Analysis

  • max time kernel
    104s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2023 01:10

General

  • Target

    9bb4a7d64395eb56aef589f16ff694958ed60ad525b3696332a7df66272741b8.exe

  • Size

    231KB

  • MD5

    a28ad2c321c3ac14c57d70b811a06ace

  • SHA1

    e35e5a9523ed16aa6b6075f3501132efa43decc4

  • SHA256

    9bb4a7d64395eb56aef589f16ff694958ed60ad525b3696332a7df66272741b8

  • SHA512

    01dfe93de5b2f6ff094fbcc362371b3ca87e751ce6faaab3035846e617e93263fa6872ffd567eea6c2713159963de9a70a416882b82142896e35596b2a19d625

  • SSDEEP

    3072:EUxJ5Cn63ubjtm+5SLThrdD9FAlF07ByTAexYO9RftoGiWHFK:NJ546evtLUv9dR6lKYTlYMtBH

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://onualituyrs.org/

http://sumagulituyo.org/

http://snukerukeutit.org/

http://lightseinsteniki.org/

http://liuliuoumumy.org/

http://stualialuyastrelia.net/

http://kumbuyartyty.net/

http://criogetikfenbut.org/

http://tonimiuyaytre.org/

http://tyiuiunuewqy.org/

http://humydrole.com/tmp/index.php

http://trunk-co.ru/tmp/index.php

http://weareelight.com/tmp/index.php

http://pirateking.online/tmp/index.php

http://piratia.pw/tmp/index.php

http://go-piratia.ru/tmp/index.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

57.128.155.22:20154

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

lumma

C2

http://opposesicknessopw.pw/api

Signatures

  • Detect ZGRat V1 3 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 10 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V2 payload 4 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bb4a7d64395eb56aef589f16ff694958ed60ad525b3696332a7df66272741b8.exe
    "C:\Users\Admin\AppData\Local\Temp\9bb4a7d64395eb56aef589f16ff694958ed60ad525b3696332a7df66272741b8.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3948
  • C:\Users\Admin\AppData\Local\Temp\7EDF.exe
    C:\Users\Admin\AppData\Local\Temp\7EDF.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      2⤵
        PID:3412
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 784
          3⤵
          • Program crash
          PID:2180
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        2⤵
          PID:2272
      • C:\Users\Admin\AppData\Local\Temp\82D8.exe
        C:\Users\Admin\AppData\Local\Temp\82D8.exe
        1⤵
        • Executes dropped EXE
        PID:4880
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 7300
          2⤵
          • Program crash
          PID:4768
      • C:\Windows\system32\regsvr32.exe
        regsvr32 /s C:\Users\Admin\AppData\Local\Temp\8886.dll
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:3988
        • C:\Windows\SysWOW64\regsvr32.exe
          /s C:\Users\Admin\AppData\Local\Temp\8886.dll
          2⤵
          • Loads dropped DLL
          PID:4428
      • C:\Users\Admin\AppData\Local\Temp\8DF6.exe
        C:\Users\Admin\AppData\Local\Temp\8DF6.exe
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of AdjustPrivilegeToken
        PID:4528
      • C:\Users\Admin\AppData\Local\Temp\8FDB.exe
        C:\Users\Admin\AppData\Local\Temp\8FDB.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4408
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          2⤵
            PID:1728
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            2⤵
              PID:3008
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              2⤵
                PID:5076
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1996
            • C:\Users\Admin\AppData\Local\Temp\9C21.exe
              C:\Users\Admin\AppData\Local\Temp\9C21.exe
              1⤵
              • Executes dropped EXE
              • Checks SCSI registry key(s)
              • Suspicious behavior: MapViewOfSection
              PID:4628
            • C:\Users\Admin\AppData\Local\Temp\A2F8.exe
              C:\Users\Admin\AppData\Local\Temp\A2F8.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4268
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4376
              • C:\Users\Admin\AppData\Local\Temp\A2F8.exe
                "C:\Users\Admin\AppData\Local\Temp\A2F8.exe"
                2⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Checks for VirtualBox DLLs, possible anti-VM trick
                • Drops file in Windows directory
                • Modifies data under HKEY_USERS
                • Suspicious use of WriteProcessMemory
                PID:3624
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  3⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2752
                • C:\Windows\system32\cmd.exe
                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:768
                  • C:\Windows\system32\netsh.exe
                    netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                    4⤵
                    • Modifies Windows Firewall
                    PID:4408
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  3⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1420
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  3⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2368
                • C:\Windows\rss\csrss.exe
                  C:\Windows\rss\csrss.exe
                  3⤵
                  • Executes dropped EXE
                  PID:3864
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    4⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4064
                  • C:\Windows\SYSTEM32\schtasks.exe
                    schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                    4⤵
                    • Creates scheduled task(s)
                    PID:3980
                  • C:\Windows\SYSTEM32\schtasks.exe
                    schtasks /delete /tn ScheduledUpdate /f
                    4⤵
                      PID:2728
                      • C:\Windows\System32\Conhost.exe
                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        5⤵
                          PID:4408
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        4⤵
                          PID:3884
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          4⤵
                            PID:3840
                          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                            4⤵
                              PID:4472
                            • C:\Windows\SYSTEM32\schtasks.exe
                              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                              4⤵
                              • Creates scheduled task(s)
                              PID:4516
                            • C:\Windows\windefender.exe
                              "C:\Windows\windefender.exe"
                              4⤵
                                PID:184
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                  5⤵
                                    PID:2872
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                      6⤵
                                      • Launches sc.exe
                                      PID:2168
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3412 -ip 3412
                            1⤵
                              PID:412
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4880 -ip 4880
                              1⤵
                                PID:768
                              • C:\Windows\windefender.exe
                                C:\Windows\windefender.exe
                                1⤵
                                  PID:2996

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\7EDF.exe

                                  Filesize

                                  5.1MB

                                  MD5

                                  7f4f98a26d4835578f46224112cc6a15

                                  SHA1

                                  c5cbaf07ef86ee77e7a079ece95e749e7b93a0f0

                                  SHA256

                                  c20f57c4db1ec145b3f2131677c80e8ceb88b11b81dbb1e7bf84983daf514276

                                  SHA512

                                  c2fe13271b35c799ea871b54f0d73a61a2ceed5b4f8fa7464bc758908f35185bfe1c43d38c54941c9fef18284334d61ddab506121d7d993ec87752a77eea8c5b

                                • C:\Users\Admin\AppData\Local\Temp\7EDF.exe

                                  Filesize

                                  5.1MB

                                  MD5

                                  7f4f98a26d4835578f46224112cc6a15

                                  SHA1

                                  c5cbaf07ef86ee77e7a079ece95e749e7b93a0f0

                                  SHA256

                                  c20f57c4db1ec145b3f2131677c80e8ceb88b11b81dbb1e7bf84983daf514276

                                  SHA512

                                  c2fe13271b35c799ea871b54f0d73a61a2ceed5b4f8fa7464bc758908f35185bfe1c43d38c54941c9fef18284334d61ddab506121d7d993ec87752a77eea8c5b

                                • C:\Users\Admin\AppData\Local\Temp\82D8.exe

                                  Filesize

                                  237KB

                                  MD5

                                  22a51b329fa194d51f68705a25d7396d

                                  SHA1

                                  aada03d8b7f1e28dbf6d72c1503981ccc5bb94da

                                  SHA256

                                  82857c5bbab91ba9c66bcd07c9f25c1b140e94fa892e97cc97db82fe06439742

                                  SHA512

                                  0d9a8a6b1df054a84bea0c4d38fd3c702f95c7d372bf2255c29611aec38fca5c81b972a2d45135a6488ba313d5674cf5e60e5bc7bdc888bb3524739e473ff821

                                • C:\Users\Admin\AppData\Local\Temp\82D8.exe

                                  Filesize

                                  237KB

                                  MD5

                                  22a51b329fa194d51f68705a25d7396d

                                  SHA1

                                  aada03d8b7f1e28dbf6d72c1503981ccc5bb94da

                                  SHA256

                                  82857c5bbab91ba9c66bcd07c9f25c1b140e94fa892e97cc97db82fe06439742

                                  SHA512

                                  0d9a8a6b1df054a84bea0c4d38fd3c702f95c7d372bf2255c29611aec38fca5c81b972a2d45135a6488ba313d5674cf5e60e5bc7bdc888bb3524739e473ff821

                                • C:\Users\Admin\AppData\Local\Temp\8886.dll

                                  Filesize

                                  4.1MB

                                  MD5

                                  184fc62aeb4c9d78891eb8d509c429e5

                                  SHA1

                                  4456d00e767b918a5118741985f2e1bc924b8e53

                                  SHA256

                                  6b2a111ace1e8469a99e2696a6313352cadf138f5b431d68fdb36a7268df1052

                                  SHA512

                                  100eb18ee1ef332862b668769fc64b37429df107873525b3ffcd5a8ccea8ad31fe57bba97cb103c2b444d62113a999a58f7743eb0b8266bb9ff8f116472d854b

                                • C:\Users\Admin\AppData\Local\Temp\8886.dll

                                  Filesize

                                  4.1MB

                                  MD5

                                  184fc62aeb4c9d78891eb8d509c429e5

                                  SHA1

                                  4456d00e767b918a5118741985f2e1bc924b8e53

                                  SHA256

                                  6b2a111ace1e8469a99e2696a6313352cadf138f5b431d68fdb36a7268df1052

                                  SHA512

                                  100eb18ee1ef332862b668769fc64b37429df107873525b3ffcd5a8ccea8ad31fe57bba97cb103c2b444d62113a999a58f7743eb0b8266bb9ff8f116472d854b

                                • C:\Users\Admin\AppData\Local\Temp\8DF6.exe

                                  Filesize

                                  3.0MB

                                  MD5

                                  f4cb9c8b7e02e8084008cd61e1899390

                                  SHA1

                                  af1a95a823a8c24cab9d8e8aaf46d69b3612dd4b

                                  SHA256

                                  a9ef0a36e9924f9742af01b648d7c89624e1e360716adb8fe7f58a6f28c4865e

                                  SHA512

                                  e808e95a5f57a13e61f8b77502f0f01c7faf66f2663d4de0b61a308f39520da8d649f32ed886edf446eefd88cf324854bcca059f8c0a6f46148388242e6b65b6

                                • C:\Users\Admin\AppData\Local\Temp\8DF6.exe

                                  Filesize

                                  3.0MB

                                  MD5

                                  f4cb9c8b7e02e8084008cd61e1899390

                                  SHA1

                                  af1a95a823a8c24cab9d8e8aaf46d69b3612dd4b

                                  SHA256

                                  a9ef0a36e9924f9742af01b648d7c89624e1e360716adb8fe7f58a6f28c4865e

                                  SHA512

                                  e808e95a5f57a13e61f8b77502f0f01c7faf66f2663d4de0b61a308f39520da8d649f32ed886edf446eefd88cf324854bcca059f8c0a6f46148388242e6b65b6

                                • C:\Users\Admin\AppData\Local\Temp\8FDB.exe

                                  Filesize

                                  439KB

                                  MD5

                                  b51bc8f85b7ba047b35022f505066b72

                                  SHA1

                                  4dd8e61f706c3057995a447d8f1c0c08f8ce6d9a

                                  SHA256

                                  fd7e4e6d5b75b5479a9c38e601d6cd2a89c33e65887e6fae2ca6b16735a32757

                                  SHA512

                                  7b00852c88bfee57e89415508e0c209faea3733402a6aafb9f87dccde21fe7af9f8f9b9717e6acad9be3c58a6d1d079331e1bb72faae3ce02ca98295966ac3cd

                                • C:\Users\Admin\AppData\Local\Temp\8FDB.exe

                                  Filesize

                                  439KB

                                  MD5

                                  b51bc8f85b7ba047b35022f505066b72

                                  SHA1

                                  4dd8e61f706c3057995a447d8f1c0c08f8ce6d9a

                                  SHA256

                                  fd7e4e6d5b75b5479a9c38e601d6cd2a89c33e65887e6fae2ca6b16735a32757

                                  SHA512

                                  7b00852c88bfee57e89415508e0c209faea3733402a6aafb9f87dccde21fe7af9f8f9b9717e6acad9be3c58a6d1d079331e1bb72faae3ce02ca98295966ac3cd

                                • C:\Users\Admin\AppData\Local\Temp\9C21.exe

                                  Filesize

                                  230KB

                                  MD5

                                  00452392bdddefba227d840c34ed5dc8

                                  SHA1

                                  0903a379718b9ce2b8c6484a071f57d2e21204e8

                                  SHA256

                                  047b2484182abae8c4cbb981ea1d4d809e86d9757c775bab0f3174272fe1797f

                                  SHA512

                                  aabf6db6d7878ea9c2ca862745eba26472d9b5a9fa6d9184418c412a628a24e8c2e591ab6b1feac0ed561a41f25c3a49f5c5c31c4788f0bf95505d609b76e61b

                                • C:\Users\Admin\AppData\Local\Temp\9C21.exe

                                  Filesize

                                  230KB

                                  MD5

                                  00452392bdddefba227d840c34ed5dc8

                                  SHA1

                                  0903a379718b9ce2b8c6484a071f57d2e21204e8

                                  SHA256

                                  047b2484182abae8c4cbb981ea1d4d809e86d9757c775bab0f3174272fe1797f

                                  SHA512

                                  aabf6db6d7878ea9c2ca862745eba26472d9b5a9fa6d9184418c412a628a24e8c2e591ab6b1feac0ed561a41f25c3a49f5c5c31c4788f0bf95505d609b76e61b

                                • C:\Users\Admin\AppData\Local\Temp\A2F8.exe

                                  Filesize

                                  4.1MB

                                  MD5

                                  54df004dce95fcdd3c9c45348cdd7e50

                                  SHA1

                                  e19d4d3c0c4b1ab495a18a045911e26fef5e97c5

                                  SHA256

                                  de1e23028fe33750a297a7ebace4f6db716d127edfd6f0938726fb7c2f9151cf

                                  SHA512

                                  c6d00978afc9863d6128aa5fe774d92157d410de37ab295ab73512a15901ad4899d88a23dd81f8e79bca3380f89486e0519593dfd0bf64f9a31ff7c23da1f3cf

                                • C:\Users\Admin\AppData\Local\Temp\A2F8.exe

                                  Filesize

                                  4.1MB

                                  MD5

                                  54df004dce95fcdd3c9c45348cdd7e50

                                  SHA1

                                  e19d4d3c0c4b1ab495a18a045911e26fef5e97c5

                                  SHA256

                                  de1e23028fe33750a297a7ebace4f6db716d127edfd6f0938726fb7c2f9151cf

                                  SHA512

                                  c6d00978afc9863d6128aa5fe774d92157d410de37ab295ab73512a15901ad4899d88a23dd81f8e79bca3380f89486e0519593dfd0bf64f9a31ff7c23da1f3cf

                                • C:\Users\Admin\AppData\Local\Temp\A2F8.exe

                                  Filesize

                                  4.1MB

                                  MD5

                                  54df004dce95fcdd3c9c45348cdd7e50

                                  SHA1

                                  e19d4d3c0c4b1ab495a18a045911e26fef5e97c5

                                  SHA256

                                  de1e23028fe33750a297a7ebace4f6db716d127edfd6f0938726fb7c2f9151cf

                                  SHA512

                                  c6d00978afc9863d6128aa5fe774d92157d410de37ab295ab73512a15901ad4899d88a23dd81f8e79bca3380f89486e0519593dfd0bf64f9a31ff7c23da1f3cf

                                • C:\Users\Admin\AppData\Local\Temp\Protect544cd51a.dll

                                  Filesize

                                  742KB

                                  MD5

                                  544cd51a596619b78e9b54b70088307d

                                  SHA1

                                  4769ddd2dbc1dc44b758964ed0bd231b85880b65

                                  SHA256

                                  dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd

                                  SHA512

                                  f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_l1kz0vg2.aeo.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                  Filesize

                                  281KB

                                  MD5

                                  d98e33b66343e7c96158444127a117f6

                                  SHA1

                                  bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                  SHA256

                                  5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                  SHA512

                                  705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                  Filesize

                                  281KB

                                  MD5

                                  d98e33b66343e7c96158444127a117f6

                                  SHA1

                                  bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                  SHA256

                                  5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                  SHA512

                                  705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                • C:\Users\Admin\AppData\Roaming\rdwwdfj

                                  Filesize

                                  230KB

                                  MD5

                                  00452392bdddefba227d840c34ed5dc8

                                  SHA1

                                  0903a379718b9ce2b8c6484a071f57d2e21204e8

                                  SHA256

                                  047b2484182abae8c4cbb981ea1d4d809e86d9757c775bab0f3174272fe1797f

                                  SHA512

                                  aabf6db6d7878ea9c2ca862745eba26472d9b5a9fa6d9184418c412a628a24e8c2e591ab6b1feac0ed561a41f25c3a49f5c5c31c4788f0bf95505d609b76e61b

                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                  Filesize

                                  2KB

                                  MD5

                                  968cb9309758126772781b83adb8a28f

                                  SHA1

                                  8da30e71accf186b2ba11da1797cf67f8f78b47c

                                  SHA256

                                  92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                  SHA512

                                  4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                  Filesize

                                  19KB

                                  MD5

                                  93880e4d38c8c7e341d4a5a6db7f3199

                                  SHA1

                                  55088ebc23413e7749699d428209dce6c6b8c5a4

                                  SHA256

                                  348a6bc2634f6cfd859320ee58f67502b33041fa93529844662440b5c9734ca9

                                  SHA512

                                  44514669375f16c04d1368947af25ce753eaf3235e97667d823b95c92548ccf3eb6aa22c5512fb9f1760ad3b5a9a6380e76586065c235ba16992d98e9f7c91a5

                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                  Filesize

                                  19KB

                                  MD5

                                  00fbf4b6047191bd0b837f610db578a9

                                  SHA1

                                  e4075a562b198ca1a981ba49a6dd389b0ec53558

                                  SHA256

                                  9332688ab7af8c03180773875a7b646a1e4b215a9b7bed93819ecee242c24d47

                                  SHA512

                                  b55e2b9ea3bd96b5d7df1c90ef5cfc6e89522a6e33d293b08e7e9408eb5980ff90d0b772da1d344f02bf4a3e14a7cf18fb37c9c8a13d4d53a655cccbe342db1c

                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                  Filesize

                                  19KB

                                  MD5

                                  b5e3e94087416d1167e4d19804cddbe5

                                  SHA1

                                  fb16f7b7d3df9f5e71c15f1f83250e92eccd80b9

                                  SHA256

                                  959a038550ad61072396f94d882f8e8475e545d18a35c720e108d8ee19078ed3

                                  SHA512

                                  63018004e33a476874825252bcb657f54d86af40a35b18091fabf15d9c17fd58d76d4bdf926c52cf24360d88b66f27ee59f4bcbdd3f05a9f625b7c60a75a728c

                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                  Filesize

                                  19KB

                                  MD5

                                  6242e64d24aaaec969007931db91c7a0

                                  SHA1

                                  5fc7722b059307a1212412018fe4c1592d46f589

                                  SHA256

                                  973f88364de62f2136ca1f2bccf5127a2cf978a004d9a8527d67dfffda044f23

                                  SHA512

                                  631b8d00a4cd3e0ca8010dddd7cd13e477212e5fd277b1cfcbde706d054bf85321ee2d85ccca6a0a40fbabb6e0c6ed8597881ddaec352e87480b909c42d3b40d

                                • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                  Filesize

                                  19KB

                                  MD5

                                  e7de8e1cce1800719c1f041567eda7bf

                                  SHA1

                                  5fccd9f3aef0cf5537eb5128884f0710713a8cc1

                                  SHA256

                                  82e5d8e4f485559aa948e3a43b72c7802079bbb28cd25ed5041e6041429d9f3f

                                  SHA512

                                  f1aad6f160727bfcd5e94a2faa83be485768fd61285297eaed72f558e4b6e2a58e912be3e1f2b499540246b38ad357c3e510ab926bd27e0406ce3cfe4419bc75

                                • C:\Windows\rss\csrss.exe

                                  Filesize

                                  4.1MB

                                  MD5

                                  54df004dce95fcdd3c9c45348cdd7e50

                                  SHA1

                                  e19d4d3c0c4b1ab495a18a045911e26fef5e97c5

                                  SHA256

                                  de1e23028fe33750a297a7ebace4f6db716d127edfd6f0938726fb7c2f9151cf

                                  SHA512

                                  c6d00978afc9863d6128aa5fe774d92157d410de37ab295ab73512a15901ad4899d88a23dd81f8e79bca3380f89486e0519593dfd0bf64f9a31ff7c23da1f3cf

                                • C:\Windows\rss\csrss.exe

                                  Filesize

                                  4.1MB

                                  MD5

                                  54df004dce95fcdd3c9c45348cdd7e50

                                  SHA1

                                  e19d4d3c0c4b1ab495a18a045911e26fef5e97c5

                                  SHA256

                                  de1e23028fe33750a297a7ebace4f6db716d127edfd6f0938726fb7c2f9151cf

                                  SHA512

                                  c6d00978afc9863d6128aa5fe774d92157d410de37ab295ab73512a15901ad4899d88a23dd81f8e79bca3380f89486e0519593dfd0bf64f9a31ff7c23da1f3cf

                                • C:\Windows\windefender.exe

                                  Filesize

                                  2.0MB

                                  MD5

                                  8e67f58837092385dcf01e8a2b4f5783

                                  SHA1

                                  012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                  SHA256

                                  166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                  SHA512

                                  40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                • C:\Windows\windefender.exe

                                  Filesize

                                  2.0MB

                                  MD5

                                  8e67f58837092385dcf01e8a2b4f5783

                                  SHA1

                                  012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                  SHA256

                                  166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                  SHA512

                                  40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                • C:\Windows\windefender.exe

                                  Filesize

                                  2.0MB

                                  MD5

                                  8e67f58837092385dcf01e8a2b4f5783

                                  SHA1

                                  012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                  SHA256

                                  166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                  SHA512

                                  40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                • memory/436-135-0x0000000005890000-0x00000000058A0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/436-64-0x00000000062B0000-0x0000000006854000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/436-127-0x0000000006A30000-0x0000000006C58000-memory.dmp

                                  Filesize

                                  2.2MB

                                • memory/436-66-0x0000000005E00000-0x0000000005E92000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/436-71-0x00000000060D0000-0x000000000616C000-memory.dmp

                                  Filesize

                                  624KB

                                • memory/436-105-0x0000000075180000-0x0000000075930000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/436-128-0x0000000007DA0000-0x0000000007F32000-memory.dmp

                                  Filesize

                                  1.6MB

                                • memory/436-87-0x0000000006190000-0x000000000619A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/436-59-0x0000000000ED0000-0x00000000013E4000-memory.dmp

                                  Filesize

                                  5.1MB

                                • memory/436-58-0x0000000075180000-0x0000000075930000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/1996-100-0x0000000075180000-0x0000000075930000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/1996-101-0x00000000075C0000-0x00000000075D0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1996-115-0x00000000080A0000-0x00000000080EC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/1996-99-0x0000000000400000-0x000000000043C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/3340-46-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-27-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-4-0x0000000002390000-0x00000000023A6000-memory.dmp

                                  Filesize

                                  88KB

                                • memory/3340-12-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-13-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-72-0x0000000002680000-0x0000000002690000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-44-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-14-0x0000000002640000-0x0000000002650000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-356-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-45-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-355-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-37-0x0000000002640000-0x0000000002650000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-38-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-353-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-352-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-351-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-42-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-346-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-89-0x0000000002680000-0x0000000002690000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-350-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-348-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-343-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-341-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-43-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-39-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-41-0x0000000002680000-0x0000000002690000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-40-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-36-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-35-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-338-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-335-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-330-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-15-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-33-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-31-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-16-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-17-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-19-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-29-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-18-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-21-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-23-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-24-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-25-0x0000000002680000-0x0000000002690000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-123-0x0000000007B90000-0x0000000007BA6000-memory.dmp

                                  Filesize

                                  88KB

                                • memory/3340-26-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3340-28-0x0000000002620000-0x0000000002630000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3412-141-0x0000000000400000-0x000000000047E000-memory.dmp

                                  Filesize

                                  504KB

                                • memory/3412-143-0x0000000000400000-0x000000000047E000-memory.dmp

                                  Filesize

                                  504KB

                                • memory/3412-146-0x0000000000400000-0x000000000047E000-memory.dmp

                                  Filesize

                                  504KB

                                • memory/3624-310-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/3624-267-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/3624-329-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/3864-406-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/3864-375-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/3948-5-0x0000000000400000-0x000000000085C000-memory.dmp

                                  Filesize

                                  4.4MB

                                • memory/3948-8-0x00000000025A0000-0x00000000025AB000-memory.dmp

                                  Filesize

                                  44KB

                                • memory/3948-1-0x0000000000870000-0x0000000000970000-memory.dmp

                                  Filesize

                                  1024KB

                                • memory/3948-2-0x00000000025A0000-0x00000000025AB000-memory.dmp

                                  Filesize

                                  44KB

                                • memory/3948-3-0x0000000000400000-0x000000000085C000-memory.dmp

                                  Filesize

                                  4.4MB

                                • memory/4268-120-0x0000000002E30000-0x000000000371B000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/4268-216-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/4268-119-0x0000000002A30000-0x0000000002E2A000-memory.dmp

                                  Filesize

                                  4.0MB

                                • memory/4268-221-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/4268-163-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/4268-122-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                  Filesize

                                  9.1MB

                                • memory/4428-156-0x0000000002E90000-0x0000000002FB7000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/4428-154-0x0000000002D40000-0x0000000002E83000-memory.dmp

                                  Filesize

                                  1.3MB

                                • memory/4428-69-0x0000000010000000-0x0000000010418000-memory.dmp

                                  Filesize

                                  4.1MB

                                • memory/4428-160-0x0000000002E90000-0x0000000002FB7000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/4428-73-0x0000000000FE0000-0x0000000000FE6000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/4428-159-0x0000000002E90000-0x0000000002FB7000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/4528-83-0x0000000075DA0000-0x0000000075E90000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/4528-114-0x00000000086C0000-0x00000000086FC000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/4528-136-0x0000000000CA0000-0x0000000001532000-memory.dmp

                                  Filesize

                                  8.6MB

                                • memory/4528-103-0x00000000094C0000-0x0000000009AD8000-memory.dmp

                                  Filesize

                                  6.1MB

                                • memory/4528-94-0x0000000000CA0000-0x0000000001532000-memory.dmp

                                  Filesize

                                  8.6MB

                                • memory/4528-86-0x0000000075DA0000-0x0000000075E90000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/4528-91-0x0000000077C94000-0x0000000077C96000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/4528-90-0x0000000075DA0000-0x0000000075E90000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/4528-88-0x0000000075DA0000-0x0000000075E90000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/4528-85-0x0000000075DA0000-0x0000000075E90000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/4528-84-0x0000000075DA0000-0x0000000075E90000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/4528-137-0x0000000075DA0000-0x0000000075E90000-memory.dmp

                                  Filesize

                                  960KB

                                • memory/4528-78-0x0000000000CA0000-0x0000000001532000-memory.dmp

                                  Filesize

                                  8.6MB

                                • memory/4528-107-0x0000000008730000-0x000000000883A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/4528-109-0x0000000008660000-0x0000000008672000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/4628-112-0x0000000002460000-0x000000000246B000-memory.dmp

                                  Filesize

                                  44KB

                                • memory/4628-113-0x0000000000400000-0x000000000085C000-memory.dmp

                                  Filesize

                                  4.4MB

                                • memory/4628-108-0x0000000000AC0000-0x0000000000BC0000-memory.dmp

                                  Filesize

                                  1024KB

                                • memory/4628-125-0x0000000000400000-0x000000000085C000-memory.dmp

                                  Filesize

                                  4.4MB

                                • memory/4880-117-0x0000000000400000-0x000000000085E000-memory.dmp

                                  Filesize

                                  4.4MB

                                • memory/4880-61-0x00000000008C0000-0x00000000009C0000-memory.dmp

                                  Filesize

                                  1024KB

                                • memory/4880-118-0x00000000008C0000-0x00000000009C0000-memory.dmp

                                  Filesize

                                  1024KB

                                • memory/4880-63-0x0000000000400000-0x000000000085E000-memory.dmp

                                  Filesize

                                  4.4MB

                                • memory/4880-62-0x00000000009E0000-0x00000000009F6000-memory.dmp

                                  Filesize

                                  88KB