SHA512

                aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

              • C:\Users\Admin\AppData\Local\7a7bd71b-b7ec-42d6-82ee-0153bfbb2858\build3.exe
                Filesize

                9KB

                MD5

                9ead10c08e72ae41921191f8db39bc16

                SHA1

                abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                SHA256

                8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                SHA512

                aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

              • C:\Users\Admin\AppData\Local\Temp\1000146001\anon.exe
                Filesize

                277KB

                MD5

                5704d240990a8dfbe08127c5ce988d35

                SHA1

                691bd570e2e6369ddbab75dc98383161b3d1f538

                SHA256

                1cba2f13cd958b884ca9e0f82c2781a93396b2f67362b35a77946e9770ea3a6a

                SHA512

                8a3ddf3ba5c88b34646485e28d51132a6b3d657fc499fae2d16256cfcd951286eab2b2e38907f02dec48b8b4dd3efca09c432d3ceb4abaabbf8ea3fb7dddce4a

              • C:\Users\Admin\AppData\Local\Temp\1000146001\anon.exe
                Filesize

                277KB

                MD5

                5704d240990a8dfbe08127c5ce988d35

                SHA1

                691bd570e2e6369ddbab75dc98383161b3d1f538

                SHA256

                1cba2f13cd958b884ca9e0f82c2781a93396b2f67362b35a77946e9770ea3a6a

                SHA512

                8a3ddf3ba5c88b34646485e28d51132a6b3d657fc499fae2d16256cfcd951286eab2b2e38907f02dec48b8b4dd3efca09c432d3ceb4abaabbf8ea3fb7dddce4a

              • C:\Users\Admin\AppData\Local\Temp\1000147001\gala.exe
                Filesize

                4.6MB

                MD5

                f6829a19455a7b24a79e0b984d2a42d9

                SHA1

                c71d657301d721b42c52c0252aa5fe0dbfb04f9f

                SHA256

                7dc8f90673b102c2945e36747763ccccd243519500eca01fd1cfdbbfcb61d61b

                SHA512

                e3d8db3d3938366e9fe8c1645647dbf29bfb5c9a6210f54bdfca05b9782f005b9b40df2a7980f160143c48139a638c5a4ff6b091d0d846a839d363eba94bce4c

              • C:\Users\Admin\AppData\Local\Temp\1000147001\gala.exe
                Filesize

                4.6MB

                MD5

                f6829a19455a7b24a79e0b984d2a42d9

                SHA1

                c71d657301d721b42c52c0252aa5fe0dbfb04f9f

                SHA256

                7dc8f90673b102c2945e36747763ccccd243519500eca01fd1cfdbbfcb61d61b

                SHA512

                e3d8db3d3938366e9fe8c1645647dbf29bfb5c9a6210f54bdfca05b9782f005b9b40df2a7980f160143c48139a638c5a4ff6b091d0d846a839d363eba94bce4c

              • C:\Users\Admin\AppData\Local\Temp\474.exe
                Filesize

                707KB

                MD5

                e247b89d3bc2876d10757ed38f77364a

                SHA1

                5549d29df0c494ea0b317684a4a89fffc9421752

                SHA256

                7e915057b8dee9e425ce461eca6c1accb8e30c0cbc9ffbb4799460c57733cf47

                SHA512

                22072d0b98a03e246c2639bb0cfeb16819e8a328e92e81ec6096b37966f3856ebcdcadb4ac5aa9bb7d127dd0c77ebb528bb2bc5559882d24d56e174feebfe281

              • C:\Users\Admin\AppData\Local\Temp\474.exe
                Filesize

                707KB

                MD5

                e247b89d3bc2876d10757ed38f77364a

                SHA1

                5549d29df0c494ea0b317684a4a89fffc9421752

                SHA256

                7e915057b8dee9e425ce461eca6c1accb8e30c0cbc9ffbb4799460c57733cf47

                SHA512

                22072d0b98a03e246c2639bb0cfeb16819e8a328e92e81ec6096b37966f3856ebcdcadb4ac5aa9bb7d127dd0c77ebb528bb2bc5559882d24d56e174feebfe281

              • C:\Users\Admin\AppData\Local\Temp\474.exe
                Filesize

                707KB

                MD5

                e247b89d3bc2876d10757ed38f77364a

                SHA1

                5549d29df0c494ea0b317684a4a89fffc9421752

                SHA256

                7e915057b8dee9e425ce461eca6c1accb8e30c0cbc9ffbb4799460c57733cf47

                SHA512

                22072d0b98a03e246c2639bb0cfeb16819e8a328e92e81ec6096b37966f3856ebcdcadb4ac5aa9bb7d127dd0c77ebb528bb2bc5559882d24d56e174feebfe281

              • C:\Users\Admin\AppData\Local\Temp\474.exe
                Filesize

                707KB

                MD5

                e247b89d3bc2876d10757ed38f77364a

                SHA1

                5549d29df0c494ea0b317684a4a89fffc9421752

                SHA256

                7e915057b8dee9e425ce461eca6c1accb8e30c0cbc9ffbb4799460c57733cf47

                SHA512

                22072d0b98a03e246c2639bb0cfeb16819e8a328e92e81ec6096b37966f3856ebcdcadb4ac5aa9bb7d127dd0c77ebb528bb2bc5559882d24d56e174feebfe281

              • C:\Users\Admin\AppData\Local\Temp\474.exe
                Filesize

                707KB

                MD5

                e247b89d3bc2876d10757ed38f77364a

                SHA1

                5549d29df0c494ea0b317684a4a89fffc9421752

                SHA256

                7e915057b8dee9e425ce461eca6c1accb8e30c0cbc9ffbb4799460c57733cf47

                SHA512

                22072d0b98a03e246c2639bb0cfeb16819e8a328e92e81ec6096b37966f3856ebcdcadb4ac5aa9bb7d127dd0c77ebb528bb2bc5559882d24d56e174feebfe281

              • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
                Filesize

                206KB

                MD5

                b8f1431509582798dbc86ad48dc29d02

                SHA1

                ba44150969065a9e60ac03625287584bf2978a7e

                SHA256

                69f302a7eee65729f07618d57c39f954e5dbde0ecf41b9b0012a4c3682711263

                SHA512

                1bcdd40cd256d6dc5dae963e6023b5015be2d97c89b9277f9d9ff8a5bff6c322c73f99e7869b0297a8687c3152190069c32179ba04f2ca33ee2b68aefbf234bc

              • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
                Filesize

                206KB

                MD5

                b8f1431509582798dbc86ad48dc29d02

                SHA1

                ba44150969065a9e60ac03625287584bf2978a7e

                SHA256

                69f302a7eee65729f07618d57c39f954e5dbde0ecf41b9b0012a4c3682711263

                SHA512

                1bcdd40cd256d6dc5dae963e6023b5015be2d97c89b9277f9d9ff8a5bff6c322c73f99e7869b0297a8687c3152190069c32179ba04f2ca33ee2b68aefbf234bc

              • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
                Filesize

                206KB

                MD5

                b8f1431509582798dbc86ad48dc29d02

                SHA1

                ba44150969065a9e60ac03625287584bf2978a7e

                SHA256

                69f302a7eee65729f07618d57c39f954e5dbde0ecf41b9b0012a4c3682711263

                SHA512

                1bcdd40cd256d6dc5dae963e6023b5015be2d97c89b9277f9d9ff8a5bff6c322c73f99e7869b0297a8687c3152190069c32179ba04f2ca33ee2b68aefbf234bc

              • C:\Users\Admin\AppData\Local\Temp\64A.dll
                Filesize

                2.0MB

                MD5

                eef81751e9f7ff84e6d8ccf9aebe3883

                SHA1

                7dd92a79f69c30b7d00c385390b561a1e93e1574

                SHA256

                f881acc597313fe673a90c90d2e17e7f2c170a86e7ece1513b3882036e433933

                SHA512

                40f4dffa54e2f0e81d8dd5d66c9082fadc384f965222fb92c0a54cf0a1da28f4f529562ac5bed380fd6e8e617f9e6321558cfdc2cc5d0da8bbd37ca4e6adbb26

              • C:\Users\Admin\AppData\Local\Temp\64A.dll
                Filesize

                2.0MB

                MD5

                eef81751e9f7ff84e6d8ccf9aebe3883

                SHA1

                7dd92a79f69c30b7d00c385390b561a1e93e1574

                SHA256

                f881acc597313fe673a90c90d2e17e7f2c170a86e7ece1513b3882036e433933

                SHA512

                40f4dffa54e2f0e81d8dd5d66c9082fadc384f965222fb92c0a54cf0a1da28f4f529562ac5bed380fd6e8e617f9e6321558cfdc2cc5d0da8bbd37ca4e6adbb26

              • C:\Users\Admin\AppData\Local\Temp\810.exe
                Filesize

                206KB

                MD5

                b8f1431509582798dbc86ad48dc29d02

                SHA1

                ba44150969065a9e60ac03625287584bf2978a7e

                SHA256

                69f302a7eee65729f07618d57c39f954e5dbde0ecf41b9b0012a4c3682711263

                SHA512

                1bcdd40cd256d6dc5dae963e6023b5015be2d97c89b9277f9d9ff8a5bff6c322c73f99e7869b0297a8687c3152190069c32179ba04f2ca33ee2b68aefbf234bc

              • C:\Users\Admin\AppData\Local\Temp\810.exe
                Filesize

                206KB

                MD5

                b8f1431509582798dbc86ad48dc29d02

                SHA1

                ba44150969065a9e60ac03625287584bf2978a7e

                SHA256

                69f302a7eee65729f07618d57c39f954e5dbde0ecf41b9b0012a4c3682711263

                SHA512

                1bcdd40cd256d6dc5dae963e6023b5015be2d97c89b9277f9d9ff8a5bff6c322c73f99e7869b0297a8687c3152190069c32179ba04f2ca33ee2b68aefbf234bc

              • C:\Users\Admin\AppData\Local\Temp\8EC.exe
                Filesize

                205KB

                MD5

                e9f6fccda69077cfc6d220e0f665264c

                SHA1

                87be46433353c2f746df5f84f14fd21bcd50e55b

                SHA256

                b71c27f07c3367ed0733d3bfc17eec9d101a955cf1f8af003ed8977584778d87

                SHA512

                fdf1860fb1061d5ea7f0f742c80b74d2c066bf4602dae1372455f8beb556cda28d049ce82ec3f1569e30f72593647ad8ecf27d2526ff98e16c054433496a18a3

              • C:\Users\Admin\AppData\Local\Temp\8EC.exe
                Filesize

                205KB

                MD5

                e9f6fccda69077cfc6d220e0f665264c

                SHA1

                87be46433353c2f746df5f84f14fd21bcd50e55b

                SHA256

                b71c27f07c3367ed0733d3bfc17eec9d101a955cf1f8af003ed8977584778d87

                SHA512

                fdf1860fb1061d5ea7f0f742c80b74d2c066bf4602dae1372455f8beb556cda28d049ce82ec3f1569e30f72593647ad8ecf27d2526ff98e16c054433496a18a3

              • C:\Users\Admin\AppData\Local\Temp\B5E.exe
                Filesize

                146KB

                MD5

                9b6af8aaca95df0fbced0a38e0f42fec

                SHA1

                27f2cb6e6c79f9ec7243c474d89a9017ce1458a0

                SHA256

                78077ff1e8c109107f9e8ad54c9a3660e3f8e966d61a5cd6b219e5d5226f104a

                SHA512

                d0da8ec346c5063214055e65ad64a3ee8d4d0b07645c1db069a421d47983a24f0e11ec94c990f0eadbd2a05ab38d548992655816965058f56eb9ba592005d415

              • C:\Users\Admin\AppData\Local\Temp\B5E.exe
                Filesize

                146KB

                MD5

                9b6af8aaca95df0fbced0a38e0f42fec

                SHA1

                27f2cb6e6c79f9ec7243c474d89a9017ce1458a0

                SHA256

                78077ff1e8c109107f9e8ad54c9a3660e3f8e966d61a5cd6b219e5d5226f104a

                SHA512

                d0da8ec346c5063214055e65ad64a3ee8d4d0b07645c1db069a421d47983a24f0e11ec94c990f0eadbd2a05ab38d548992655816965058f56eb9ba592005d415

              • C:\Users\Admin\AppData\Local\Temp\C3A.exe
                Filesize

                147KB

                MD5

                1a91e69d7ac978fe7dbd9c1082e1abfd

                SHA1

                e688694596872d570350ac640464a47b9cd883e8

                SHA256

                35728864feffc615636cd614008e7e3ed9fc697542c556f0edc98b705d4f2553

                SHA512

                91a5573093c509d1c290f10528b1d2e9528785a58c372f5a9cdbe3856f0323430b1124af3502196dee45e5a7c5002da16aad6be775b9e89244f0838a9e434530

              • C:\Users\Admin\AppData\Local\Temp\C3A.exe
                Filesize

                147KB

                MD5

                1a91e69d7ac978fe7dbd9c1082e1abfd

                SHA1

                e688694596872d570350ac640464a47b9cd883e8

                SHA256

                35728864feffc615636cd614008e7e3ed9fc697542c556f0edc98b705d4f2553

                SHA512

                91a5573093c509d1c290f10528b1d2e9528785a58c372f5a9cdbe3856f0323430b1124af3502196dee45e5a7c5002da16aad6be775b9e89244f0838a9e434530

              • C:\Users\Admin\AppData\Local\c645368a-aa63-4482-bdbf-efce497a5777\474.exe
                Filesize

                707KB

                MD5

                e247b89d3bc2876d10757ed38f77364a

                SHA1

                5549d29df0c494ea0b317684a4a89fffc9421752

                SHA256

                7e915057b8dee9e425ce461eca6c1accb8e30c0cbc9ffbb4799460c57733cf47

                SHA512

                22072d0b98a03e246c2639bb0cfeb16819e8a328e92e81ec6096b37966f3856ebcdcadb4ac5aa9bb7d127dd0c77ebb528bb2bc5559882d24d56e174feebfe281

              • C:\Users\Admin\AppData\Roaming\KaAOqfgxzZ\JnEdxrtoRb.exe
                Filesize

                125.9MB

                MD5

                76608cf3e0e4bc946969344a7de779a6

                SHA1

                d970e6726a509fda892e59e90668e0464814f989

                SHA256

                a695c7a9065ad286ba8c5dfe5245c23c6d4ba883dd0b326929115f4ab39fd01b

                SHA512

                4a2f86779fa6852188a0e057d4078826fb7bf393d98ade0f6f4330b5de0c4ffab22550a28d448bd92b403166335272808239a624d4adaf5ebfc5d5f206c10b3b

              • C:\Users\Admin\AppData\Roaming\KaAOqfgxzZ\JnEdxrtoRb.exe
                Filesize

                125.5MB

                MD5

                c9876e349ec7995846c5d287adb9d195

                SHA1

                3c6001b99e2b130141f941788bb054164d980323

                SHA256

                a630e8a6d8820097215a833694cb5f1d4e10b64897877591df1fc85cdb4d53a2

                SHA512

                f31ae2f0d832007874cea2c007b8a967878bdb70181b28ae5bca2a2cc5edbb1ff7de4ef1bdfffb5893922c0fcd62eea0cf507b2df5a62dd4c711633f32f4fe38

              • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                Filesize

                9KB

                MD5

                9ead10c08e72ae41921191f8db39bc16

                SHA1

                abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                SHA256

                8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                SHA512

                aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

              • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                Filesize

                9KB

                MD5

                9ead10c08e72ae41921191f8db39bc16

                SHA1

                abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                SHA256

                8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                SHA512

                aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

              • C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll
                Filesize

                126KB

                MD5

                674cec24e36e0dfaec6290db96dda86e

                SHA1

                581e3a7a541cc04641e751fc850d92e07236681f

                SHA256

                de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded

                SHA512

                6d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029

              • C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll
                Filesize

                126KB

                MD5

                674cec24e36e0dfaec6290db96dda86e

                SHA1

                581e3a7a541cc04641e751fc850d92e07236681f

                SHA256

                de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded

                SHA512

                6d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029

              • memory/400-197-0x0000000000000000-mapping.dmp
              • memory/748-186-0x0000000000000000-mapping.dmp
              • memory/1020-230-0x0000000000400000-0x0000000000537000-memory.dmp
                Filesize

                1.2MB

              • memory/1020-201-0x0000000000000000-mapping.dmp
              • memory/1020-204-0x0000000000400000-0x0000000000537000-memory.dmp
                Filesize

                1.2MB

              • memory/1020-207-0x0000000000400000-0x0000000000537000-memory.dmp
                Filesize

                1.2MB

              • memory/1020-217-0x0000000000400000-0x0000000000537000-memory.dmp
                Filesize

                1.2MB

              • memory/1524-193-0x0000000000000000-mapping.dmp
              • memory/1524-205-0x0000000002602000-0x0000000002694000-memory.dmp
                Filesize

                584KB

              • memory/1664-239-0x0000000000400000-0x000000000045F000-memory.dmp
                Filesize

                380KB

              • memory/1664-236-0x0000000000400000-0x000000000045F000-memory.dmp
                Filesize

                380KB

              • memory/1664-263-0x0000000000400000-0x000000000045F000-memory.dmp
                Filesize

                380KB

              • memory/1664-231-0x0000000000000000-mapping.dmp
              • memory/1664-240-0x0000000061E00000-0x0000000061EF3000-memory.dmp
                Filesize

                972KB

              • memory/1664-232-0x0000000000400000-0x000000000045F000-memory.dmp
                Filesize

                380KB

              • memory/1664-234-0x0000000000400000-0x000000000045F000-memory.dmp
                Filesize

                380KB

              • memory/2040-264-0x0000000000000000-mapping.dmp
              • memory/2200-275-0x0000000000000000-mapping.dmp
              • memory/3032-172-0x0000000000400000-0x0000000000AD6000-memory.dmp
                Filesize

                6.8MB

              • memory/3032-149-0x0000000000000000-mapping.dmp
              • memory/3032-167-0x0000000000CBD000-0x0000000000CCE000-memory.dmp
                Filesize

                68KB

              • memory/3032-168-0x0000000000B50000-0x0000000000B59000-memory.dmp
                Filesize

                36KB

              • memory/3032-169-0x0000000000400000-0x0000000000AD6000-memory.dmp
                Filesize

                6.8MB

              • memory/3080-171-0x0000000000400000-0x0000000000AE5000-memory.dmp
                Filesize

                6.9MB

              • memory/3080-170-0x0000000000D2D000-0x0000000000D4C000-memory.dmp
                Filesize

                124KB

              • memory/3080-163-0x0000000000400000-0x0000000000AE5000-memory.dmp
                Filesize

                6.9MB

              • memory/3080-161-0x0000000000D2D000-0x0000000000D4C000-memory.dmp
                Filesize

                124KB

              • memory/3080-142-0x0000000000000000-mapping.dmp
              • memory/3080-162-0x0000000000C60000-0x0000000000C9E000-memory.dmp
                Filesize

                248KB

              • memory/3116-176-0x0000000000400000-0x0000000000537000-memory.dmp
                Filesize

                1.2MB

              • memory/3116-195-0x0000000000400000-0x0000000000537000-memory.dmp
                Filesize

                1.2MB

              • memory/3116-174-0x0000000000400000-0x0000000000537000-memory.dmp
                Filesize

                1.2MB

              • memory/3116-180-0x0000000000400000-0x0000000000537000-memory.dmp
                Filesize

                1.2MB

              • memory/3116-178-0x0000000000400000-0x0000000000537000-memory.dmp
                Filesize

                1.2MB

              • memory/3116-173-0x0000000000000000-mapping.dmp
              • memory/3376-156-0x0000000000000000-mapping.dmp
              • memory/3376-159-0x0000000000BC0000-0x0000000000BCC000-memory.dmp
                Filesize

                48KB

              • memory/3748-177-0x0000000002659000-0x00000000026EB000-memory.dmp
                Filesize

                584KB

              • memory/3748-179-0x0000000000C90000-0x0000000000DAB000-memory.dmp
                Filesize

                1.1MB

              • memory/3748-136-0x0000000000000000-mapping.dmp
              • memory/3764-141-0x0000000000000000-mapping.dmp
              • memory/3836-134-0x0000000000400000-0x0000000000AD6000-memory.dmp
                Filesize

                6.8MB

              • memory/3836-135-0x0000000000400000-0x0000000000AD6000-memory.dmp
                Filesize

                6.8MB

              • memory/3836-133-0x0000000000B50000-0x0000000000B59000-memory.dmp
                Filesize

                36KB

              • memory/3836-132-0x0000000000C3D000-0x0000000000C4D000-memory.dmp
                Filesize

                64KB

              • memory/3856-228-0x0000000000000000-mapping.dmp
              • memory/3992-139-0x0000000000000000-mapping.dmp
              • memory/4208-146-0x0000000000000000-mapping.dmp
              • memory/4208-181-0x0000000000DED000-0x0000000000E0C000-memory.dmp
                Filesize

                124KB

              • memory/4208-182-0x0000000000400000-0x0000000000AE5000-memory.dmp
                Filesize

                6.9MB

              • memory/4364-222-0x0000000000000000-mapping.dmp
              • memory/4364-237-0x00000000007D0000-0x000000000081B000-memory.dmp
                Filesize

                300KB

              • memory/4364-235-0x000000000089D000-0x00000000008C9000-memory.dmp
                Filesize

                176KB

              • memory/4408-158-0x0000000000500000-0x000000000056B000-memory.dmp
                Filesize

                428KB

              • memory/4408-157-0x0000000000570000-0x00000000005E5000-memory.dmp
                Filesize

                468KB

              • memory/4408-155-0x0000000000000000-mapping.dmp
              • memory/4408-160-0x0000000000500000-0x000000000056B000-memory.dmp
                Filesize

                428KB

              • memory/4424-271-0x0000000000000000-mapping.dmp
              • memory/4448-206-0x0000000000EDC000-0x0000000000F0D000-memory.dmp
                Filesize

                196KB

              • memory/4448-212-0x00000000056A0000-0x0000000005732000-memory.dmp
                Filesize

                584KB

              • memory/4448-229-0x0000000000EDC000-0x0000000000F0D000-memory.dmp
                Filesize

                196KB

              • memory/4448-190-0x0000000000000000-mapping.dmp
              • memory/4448-209-0x0000000002610000-0x000000000264E000-memory.dmp
                Filesize

                248KB

              • memory/4448-274-0x0000000000400000-0x0000000000AF7000-memory.dmp
                Filesize

                7.0MB

              • memory/4448-238-0x0000000006290000-0x00000000062F6000-memory.dmp
                Filesize

                408KB

              • memory/4448-221-0x0000000005970000-0x00000000059AC000-memory.dmp
                Filesize

                240KB

              • memory/4448-273-0x0000000000EDC000-0x0000000000F0D000-memory.dmp
                Filesize

                196KB

              • memory/4448-208-0x00000000050B0000-0x0000000005654000-memory.dmp
                Filesize

                5.6MB

              • memory/4448-220-0x0000000005950000-0x0000000005962000-memory.dmp
                Filesize

                72KB

              • memory/4448-211-0x0000000000400000-0x0000000000AF7000-memory.dmp
                Filesize

                7.0MB

              • memory/4448-218-0x0000000005A00000-0x0000000006018000-memory.dmp
                Filesize

                6.1MB

              • memory/4448-266-0x0000000007920000-0x0000000007E4C000-memory.dmp
                Filesize

                5.2MB

              • memory/4448-265-0x0000000007750000-0x0000000007912000-memory.dmp
                Filesize

                1.8MB

              • memory/4448-219-0x0000000005820000-0x000000000592A000-memory.dmp
                Filesize

                1.0MB

              • memory/4552-187-0x0000000000000000-mapping.dmp
              • memory/4708-152-0x0000000000000000-mapping.dmp
              • memory/4708-183-0x0000000000BCD000-0x0000000000BDE000-memory.dmp
                Filesize

                68KB

              • memory/4708-196-0x0000000000400000-0x0000000000AD6000-memory.dmp
                Filesize

                6.8MB

              • memory/4708-184-0x0000000000400000-0x0000000000AD6000-memory.dmp
                Filesize

                6.8MB

              • memory/4776-260-0x0000000000000000-mapping.dmp
              • memory/4780-262-0x0000000000000000-mapping.dmp
              • memory/4900-225-0x0000000000000000-mapping.dmp
              • memory/5092-164-0x0000000000000000-mapping.dmp
              • memory/5092-185-0x0000000000400000-0x0000000000AE5000-memory.dmp
                Filesize

                6.9MB

              • memory/5092-189-0x0000000000DEC000-0x0000000000E0B000-memory.dmp
                Filesize

                124KB

              • memory/5092-200-0x0000000000400000-0x0000000000AE5000-memory.dmp
                Filesize

                6.9MB

              • memory/5104-261-0x0000000000000000-mapping.dmp