Analysis

  • max time kernel
    108s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-09-2023 21:38

General

  • Target

    1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f.exe

  • Size

    247KB

  • MD5

    d9fd9682ec83472fff7d75b829eb725f

  • SHA1

    205d18239718414906f08b39adbdff9c853a4fc2

  • SHA256

    1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f

  • SHA512

    92f58331a99ae384097869632ee816f79bca0e6cf5af25f17656d68b2f6a8db970f23878156f869a118c95ac99ea1ef83405a4fe9c35d2060fea64b814edc1f3

  • SSDEEP

    6144:bEfWUAz6DCGbAR/VeDC1tAOCcC0urBiIg:bkAzaC+UjljurBiIg

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

amadey

Version

3.83

C2

http://5.42.65.80/8bmeVwqx/index.php

Attributes
  • install_dir

    207aa4515d

  • install_file

    oneetx.exe

  • strings_key

    3e634dd0840c68ae2ced83c2be7bf0d4

rc4.plain

Extracted

Family

redline

Botnet

amadey_api

C2

amadapi.tuktuk.ug:11290

Attributes
  • auth_value

    a004bea47cf55a1c8841d46c3fe3e6f5

Extracted

Family

laplas

C2

http://lpls.tuktuk.ug

Attributes
  • api_key

    a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3136
    • C:\Users\Admin\AppData\Local\Temp\1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f.exe
      "C:\Users\Admin\AppData\Local\Temp\1c244c574949b8cd43fd670a8512a22f2ab5de50007519f9fc418e99bad40c5f.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:2988
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 152
        3⤵
        • Program crash
        PID:3484
    • C:\Users\Admin\AppData\Local\Temp\6B48.exe
      C:\Users\Admin\AppData\Local\Temp\6B48.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4964
    • C:\Users\Admin\AppData\Local\Temp\6EC3.exe
      C:\Users\Admin\AppData\Local\Temp\6EC3.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3380
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4704
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:808
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3608
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:320
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:2684
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3848
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\207aa4515d" /P "Admin:N"
                    5⤵
                      PID:5116
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\207aa4515d" /P "Admin:R" /E
                      5⤵
                        PID:4932
                    • C:\Users\Admin\AppData\Local\Temp\1000457001\latestX.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000457001\latestX.exe"
                      4⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Drops file in Drivers directory
                      • Executes dropped EXE
                      PID:4612
                    • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:3828
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                        5⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2468
                    • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe"
                      4⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Checks whether UAC is enabled
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious use of WriteProcessMemory
                      PID:4044
                      • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                        C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
                        5⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Checks whether UAC is enabled
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:4132
                    • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe"
                      4⤵
                      • Executes dropped EXE
                      PID:4516
                • C:\Users\Admin\AppData\Local\Temp\70C8.exe
                  C:\Users\Admin\AppData\Local\Temp\70C8.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1368
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                  2⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1972
                • C:\Windows\System32\cmd.exe
                  C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5072
                  • C:\Windows\System32\sc.exe
                    sc stop UsoSvc
                    3⤵
                    • Launches sc.exe
                    PID:4668
                  • C:\Windows\System32\sc.exe
                    sc stop WaaSMedicSvc
                    3⤵
                    • Launches sc.exe
                    PID:2372
                  • C:\Windows\System32\sc.exe
                    sc stop wuauserv
                    3⤵
                    • Launches sc.exe
                    PID:2448
                  • C:\Windows\System32\sc.exe
                    sc stop bits
                    3⤵
                    • Launches sc.exe
                    PID:4696
                  • C:\Windows\System32\sc.exe
                    sc stop dosvc
                    3⤵
                    • Launches sc.exe
                    PID:1932
                • C:\Windows\System32\cmd.exe
                  C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                  2⤵
                    PID:4340
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -hibernate-timeout-ac 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1548
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -hibernate-timeout-dc 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4744
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -standby-timeout-ac 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1272
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -standby-timeout-dc 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4600
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3132
                  • C:\Windows\System32\schtasks.exe
                    C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                    2⤵
                      PID:4540
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                      2⤵
                        PID:4028
                      • C:\Windows\System32\cmd.exe
                        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                        2⤵
                          PID:2028
                          • C:\Windows\System32\sc.exe
                            sc stop UsoSvc
                            3⤵
                            • Launches sc.exe
                            PID:3116
                          • C:\Windows\System32\sc.exe
                            sc stop WaaSMedicSvc
                            3⤵
                            • Launches sc.exe
                            PID:1912
                          • C:\Windows\System32\sc.exe
                            sc stop wuauserv
                            3⤵
                            • Launches sc.exe
                            PID:3560
                          • C:\Windows\System32\sc.exe
                            sc stop bits
                            3⤵
                            • Launches sc.exe
                            PID:2020
                          • C:\Windows\System32\sc.exe
                            sc stop dosvc
                            3⤵
                            • Launches sc.exe
                            PID:4500
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                          2⤵
                            PID:3840
                          • C:\Windows\System32\cmd.exe
                            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                            2⤵
                              PID:4508
                              • C:\Windows\System32\powercfg.exe
                                powercfg /x -hibernate-timeout-ac 0
                                3⤵
                                  PID:3976
                                • C:\Windows\System32\powercfg.exe
                                  powercfg /x -hibernate-timeout-dc 0
                                  3⤵
                                    PID:628
                                  • C:\Windows\System32\powercfg.exe
                                    powercfg /x -standby-timeout-ac 0
                                    3⤵
                                      PID:2156
                                    • C:\Windows\System32\powercfg.exe
                                      powercfg /x -standby-timeout-dc 0
                                      3⤵
                                        PID:4900
                                    • C:\Windows\System32\schtasks.exe
                                      C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                      2⤵
                                        PID:1568
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                        2⤵
                                          PID:5016
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3608 -ip 3608
                                        1⤵
                                          PID:4408
                                        • C:\Program Files\Google\Chrome\updater.exe
                                          "C:\Program Files\Google\Chrome\updater.exe"
                                          1⤵
                                            PID:3112
                                          • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                                            C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                                            1⤵
                                              PID:3608

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Program Files\Google\Chrome\updater.exe

                                              Filesize

                                              5.6MB

                                              MD5

                                              bae29e49e8190bfbbf0d77ffab8de59d

                                              SHA1

                                              4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                              SHA256

                                              f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                              SHA512

                                              9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vbc.exe.log

                                              Filesize

                                              2KB

                                              MD5

                                              9cbca2a895534f39fb0c6e12b43469d1

                                              SHA1

                                              1391323f936359e7fe7a610e43018b4677603cb1

                                              SHA256

                                              646ce19104c8ee217cabe6ed69d84ffffdf114eff9ecfbe35163a3e96e5aa1cd

                                              SHA512

                                              1cceac4aa4d45fa92bd6dc4d44241c1086628a696cf69ec49f29cd761fa85f48aa45227937c7f5b068d746da10f68e4e6dba4ab30566a86bdab1ed5808259d4f

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              944B

                                              MD5

                                              6d3e9c29fe44e90aae6ed30ccf799ca8

                                              SHA1

                                              c7974ef72264bbdf13a2793ccf1aed11bc565dce

                                              SHA256

                                              2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

                                              SHA512

                                              60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              949a7f7951f74f017842db97b3d6d281

                                              SHA1

                                              325e4e12d8219106518730cd75f973d244a0d071

                                              SHA256

                                              95a4d75944d486fea07a9ac6296867540e62564f1f611d5eb763acadad7eb321

                                              SHA512

                                              7bf8027bf30d88afe5046a171924339019b5e92d6033074c0fd177029425e0e1e468c5d48bbd7e1ecc60a45a2c4d3790a96a20890b03437c073aa1829aef941d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              944B

                                              MD5

                                              6d3e9c29fe44e90aae6ed30ccf799ca8

                                              SHA1

                                              c7974ef72264bbdf13a2793ccf1aed11bc565dce

                                              SHA256

                                              2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

                                              SHA512

                                              60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

                                            • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              16b159683dbd42129859e26f5eb38761

                                              SHA1

                                              32352e4d8c4aac9059d4d36fa0f09a3b4a1be280

                                              SHA256

                                              599f373efcca773f12804c80c5399343e596d71d3aa8794c8230256f420b4086

                                              SHA512

                                              1a5630710cea2808dda8155d6d8c89ea7dcce5b0624e89e3fbc80fbd9dd8098d533ab12d5e0cb8fb8aeb98f9bca3a1d40feac613400e7557c990d1757b66bd85

                                            • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              16b159683dbd42129859e26f5eb38761

                                              SHA1

                                              32352e4d8c4aac9059d4d36fa0f09a3b4a1be280

                                              SHA256

                                              599f373efcca773f12804c80c5399343e596d71d3aa8794c8230256f420b4086

                                              SHA512

                                              1a5630710cea2808dda8155d6d8c89ea7dcce5b0624e89e3fbc80fbd9dd8098d533ab12d5e0cb8fb8aeb98f9bca3a1d40feac613400e7557c990d1757b66bd85

                                            • C:\Users\Admin\AppData\Local\Temp\1000397001\taskhost.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              16b159683dbd42129859e26f5eb38761

                                              SHA1

                                              32352e4d8c4aac9059d4d36fa0f09a3b4a1be280

                                              SHA256

                                              599f373efcca773f12804c80c5399343e596d71d3aa8794c8230256f420b4086

                                              SHA512

                                              1a5630710cea2808dda8155d6d8c89ea7dcce5b0624e89e3fbc80fbd9dd8098d533ab12d5e0cb8fb8aeb98f9bca3a1d40feac613400e7557c990d1757b66bd85

                                            • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe

                                              Filesize

                                              2.6MB

                                              MD5

                                              3f821e69fe1b38097b29ac284016858a

                                              SHA1

                                              3995cad76f1313243e5c8abce901876638575341

                                              SHA256

                                              203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08

                                              SHA512

                                              704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7

                                            • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe

                                              Filesize

                                              2.6MB

                                              MD5

                                              3f821e69fe1b38097b29ac284016858a

                                              SHA1

                                              3995cad76f1313243e5c8abce901876638575341

                                              SHA256

                                              203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08

                                              SHA512

                                              704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7

                                            • C:\Users\Admin\AppData\Local\Temp\1000398001\winlog.exe

                                              Filesize

                                              2.6MB

                                              MD5

                                              3f821e69fe1b38097b29ac284016858a

                                              SHA1

                                              3995cad76f1313243e5c8abce901876638575341

                                              SHA256

                                              203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08

                                              SHA512

                                              704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7

                                            • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe

                                              Filesize

                                              7.0MB

                                              MD5

                                              07f52cda25a10e6415a09e2ab5c10424

                                              SHA1

                                              8bfd738a7d2ecced62d381921a2bfb46bbf00dfe

                                              SHA256

                                              b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff

                                              SHA512

                                              9a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65

                                            • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe

                                              Filesize

                                              7.0MB

                                              MD5

                                              07f52cda25a10e6415a09e2ab5c10424

                                              SHA1

                                              8bfd738a7d2ecced62d381921a2bfb46bbf00dfe

                                              SHA256

                                              b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff

                                              SHA512

                                              9a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65

                                            • C:\Users\Admin\AppData\Local\Temp\1000399001\msedge.exe

                                              Filesize

                                              7.0MB

                                              MD5

                                              07f52cda25a10e6415a09e2ab5c10424

                                              SHA1

                                              8bfd738a7d2ecced62d381921a2bfb46bbf00dfe

                                              SHA256

                                              b46eb278ef9b1b5f83b5ef248db0bedd34cddfd570c5206088d3ed30c876abff

                                              SHA512

                                              9a4f89c4172a917f333b086277b9c78e96a64a372bb235ec3ff22bb689b359337139f375ed2cff5f9d3c3adee82fccaa8b4fdecc8486437a109ce9941edf4f65

                                            • C:\Users\Admin\AppData\Local\Temp\1000457001\latestX.exe

                                              Filesize

                                              5.6MB

                                              MD5

                                              bae29e49e8190bfbbf0d77ffab8de59d

                                              SHA1

                                              4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                              SHA256

                                              f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                              SHA512

                                              9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                            • C:\Users\Admin\AppData\Local\Temp\1000457001\latestX.exe

                                              Filesize

                                              5.6MB

                                              MD5

                                              bae29e49e8190bfbbf0d77ffab8de59d

                                              SHA1

                                              4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                              SHA256

                                              f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                              SHA512

                                              9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                            • C:\Users\Admin\AppData\Local\Temp\1000457001\latestX.exe

                                              Filesize

                                              5.6MB

                                              MD5

                                              bae29e49e8190bfbbf0d77ffab8de59d

                                              SHA1

                                              4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                              SHA256

                                              f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                              SHA512

                                              9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                            • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                                              Filesize

                                              198KB

                                              MD5

                                              a64a886a695ed5fb9273e73241fec2f7

                                              SHA1

                                              363244ca05027c5beb938562df5b525a2428b405

                                              SHA256

                                              563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                              SHA512

                                              122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                            • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                                              Filesize

                                              198KB

                                              MD5

                                              a64a886a695ed5fb9273e73241fec2f7

                                              SHA1

                                              363244ca05027c5beb938562df5b525a2428b405

                                              SHA256

                                              563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                              SHA512

                                              122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                            • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                                              Filesize

                                              198KB

                                              MD5

                                              a64a886a695ed5fb9273e73241fec2f7

                                              SHA1

                                              363244ca05027c5beb938562df5b525a2428b405

                                              SHA256

                                              563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                              SHA512

                                              122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                            • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe

                                              Filesize

                                              198KB

                                              MD5

                                              a64a886a695ed5fb9273e73241fec2f7

                                              SHA1

                                              363244ca05027c5beb938562df5b525a2428b405

                                              SHA256

                                              563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                              SHA512

                                              122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                            • C:\Users\Admin\AppData\Local\Temp\6B48.exe

                                              Filesize

                                              1.2MB

                                              MD5

                                              1a18fc4db3affaacf43f4022df7a2c32

                                              SHA1

                                              2ef240262c43bdd5f6a9db9f7e6abb1e408366ba

                                              SHA256

                                              b76a4488c5fa797828b85f998054f6e879b4c213d639f4501c725337b71e6c32

                                              SHA512

                                              be7ea1afa780dbe8bf70141566de147493bd6c276c64b45431e4ef3c46aecb5be28cea63f3a56188ba075b8aaae4edc400c0b07b6c05da0f4ce02a4ff5519069

                                            • C:\Users\Admin\AppData\Local\Temp\6B48.exe

                                              Filesize

                                              1.2MB

                                              MD5

                                              1a18fc4db3affaacf43f4022df7a2c32

                                              SHA1

                                              2ef240262c43bdd5f6a9db9f7e6abb1e408366ba

                                              SHA256

                                              b76a4488c5fa797828b85f998054f6e879b4c213d639f4501c725337b71e6c32

                                              SHA512

                                              be7ea1afa780dbe8bf70141566de147493bd6c276c64b45431e4ef3c46aecb5be28cea63f3a56188ba075b8aaae4edc400c0b07b6c05da0f4ce02a4ff5519069

                                            • C:\Users\Admin\AppData\Local\Temp\6EC3.exe

                                              Filesize

                                              198KB

                                              MD5

                                              a64a886a695ed5fb9273e73241fec2f7

                                              SHA1

                                              363244ca05027c5beb938562df5b525a2428b405

                                              SHA256

                                              563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                              SHA512

                                              122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                            • C:\Users\Admin\AppData\Local\Temp\6EC3.exe

                                              Filesize

                                              198KB

                                              MD5

                                              a64a886a695ed5fb9273e73241fec2f7

                                              SHA1

                                              363244ca05027c5beb938562df5b525a2428b405

                                              SHA256

                                              563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                                              SHA512

                                              122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                                            • C:\Users\Admin\AppData\Local\Temp\70C8.exe

                                              Filesize

                                              341KB

                                              MD5

                                              8669fe397a7225ede807202f6a9d8390

                                              SHA1

                                              04a806a5c4218cb703cba85d3e636d0c8cbae043

                                              SHA256

                                              1624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e

                                              SHA512

                                              29cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45

                                            • C:\Users\Admin\AppData\Local\Temp\70C8.exe

                                              Filesize

                                              341KB

                                              MD5

                                              8669fe397a7225ede807202f6a9d8390

                                              SHA1

                                              04a806a5c4218cb703cba85d3e636d0c8cbae043

                                              SHA256

                                              1624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e

                                              SHA512

                                              29cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dlbhv4v2.xqx.ps1

                                              Filesize

                                              60B

                                              MD5

                                              d17fe0a3f47be24a6453e9ef58c94641

                                              SHA1

                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                              SHA256

                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                              SHA512

                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                            • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

                                              Filesize

                                              660.1MB

                                              MD5

                                              2a99958c093c9bf8f0b3198347749cec

                                              SHA1

                                              2a8daecef93f11c48035a667a0238b4c4b072d4f

                                              SHA256

                                              5deecea64e287c0b4e314a532865f61c0875059b42558e02547099a7958b6216

                                              SHA512

                                              142948c95dde8ea0dcebe46e9db29c46dd6202bc7c769577b1c612ab7e0d9d8d1c388265cd0c006e9f9762942922ba09464adb5ead7b6b633bf42d8d22618c8b

                                            • C:\Windows\System32\drivers\etc\hosts

                                              Filesize

                                              3KB

                                              MD5

                                              00930b40cba79465b7a38ed0449d1449

                                              SHA1

                                              4b25a89ee28b20ba162f23772ddaf017669092a5

                                              SHA256

                                              eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                                              SHA512

                                              cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                                            • memory/1368-74-0x0000000007E90000-0x0000000007EA0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1368-133-0x0000000074D50000-0x0000000075500000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/1368-69-0x0000000074D50000-0x0000000075500000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/1368-155-0x0000000007E90000-0x0000000007EA0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1368-208-0x0000000074D50000-0x0000000075500000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/1368-68-0x0000000000E70000-0x0000000000ECA000-memory.dmp

                                              Filesize

                                              360KB

                                            • memory/2468-145-0x0000000074D50000-0x0000000075500000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/2468-126-0x0000000000400000-0x0000000000430000-memory.dmp

                                              Filesize

                                              192KB

                                            • memory/2468-204-0x0000000074D50000-0x0000000075500000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/2816-50-0x0000000000050000-0x00000000001DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2816-56-0x0000000000050000-0x00000000001DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2816-49-0x0000000000050000-0x00000000001DE000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2988-1-0x0000000000400000-0x0000000000409000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/2988-0-0x0000000000400000-0x0000000000409000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/2988-3-0x0000000000400000-0x0000000000409000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/3136-21-0x00000000032E0000-0x00000000032F0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-219-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-2-0x0000000001280000-0x0000000001296000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/3136-31-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-6-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-7-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-22-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-14-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-28-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-8-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-26-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-24-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-44-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-235-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-230-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-228-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-229-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-226-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-32-0x00000000032E0000-0x00000000032F0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-30-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-19-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-18-0x00000000032E0000-0x00000000032F0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-17-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-16-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-217-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-33-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-214-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-20-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-213-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-37-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-13-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-38-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-12-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-210-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-39-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-41-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-43-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-9-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-10-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3136-11-0x00000000012F0000-0x0000000001300000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3828-131-0x00000000008C0000-0x0000000000A1C000-memory.dmp

                                              Filesize

                                              1.4MB

                                            • memory/3828-125-0x00000000008C0000-0x0000000000A1C000-memory.dmp

                                              Filesize

                                              1.4MB

                                            • memory/3828-123-0x00000000008C0000-0x0000000000A1C000-memory.dmp

                                              Filesize

                                              1.4MB

                                            • memory/4044-211-0x0000000000550000-0x0000000000DB8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/4044-197-0x00007FFB7E070000-0x00007FFB7E265000-memory.dmp

                                              Filesize

                                              2.0MB

                                            • memory/4044-254-0x0000000000550000-0x0000000000DB8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/4044-174-0x0000000000550000-0x0000000000DB8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/4044-175-0x0000000000550000-0x0000000000DB8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/4044-178-0x0000000000550000-0x0000000000DB8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/4044-184-0x0000000000550000-0x0000000000DB8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/4044-153-0x0000000000550000-0x0000000000DB8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/4044-159-0x00007FFB00000000-0x00007FFB00002000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/4044-157-0x00007FFB7B8A0000-0x00007FFB7BB69000-memory.dmp

                                              Filesize

                                              2.8MB

                                            • memory/4044-162-0x0000000000550000-0x0000000000DB8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/4044-164-0x0000000000550000-0x0000000000DB8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/4044-161-0x0000000000550000-0x0000000000DB8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/4044-195-0x0000000000550000-0x0000000000DB8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/4044-163-0x0000000000550000-0x0000000000DB8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/4044-160-0x00007FFB00030000-0x00007FFB00031000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4044-203-0x0000000000550000-0x0000000000DB8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/4044-156-0x00007FFB7B8A0000-0x00007FFB7BB69000-memory.dmp

                                              Filesize

                                              2.8MB

                                            • memory/4044-158-0x0000000000550000-0x0000000000DB8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/4516-196-0x000001D647920000-0x000001D647961000-memory.dmp

                                              Filesize

                                              260KB

                                            • memory/4516-200-0x00007FF6E35E0000-0x00007FF6E3FF2000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/4516-192-0x00007FF6E35E0000-0x00007FF6E3FF2000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/4612-202-0x00007FF61BA10000-0x00007FF61BFB1000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/4964-87-0x00000000082C0000-0x0000000008326000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/4964-75-0x0000000007AD0000-0x0000000007BDA000-memory.dmp

                                              Filesize

                                              1.0MB

                                            • memory/4964-103-0x0000000006400000-0x0000000006450000-memory.dmp

                                              Filesize

                                              320KB

                                            • memory/4964-91-0x0000000009370000-0x000000000938E000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/4964-90-0x0000000009B40000-0x000000000A06C000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/4964-89-0x0000000009440000-0x0000000009602000-memory.dmp

                                              Filesize

                                              1.8MB

                                            • memory/4964-88-0x00000000091F0000-0x0000000009266000-memory.dmp

                                              Filesize

                                              472KB

                                            • memory/4964-154-0x0000000007990000-0x00000000079A0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4964-78-0x0000000007A00000-0x0000000007A3C000-memory.dmp

                                              Filesize

                                              240KB

                                            • memory/4964-206-0x0000000074D50000-0x0000000075500000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/4964-132-0x0000000074D50000-0x0000000075500000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/4964-73-0x00000000079A0000-0x00000000079B2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/4964-72-0x00000000087D0000-0x0000000008DE8000-memory.dmp

                                              Filesize

                                              6.1MB

                                            • memory/4964-70-0x00000000078B0000-0x00000000078BA000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/4964-71-0x0000000007990000-0x00000000079A0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4964-66-0x0000000007700000-0x0000000007792000-memory.dmp

                                              Filesize

                                              584KB

                                            • memory/4964-62-0x0000000007C00000-0x00000000081A4000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/4964-57-0x0000000074D50000-0x0000000075500000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/4964-51-0x0000000000400000-0x000000000045A000-memory.dmp

                                              Filesize

                                              360KB