Analysis

  • max time kernel
    129s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 20:51

General

  • Target

    1f1f99659954e573c7cc069781a4800be08b614e997d9377a20f1b6d49033b0c.exe

  • Size

    1.3MB

  • MD5

    e6e69d8cda0ecef2dcc154fa1707023b

  • SHA1

    7f91531950593c9e2a63337bb63ebd52d5f38196

  • SHA256

    1f1f99659954e573c7cc069781a4800be08b614e997d9377a20f1b6d49033b0c

  • SHA512

    04ac341db58e61b950f2e4e53a3d21fcd1bd2dec3a9de8a830632475aa9d8c47ded252d15895a8223b951427c34e9fc073d7b9a4c129b49f0ef01f30bf052a40

  • SSDEEP

    24576:OyxKfEN39EDJKtJlhE5lhtlM00WJdbYrzaeS/T7KuwMkW2Xqy6yh:dxKMoD35ntyOCAnzjby6

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 27 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f1f99659954e573c7cc069781a4800be08b614e997d9377a20f1b6d49033b0c.exe
    "C:\Users\Admin\AppData\Local\Temp\1f1f99659954e573c7cc069781a4800be08b614e997d9377a20f1b6d49033b0c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za100976.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za100976.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za910388.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za910388.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za003244.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za003244.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:648
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\35232864.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\35232864.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:976
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:604
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u20863791.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u20863791.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1224
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w69lJ02.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w69lJ02.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:856
          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1804
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:1612
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
              6⤵
              • Loads dropped DLL
              PID:544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xQvWH59.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xQvWH59.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1852
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:436
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys110668.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys110668.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1368
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {F5A3846D-D4BA-4163-A0A7-ACB5EFC5E5ED} S-1-5-21-3430344531-3702557399-3004411149-1000:WFSTZEPN\Admin:Interactive:[1]
    1⤵
      PID:1776
      • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
        2⤵
        • Executes dropped EXE
        PID:628

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      Filesize

      230KB

      MD5

      09a35eabdb51aa93a7d5c00693ac8a2d

      SHA1

      fb82c0459452c3408fe51f4bb788785c5eae7b31

      SHA256

      b34cc10cb10f0bc55f538e67e6fee0fdc38af6e08da87f962eef85a2bce28e58

      SHA512

      7178c60038382a8b3ff1089f8b11dd6971c179265cc494f0d1d7449feded353f87ba8e050c4fc9115dbdadb558e62a765c3f6b6bd14620f8af9813a57ed340da

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      Filesize

      230KB

      MD5

      09a35eabdb51aa93a7d5c00693ac8a2d

      SHA1

      fb82c0459452c3408fe51f4bb788785c5eae7b31

      SHA256

      b34cc10cb10f0bc55f538e67e6fee0fdc38af6e08da87f962eef85a2bce28e58

      SHA512

      7178c60038382a8b3ff1089f8b11dd6971c179265cc494f0d1d7449feded353f87ba8e050c4fc9115dbdadb558e62a765c3f6b6bd14620f8af9813a57ed340da

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      Filesize

      230KB

      MD5

      09a35eabdb51aa93a7d5c00693ac8a2d

      SHA1

      fb82c0459452c3408fe51f4bb788785c5eae7b31

      SHA256

      b34cc10cb10f0bc55f538e67e6fee0fdc38af6e08da87f962eef85a2bce28e58

      SHA512

      7178c60038382a8b3ff1089f8b11dd6971c179265cc494f0d1d7449feded353f87ba8e050c4fc9115dbdadb558e62a765c3f6b6bd14620f8af9813a57ed340da

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      Filesize

      230KB

      MD5

      09a35eabdb51aa93a7d5c00693ac8a2d

      SHA1

      fb82c0459452c3408fe51f4bb788785c5eae7b31

      SHA256

      b34cc10cb10f0bc55f538e67e6fee0fdc38af6e08da87f962eef85a2bce28e58

      SHA512

      7178c60038382a8b3ff1089f8b11dd6971c179265cc494f0d1d7449feded353f87ba8e050c4fc9115dbdadb558e62a765c3f6b6bd14620f8af9813a57ed340da

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys110668.exe
      Filesize

      169KB

      MD5

      d8ed39fc903e4de89d967d3592560ac1

      SHA1

      f26b03ddf8fc90f3efcfc4a21898a9004951407d

      SHA256

      e759fce40fa285312dd5213d92c2f838ae7503de8301d94bf6ab7e5b42d03ca0

      SHA512

      1b921cc1f8e08b03dc36ea1933306958130f0ac30cca88ac1a8f0748bc02db105253872fb139c687a5ca0b2625c7c2630ed3e2c0a6d9a40bd9b84b741863ea0c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys110668.exe
      Filesize

      169KB

      MD5

      d8ed39fc903e4de89d967d3592560ac1

      SHA1

      f26b03ddf8fc90f3efcfc4a21898a9004951407d

      SHA256

      e759fce40fa285312dd5213d92c2f838ae7503de8301d94bf6ab7e5b42d03ca0

      SHA512

      1b921cc1f8e08b03dc36ea1933306958130f0ac30cca88ac1a8f0748bc02db105253872fb139c687a5ca0b2625c7c2630ed3e2c0a6d9a40bd9b84b741863ea0c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za100976.exe
      Filesize

      1.2MB

      MD5

      d93aaecec7e91d33557ec7688bda8682

      SHA1

      e0f39b31bfbb34259d3aafa7845fa22a719ef26c

      SHA256

      28dfd25cda6e3b9ef695d0cfacf2038566029681389c297aa35a12c245079626

      SHA512

      3c8133279cc1542834ffecf105c4a418de159dac76f494e7cd8ed973dde8bb2c5bfb2d17dd7984c2166f4ba980716a04025e7875d8c2fa7c2eca5886c26ff8d9

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za100976.exe
      Filesize

      1.2MB

      MD5

      d93aaecec7e91d33557ec7688bda8682

      SHA1

      e0f39b31bfbb34259d3aafa7845fa22a719ef26c

      SHA256

      28dfd25cda6e3b9ef695d0cfacf2038566029681389c297aa35a12c245079626

      SHA512

      3c8133279cc1542834ffecf105c4a418de159dac76f494e7cd8ed973dde8bb2c5bfb2d17dd7984c2166f4ba980716a04025e7875d8c2fa7c2eca5886c26ff8d9

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xQvWH59.exe
      Filesize

      574KB

      MD5

      5762f7549da3e934185267165b2c8bbb

      SHA1

      1d5b0ee7cbe23a9ba4c2ee2f25069f4065865171

      SHA256

      a040b0a280ea4acc7d5e44feb3e084155030591e7a15d46e8089213d1f7fb8d5

      SHA512

      749466b03f95b067bf4cdbe1259719a162ce6d9627144a1853b24054831ad4073c86165793743e1d85ad9ed732001e3f729f927cf71a1a0240973af669d39019

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xQvWH59.exe
      Filesize

      574KB

      MD5

      5762f7549da3e934185267165b2c8bbb

      SHA1

      1d5b0ee7cbe23a9ba4c2ee2f25069f4065865171

      SHA256

      a040b0a280ea4acc7d5e44feb3e084155030591e7a15d46e8089213d1f7fb8d5

      SHA512

      749466b03f95b067bf4cdbe1259719a162ce6d9627144a1853b24054831ad4073c86165793743e1d85ad9ed732001e3f729f927cf71a1a0240973af669d39019

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xQvWH59.exe
      Filesize

      574KB

      MD5

      5762f7549da3e934185267165b2c8bbb

      SHA1

      1d5b0ee7cbe23a9ba4c2ee2f25069f4065865171

      SHA256

      a040b0a280ea4acc7d5e44feb3e084155030591e7a15d46e8089213d1f7fb8d5

      SHA512

      749466b03f95b067bf4cdbe1259719a162ce6d9627144a1853b24054831ad4073c86165793743e1d85ad9ed732001e3f729f927cf71a1a0240973af669d39019

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za910388.exe
      Filesize

      737KB

      MD5

      08df9d74c182989a2fa94ecc3161a76d

      SHA1

      8d8f9ba17922d4be37b59922371e9336e9d08ba8

      SHA256

      9efd250f1f82054f6b917ffb2aca06a2d732209083bd4f6307864c6ddcf991c7

      SHA512

      e6943ad22acee7494c43a48e8e727705926b49028773289cd4830186a8bad80026e0d02b5b475834ee727788ed33937f62d38415264a231ef4efa05393bbad96

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za910388.exe
      Filesize

      737KB

      MD5

      08df9d74c182989a2fa94ecc3161a76d

      SHA1

      8d8f9ba17922d4be37b59922371e9336e9d08ba8

      SHA256

      9efd250f1f82054f6b917ffb2aca06a2d732209083bd4f6307864c6ddcf991c7

      SHA512

      e6943ad22acee7494c43a48e8e727705926b49028773289cd4830186a8bad80026e0d02b5b475834ee727788ed33937f62d38415264a231ef4efa05393bbad96

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w69lJ02.exe
      Filesize

      230KB

      MD5

      09a35eabdb51aa93a7d5c00693ac8a2d

      SHA1

      fb82c0459452c3408fe51f4bb788785c5eae7b31

      SHA256

      b34cc10cb10f0bc55f538e67e6fee0fdc38af6e08da87f962eef85a2bce28e58

      SHA512

      7178c60038382a8b3ff1089f8b11dd6971c179265cc494f0d1d7449feded353f87ba8e050c4fc9115dbdadb558e62a765c3f6b6bd14620f8af9813a57ed340da

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w69lJ02.exe
      Filesize

      230KB

      MD5

      09a35eabdb51aa93a7d5c00693ac8a2d

      SHA1

      fb82c0459452c3408fe51f4bb788785c5eae7b31

      SHA256

      b34cc10cb10f0bc55f538e67e6fee0fdc38af6e08da87f962eef85a2bce28e58

      SHA512

      7178c60038382a8b3ff1089f8b11dd6971c179265cc494f0d1d7449feded353f87ba8e050c4fc9115dbdadb558e62a765c3f6b6bd14620f8af9813a57ed340da

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za003244.exe
      Filesize

      554KB

      MD5

      a465f30d7c2f4f4efcda68e45cc408b9

      SHA1

      2c1a073d6229dec1313b4641c46172a584269d10

      SHA256

      7eba27f2efe0fa3bc9b315dd47be7b76b404a34b324fa424782ab13354c4060a

      SHA512

      f6049efd7c82002c09777475756d7955b0f0e7fcd0f4f079cac4ebd4846e3b317574d62c154fd89ffac559ca431b8050089948d271f5f6f4b33fb99e071ba2d8

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za003244.exe
      Filesize

      554KB

      MD5

      a465f30d7c2f4f4efcda68e45cc408b9

      SHA1

      2c1a073d6229dec1313b4641c46172a584269d10

      SHA256

      7eba27f2efe0fa3bc9b315dd47be7b76b404a34b324fa424782ab13354c4060a

      SHA512

      f6049efd7c82002c09777475756d7955b0f0e7fcd0f4f079cac4ebd4846e3b317574d62c154fd89ffac559ca431b8050089948d271f5f6f4b33fb99e071ba2d8

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\35232864.exe
      Filesize

      303KB

      MD5

      0389b27d5d2c3e5dd65047a999c998e7

      SHA1

      2a4b654320e42dfc4228fedcb120e3c46fa0e872

      SHA256

      80af3902e8f16f274d770a8cf7db4a418dcd7944ddc708d4b2429d98fd014b31

      SHA512

      073739ce8256b9243cc05df192eb84ecbc121a930029c1e9de70ab62de1d9b22f371cbc4feb97dcf3ee609cb872cd1186e4c17f3b5cf8494b96067b7a5895b5f

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\35232864.exe
      Filesize

      303KB

      MD5

      0389b27d5d2c3e5dd65047a999c998e7

      SHA1

      2a4b654320e42dfc4228fedcb120e3c46fa0e872

      SHA256

      80af3902e8f16f274d770a8cf7db4a418dcd7944ddc708d4b2429d98fd014b31

      SHA512

      073739ce8256b9243cc05df192eb84ecbc121a930029c1e9de70ab62de1d9b22f371cbc4feb97dcf3ee609cb872cd1186e4c17f3b5cf8494b96067b7a5895b5f

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u20863791.exe
      Filesize

      391KB

      MD5

      f775011f2469867ec6858e4d035fef8e

      SHA1

      0358e04685104777111af204ee55c0356689dcf0

      SHA256

      51f8ad06f6901263eb9c6b52453e41861da5d8c0b2b09a216244e84b89f2cba0

      SHA512

      f42234b24c160ff4a56ef7100ab0db14aa1d26428d67940f9c87319586ab6ab4050321bdc388bc86f8afff56eb6715a2c38d0e717114d1bbfc04682cf65875c0

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u20863791.exe
      Filesize

      391KB

      MD5

      f775011f2469867ec6858e4d035fef8e

      SHA1

      0358e04685104777111af204ee55c0356689dcf0

      SHA256

      51f8ad06f6901263eb9c6b52453e41861da5d8c0b2b09a216244e84b89f2cba0

      SHA512

      f42234b24c160ff4a56ef7100ab0db14aa1d26428d67940f9c87319586ab6ab4050321bdc388bc86f8afff56eb6715a2c38d0e717114d1bbfc04682cf65875c0

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u20863791.exe
      Filesize

      391KB

      MD5

      f775011f2469867ec6858e4d035fef8e

      SHA1

      0358e04685104777111af204ee55c0356689dcf0

      SHA256

      51f8ad06f6901263eb9c6b52453e41861da5d8c0b2b09a216244e84b89f2cba0

      SHA512

      f42234b24c160ff4a56ef7100ab0db14aa1d26428d67940f9c87319586ab6ab4050321bdc388bc86f8afff56eb6715a2c38d0e717114d1bbfc04682cf65875c0

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
      Filesize

      89KB

      MD5

      73df88d68a4f5e066784d462788cf695

      SHA1

      e4bfed336848d0b622fa464d40cf4bd9222aab3f

      SHA256

      f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

      SHA512

      64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
      Filesize

      89KB

      MD5

      73df88d68a4f5e066784d462788cf695

      SHA1

      e4bfed336848d0b622fa464d40cf4bd9222aab3f

      SHA256

      f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

      SHA512

      64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
      Filesize

      162B

      MD5

      1b7c22a214949975556626d7217e9a39

      SHA1

      d01c97e2944166ed23e47e4a62ff471ab8fa031f

      SHA256

      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

      SHA512

      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

    • C:\Windows\Temp\1.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Windows\Temp\1.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • C:\Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • \Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      Filesize

      230KB

      MD5

      09a35eabdb51aa93a7d5c00693ac8a2d

      SHA1

      fb82c0459452c3408fe51f4bb788785c5eae7b31

      SHA256

      b34cc10cb10f0bc55f538e67e6fee0fdc38af6e08da87f962eef85a2bce28e58

      SHA512

      7178c60038382a8b3ff1089f8b11dd6971c179265cc494f0d1d7449feded353f87ba8e050c4fc9115dbdadb558e62a765c3f6b6bd14620f8af9813a57ed340da

    • \Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      Filesize

      230KB

      MD5

      09a35eabdb51aa93a7d5c00693ac8a2d

      SHA1

      fb82c0459452c3408fe51f4bb788785c5eae7b31

      SHA256

      b34cc10cb10f0bc55f538e67e6fee0fdc38af6e08da87f962eef85a2bce28e58

      SHA512

      7178c60038382a8b3ff1089f8b11dd6971c179265cc494f0d1d7449feded353f87ba8e050c4fc9115dbdadb558e62a765c3f6b6bd14620f8af9813a57ed340da

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ys110668.exe
      Filesize

      169KB

      MD5

      d8ed39fc903e4de89d967d3592560ac1

      SHA1

      f26b03ddf8fc90f3efcfc4a21898a9004951407d

      SHA256

      e759fce40fa285312dd5213d92c2f838ae7503de8301d94bf6ab7e5b42d03ca0

      SHA512

      1b921cc1f8e08b03dc36ea1933306958130f0ac30cca88ac1a8f0748bc02db105253872fb139c687a5ca0b2625c7c2630ed3e2c0a6d9a40bd9b84b741863ea0c

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ys110668.exe
      Filesize

      169KB

      MD5

      d8ed39fc903e4de89d967d3592560ac1

      SHA1

      f26b03ddf8fc90f3efcfc4a21898a9004951407d

      SHA256

      e759fce40fa285312dd5213d92c2f838ae7503de8301d94bf6ab7e5b42d03ca0

      SHA512

      1b921cc1f8e08b03dc36ea1933306958130f0ac30cca88ac1a8f0748bc02db105253872fb139c687a5ca0b2625c7c2630ed3e2c0a6d9a40bd9b84b741863ea0c

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\za100976.exe
      Filesize

      1.2MB

      MD5

      d93aaecec7e91d33557ec7688bda8682

      SHA1

      e0f39b31bfbb34259d3aafa7845fa22a719ef26c

      SHA256

      28dfd25cda6e3b9ef695d0cfacf2038566029681389c297aa35a12c245079626

      SHA512

      3c8133279cc1542834ffecf105c4a418de159dac76f494e7cd8ed973dde8bb2c5bfb2d17dd7984c2166f4ba980716a04025e7875d8c2fa7c2eca5886c26ff8d9

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\za100976.exe
      Filesize

      1.2MB

      MD5

      d93aaecec7e91d33557ec7688bda8682

      SHA1

      e0f39b31bfbb34259d3aafa7845fa22a719ef26c

      SHA256

      28dfd25cda6e3b9ef695d0cfacf2038566029681389c297aa35a12c245079626

      SHA512

      3c8133279cc1542834ffecf105c4a418de159dac76f494e7cd8ed973dde8bb2c5bfb2d17dd7984c2166f4ba980716a04025e7875d8c2fa7c2eca5886c26ff8d9

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\xQvWH59.exe
      Filesize

      574KB

      MD5

      5762f7549da3e934185267165b2c8bbb

      SHA1

      1d5b0ee7cbe23a9ba4c2ee2f25069f4065865171

      SHA256

      a040b0a280ea4acc7d5e44feb3e084155030591e7a15d46e8089213d1f7fb8d5

      SHA512

      749466b03f95b067bf4cdbe1259719a162ce6d9627144a1853b24054831ad4073c86165793743e1d85ad9ed732001e3f729f927cf71a1a0240973af669d39019

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\xQvWH59.exe
      Filesize

      574KB

      MD5

      5762f7549da3e934185267165b2c8bbb

      SHA1

      1d5b0ee7cbe23a9ba4c2ee2f25069f4065865171

      SHA256

      a040b0a280ea4acc7d5e44feb3e084155030591e7a15d46e8089213d1f7fb8d5

      SHA512

      749466b03f95b067bf4cdbe1259719a162ce6d9627144a1853b24054831ad4073c86165793743e1d85ad9ed732001e3f729f927cf71a1a0240973af669d39019

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\xQvWH59.exe
      Filesize

      574KB

      MD5

      5762f7549da3e934185267165b2c8bbb

      SHA1

      1d5b0ee7cbe23a9ba4c2ee2f25069f4065865171

      SHA256

      a040b0a280ea4acc7d5e44feb3e084155030591e7a15d46e8089213d1f7fb8d5

      SHA512

      749466b03f95b067bf4cdbe1259719a162ce6d9627144a1853b24054831ad4073c86165793743e1d85ad9ed732001e3f729f927cf71a1a0240973af669d39019

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\za910388.exe
      Filesize

      737KB

      MD5

      08df9d74c182989a2fa94ecc3161a76d

      SHA1

      8d8f9ba17922d4be37b59922371e9336e9d08ba8

      SHA256

      9efd250f1f82054f6b917ffb2aca06a2d732209083bd4f6307864c6ddcf991c7

      SHA512

      e6943ad22acee7494c43a48e8e727705926b49028773289cd4830186a8bad80026e0d02b5b475834ee727788ed33937f62d38415264a231ef4efa05393bbad96

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\za910388.exe
      Filesize

      737KB

      MD5

      08df9d74c182989a2fa94ecc3161a76d

      SHA1

      8d8f9ba17922d4be37b59922371e9336e9d08ba8

      SHA256

      9efd250f1f82054f6b917ffb2aca06a2d732209083bd4f6307864c6ddcf991c7

      SHA512

      e6943ad22acee7494c43a48e8e727705926b49028773289cd4830186a8bad80026e0d02b5b475834ee727788ed33937f62d38415264a231ef4efa05393bbad96

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\w69lJ02.exe
      Filesize

      230KB

      MD5

      09a35eabdb51aa93a7d5c00693ac8a2d

      SHA1

      fb82c0459452c3408fe51f4bb788785c5eae7b31

      SHA256

      b34cc10cb10f0bc55f538e67e6fee0fdc38af6e08da87f962eef85a2bce28e58

      SHA512

      7178c60038382a8b3ff1089f8b11dd6971c179265cc494f0d1d7449feded353f87ba8e050c4fc9115dbdadb558e62a765c3f6b6bd14620f8af9813a57ed340da

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\w69lJ02.exe
      Filesize

      230KB

      MD5

      09a35eabdb51aa93a7d5c00693ac8a2d

      SHA1

      fb82c0459452c3408fe51f4bb788785c5eae7b31

      SHA256

      b34cc10cb10f0bc55f538e67e6fee0fdc38af6e08da87f962eef85a2bce28e58

      SHA512

      7178c60038382a8b3ff1089f8b11dd6971c179265cc494f0d1d7449feded353f87ba8e050c4fc9115dbdadb558e62a765c3f6b6bd14620f8af9813a57ed340da

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\za003244.exe
      Filesize

      554KB

      MD5

      a465f30d7c2f4f4efcda68e45cc408b9

      SHA1

      2c1a073d6229dec1313b4641c46172a584269d10

      SHA256

      7eba27f2efe0fa3bc9b315dd47be7b76b404a34b324fa424782ab13354c4060a

      SHA512

      f6049efd7c82002c09777475756d7955b0f0e7fcd0f4f079cac4ebd4846e3b317574d62c154fd89ffac559ca431b8050089948d271f5f6f4b33fb99e071ba2d8

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\za003244.exe
      Filesize

      554KB

      MD5

      a465f30d7c2f4f4efcda68e45cc408b9

      SHA1

      2c1a073d6229dec1313b4641c46172a584269d10

      SHA256

      7eba27f2efe0fa3bc9b315dd47be7b76b404a34b324fa424782ab13354c4060a

      SHA512

      f6049efd7c82002c09777475756d7955b0f0e7fcd0f4f079cac4ebd4846e3b317574d62c154fd89ffac559ca431b8050089948d271f5f6f4b33fb99e071ba2d8

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\35232864.exe
      Filesize

      303KB

      MD5

      0389b27d5d2c3e5dd65047a999c998e7

      SHA1

      2a4b654320e42dfc4228fedcb120e3c46fa0e872

      SHA256

      80af3902e8f16f274d770a8cf7db4a418dcd7944ddc708d4b2429d98fd014b31

      SHA512

      073739ce8256b9243cc05df192eb84ecbc121a930029c1e9de70ab62de1d9b22f371cbc4feb97dcf3ee609cb872cd1186e4c17f3b5cf8494b96067b7a5895b5f

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\35232864.exe
      Filesize

      303KB

      MD5

      0389b27d5d2c3e5dd65047a999c998e7

      SHA1

      2a4b654320e42dfc4228fedcb120e3c46fa0e872

      SHA256

      80af3902e8f16f274d770a8cf7db4a418dcd7944ddc708d4b2429d98fd014b31

      SHA512

      073739ce8256b9243cc05df192eb84ecbc121a930029c1e9de70ab62de1d9b22f371cbc4feb97dcf3ee609cb872cd1186e4c17f3b5cf8494b96067b7a5895b5f

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\u20863791.exe
      Filesize

      391KB

      MD5

      f775011f2469867ec6858e4d035fef8e

      SHA1

      0358e04685104777111af204ee55c0356689dcf0

      SHA256

      51f8ad06f6901263eb9c6b52453e41861da5d8c0b2b09a216244e84b89f2cba0

      SHA512

      f42234b24c160ff4a56ef7100ab0db14aa1d26428d67940f9c87319586ab6ab4050321bdc388bc86f8afff56eb6715a2c38d0e717114d1bbfc04682cf65875c0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\u20863791.exe
      Filesize

      391KB

      MD5

      f775011f2469867ec6858e4d035fef8e

      SHA1

      0358e04685104777111af204ee55c0356689dcf0

      SHA256

      51f8ad06f6901263eb9c6b52453e41861da5d8c0b2b09a216244e84b89f2cba0

      SHA512

      f42234b24c160ff4a56ef7100ab0db14aa1d26428d67940f9c87319586ab6ab4050321bdc388bc86f8afff56eb6715a2c38d0e717114d1bbfc04682cf65875c0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\u20863791.exe
      Filesize

      391KB

      MD5

      f775011f2469867ec6858e4d035fef8e

      SHA1

      0358e04685104777111af204ee55c0356689dcf0

      SHA256

      51f8ad06f6901263eb9c6b52453e41861da5d8c0b2b09a216244e84b89f2cba0

      SHA512

      f42234b24c160ff4a56ef7100ab0db14aa1d26428d67940f9c87319586ab6ab4050321bdc388bc86f8afff56eb6715a2c38d0e717114d1bbfc04682cf65875c0

    • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
      Filesize

      89KB

      MD5

      73df88d68a4f5e066784d462788cf695

      SHA1

      e4bfed336848d0b622fa464d40cf4bd9222aab3f

      SHA256

      f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

      SHA512

      64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

    • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
      Filesize

      89KB

      MD5

      73df88d68a4f5e066784d462788cf695

      SHA1

      e4bfed336848d0b622fa464d40cf4bd9222aab3f

      SHA256

      f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

      SHA512

      64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

    • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
      Filesize

      89KB

      MD5

      73df88d68a4f5e066784d462788cf695

      SHA1

      e4bfed336848d0b622fa464d40cf4bd9222aab3f

      SHA256

      f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

      SHA512

      64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

    • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
      Filesize

      89KB

      MD5

      73df88d68a4f5e066784d462788cf695

      SHA1

      e4bfed336848d0b622fa464d40cf4bd9222aab3f

      SHA256

      f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

      SHA512

      64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

    • \Windows\Temp\1.exe
      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • \Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • \Windows\Temp\1.exe
      Filesize

      168KB

      MD5

      f16fb63d4e551d3808e8f01f2671b57e

      SHA1

      781153ad6235a1152da112de1fb39a6f2d063575

      SHA256

      8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

      SHA512

      fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

    • memory/436-4475-0x0000000000920000-0x000000000094E000-memory.dmp
      Filesize

      184KB

    • memory/436-4484-0x0000000000410000-0x0000000000416000-memory.dmp
      Filesize

      24KB

    • memory/436-4485-0x0000000004AA0000-0x0000000004AE0000-memory.dmp
      Filesize

      256KB

    • memory/436-4487-0x0000000004AA0000-0x0000000004AE0000-memory.dmp
      Filesize

      256KB

    • memory/604-2282-0x0000000001050000-0x000000000105A000-memory.dmp
      Filesize

      40KB

    • memory/856-2292-0x00000000002F0000-0x00000000002F1000-memory.dmp
      Filesize

      4KB

    • memory/976-131-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-111-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-151-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-160-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-149-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-147-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-94-0x0000000000A80000-0x0000000000AD8000-memory.dmp
      Filesize

      352KB

    • memory/976-157-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-154-0x0000000004BA0000-0x0000000004BE0000-memory.dmp
      Filesize

      256KB

    • memory/976-153-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-133-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-95-0x0000000002200000-0x0000000002256000-memory.dmp
      Filesize

      344KB

    • memory/976-162-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-96-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-145-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-143-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-141-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-139-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-2234-0x0000000004BA0000-0x0000000004BE0000-memory.dmp
      Filesize

      256KB

    • memory/976-137-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-135-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-158-0x0000000004BA0000-0x0000000004BE0000-memory.dmp
      Filesize

      256KB

    • memory/976-129-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-127-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-123-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-121-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-119-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-115-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-113-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-155-0x0000000004BA0000-0x0000000004BE0000-memory.dmp
      Filesize

      256KB

    • memory/976-97-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-125-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-117-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-2227-0x0000000004BA0000-0x0000000004BE0000-memory.dmp
      Filesize

      256KB

    • memory/976-2228-0x0000000004BA0000-0x0000000004BE0000-memory.dmp
      Filesize

      256KB

    • memory/976-99-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-2230-0x00000000004A0000-0x00000000004AA000-memory.dmp
      Filesize

      40KB

    • memory/976-109-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-2229-0x0000000004BA0000-0x0000000004BE0000-memory.dmp
      Filesize

      256KB

    • memory/976-107-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-105-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-103-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/976-101-0x0000000002200000-0x0000000002251000-memory.dmp
      Filesize

      324KB

    • memory/1224-2285-0x00000000002C0000-0x00000000002ED000-memory.dmp
      Filesize

      180KB

    • memory/1224-2248-0x00000000002C0000-0x00000000002ED000-memory.dmp
      Filesize

      180KB

    • memory/1224-2249-0x0000000000850000-0x000000000086A000-memory.dmp
      Filesize

      104KB

    • memory/1224-2250-0x0000000001040000-0x0000000001058000-memory.dmp
      Filesize

      96KB

    • memory/1224-2279-0x0000000004FE0000-0x0000000005020000-memory.dmp
      Filesize

      256KB

    • memory/1224-2280-0x0000000004FE0000-0x0000000005020000-memory.dmp
      Filesize

      256KB

    • memory/1224-2281-0x0000000004FE0000-0x0000000005020000-memory.dmp
      Filesize

      256KB

    • memory/1368-4483-0x00000000001D0000-0x00000000001D6000-memory.dmp
      Filesize

      24KB

    • memory/1368-4488-0x00000000029C0000-0x0000000002A00000-memory.dmp
      Filesize

      256KB

    • memory/1368-4486-0x00000000029C0000-0x0000000002A00000-memory.dmp
      Filesize

      256KB

    • memory/1368-4482-0x0000000000840000-0x000000000086E000-memory.dmp
      Filesize

      184KB

    • memory/1852-2313-0x00000000025D0000-0x0000000002638000-memory.dmp
      Filesize

      416KB

    • memory/1852-2314-0x0000000004DD0000-0x0000000004E36000-memory.dmp
      Filesize

      408KB

    • memory/1852-2739-0x0000000004E40000-0x0000000004E80000-memory.dmp
      Filesize

      256KB

    • memory/1852-2738-0x0000000000CA0000-0x0000000000CFB000-memory.dmp
      Filesize

      364KB

    • memory/1852-4463-0x0000000002690000-0x00000000026C2000-memory.dmp
      Filesize

      200KB

    • memory/1852-4464-0x0000000004E40000-0x0000000004E80000-memory.dmp
      Filesize

      256KB