Analysis

  • max time kernel
    145s
  • max time network
    155s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240319-en
  • resource tags

    arch:x64arch:x86image:win11-20240319-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-03-2024 13:52

General

  • Target

    8e38e6533fc45d517e8e8e4c4160e7755f5be8664662af548348bc26b6265510.exe

  • Size

    1.8MB

  • MD5

    98d82ae39805e00fb07bdcc5a870fce1

  • SHA1

    7e2a70529ab5c5717608fa27396e9bc48c2fbc52

  • SHA256

    8e38e6533fc45d517e8e8e4c4160e7755f5be8664662af548348bc26b6265510

  • SHA512

    09b78bb8345631d8c1516bd669918ab4e61de79fc948f90b520b0d57ec1af09d57f568dc1eb222ce02ad7397209df3214a100cc535f2c6bdb3bd4bd3697bf169

  • SSDEEP

    49152:I4jUYFUvJF8L0Fd4dpGPNiONOJRO1THrqpews+:3jPF8i4XMkbWR4rqo+

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

4.185.137.132:1632

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

185.172.128.33:8970

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 17 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 15 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e38e6533fc45d517e8e8e4c4160e7755f5be8664662af548348bc26b6265510.exe
    "C:\Users\Admin\AppData\Local\Temp\8e38e6533fc45d517e8e8e4c4160e7755f5be8664662af548348bc26b6265510.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    PID:256
  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3892
    • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe
      "C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3412
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:4436
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 1160
            4⤵
            • Program crash
            PID:4800
      • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe
        "C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3916
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
            PID:2960
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:6052
        • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
          "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
          2⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          PID:3008
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:5792
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1156
            • C:\Windows\system32\netsh.exe
              netsh wlan show profiles
              4⤵
                PID:4440
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\233663403127_Desktop.zip' -CompressionLevel Optimal
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2868
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
            2⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            PID:5932
          • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe
            "C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"
            2⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1472
            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
              "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:5656
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                4⤵
                • Loads dropped DLL
                PID:5104
                • C:\Windows\system32\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                  5⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3356
                  • C:\Windows\system32\netsh.exe
                    netsh wlan show profiles
                    6⤵
                      PID:5828
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\233663403127_Desktop.zip' -CompressionLevel Optimal
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3512
                • C:\Windows\SysWOW64\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                  4⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  PID:5280
            • C:\Users\Admin\AppData\Local\Temp\1000903001\lumma2.exe
              "C:\Users\Admin\AppData\Local\Temp\1000903001\lumma2.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1412
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                3⤵
                  PID:3620
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 1136
                    4⤵
                    • Program crash
                    PID:4588
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 1160
                    4⤵
                    • Program crash
                    PID:4644
              • C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe
                "C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:5816
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  3⤵
                    PID:2056
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 1136
                      4⤵
                      • Program crash
                      PID:4592
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 1156
                      4⤵
                      • Program crash
                      PID:4392
                • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3880
                • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                  "C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"
                  2⤵
                  • Executes dropped EXE
                  PID:3780
                • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:4868
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    3⤵
                      PID:5284
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      3⤵
                        PID:2324
                        • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
                          "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
                          4⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2688
                        • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
                          "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
                          4⤵
                          • Executes dropped EXE
                          • Modifies system certificate store
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4272
                    • C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"
                      2⤵
                      • Executes dropped EXE
                      • Checks SCSI registry key(s)
                      PID:5068
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 388
                        3⤵
                        • Program crash
                        PID:492
                    • C:\Users\Admin\AppData\Local\Temp\1000996001\cmon.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000996001\cmon.exe"
                      2⤵
                        PID:3232
                      • C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe"
                        2⤵
                          PID:1632
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4436 -ip 4436
                        1⤵
                          PID:5816
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3620 -ip 3620
                          1⤵
                            PID:4516
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3620 -ip 3620
                            1⤵
                              PID:4456
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2056 -ip 2056
                              1⤵
                                PID:2292
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2056 -ip 2056
                                1⤵
                                  PID:1292
                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1972
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5068 -ip 5068
                                  1⤵
                                    PID:2228

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                    Filesize

                                    3KB

                                    MD5

                                    ae626d9a72417b14570daa8fcd5d34a4

                                    SHA1

                                    c103ebaf4d760df722d620df87e6f07c0486439f

                                    SHA256

                                    52cc3f3028fab0d347a4a3fffef570b42f85748176d81a3344996d42fd1de32a

                                    SHA512

                                    a0690bda318bdf43d6f292f88d4ea2ebeec83b95e9ebca80083dbb08e7ddcdb9735cc58b89d369a34f10acf8a114d4a207ed8d0f070c5baf87c5798e9f35bc14

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\alex1234.exe.log

                                    Filesize

                                    425B

                                    MD5

                                    bb27934be8860266d478c13f2d65f45e

                                    SHA1

                                    a69a0e171864dcac9ade1b04fc0313e6b4024ccb

                                    SHA256

                                    85ad0d9909461517acf2e24ff116ca350e9b7000b4eefb23aa3647423c9745b4

                                    SHA512

                                    87dd77feac509a25b30c76c119752cc25020cca9c53276c2082aef2a8c75670ef67e1e70024a63d44ae442b64f4bc464aee6691e80c525376bb7421929cfa3bb

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                    Filesize

                                    1KB

                                    MD5

                                    cd00e221c7412a41b29060dfc1dcd6c8

                                    SHA1

                                    76b297738f2cddd26f737ab38829ad02ed1b51ec

                                    SHA256

                                    98f4f38301fc856eaa213d998e3e07c3cb7e544c3662d452e3342c2268a680b7

                                    SHA512

                                    abcd164974234cd9d06d9e0127909148af2cbca135b22a73f48338e23f2fbb44088897bf8229591038a09959a86cd35b642c49c5033f091b5266c35a2a78b9c0

                                  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                                    Filesize

                                    1.1MB

                                    MD5

                                    17bb36d0bed9e9f264293707e934bf54

                                    SHA1

                                    ff3d941e53bfb9e35538d4ccf2fc88eafe78a831

                                    SHA256

                                    3a3e0c22f9232573ee1a6da64889aff42f3588cee116c0f67b9cfc51b38dacac

                                    SHA512

                                    8cf6f71827bd20bd78f63a77b82374c7149a701e1c9caa97161e8c72381944d2c90e3a4a23908db6e41daeb46155d6161fec9537c4f99c27f999ba296448f404

                                  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                                    Filesize

                                    1.1MB

                                    MD5

                                    a3f432c994cfab3b6fbef9fd6cad81a6

                                    SHA1

                                    030476a03d492b60c7fa079a9e819ec3337e08c8

                                    SHA256

                                    07e9558c8a92e815b3aeb986794ba6ed3932a0a6c177493c8f73c4752b378a2e

                                    SHA512

                                    7d0735987a8a6e6b2f8c8af5ab98b0e5107392c982985751c8c72cdf16536feb70748783094f9729f2fe6aefca7067d1e84689b644a996bd53404c9ba97bc245

                                  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    98d82ae39805e00fb07bdcc5a870fce1

                                    SHA1

                                    7e2a70529ab5c5717608fa27396e9bc48c2fbc52

                                    SHA256

                                    8e38e6533fc45d517e8e8e4c4160e7755f5be8664662af548348bc26b6265510

                                    SHA512

                                    09b78bb8345631d8c1516bd669918ab4e61de79fc948f90b520b0d57ec1af09d57f568dc1eb222ce02ad7397209df3214a100cc535f2c6bdb3bd4bd3697bf169

                                  • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                    Filesize

                                    1024KB

                                    MD5

                                    599063efe7dba8bfcb3c9edb2ded4547

                                    SHA1

                                    fd351ff6ecdc3040065c20dd8fcd05c0b78e1424

                                    SHA256

                                    f1581b9dd2ed2cbb9e6b13db96f5af2e5225df84a818bbef1dcba637cab41a0b

                                    SHA512

                                    feb1eaa94a62348b8bf8e5d54008610598ed449ee56dd802f4e25a5c11965c104057ec9e9accaf83d03500bf0dce18fc11263b229578c43355b731d7edffbdac

                                  • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                    Filesize

                                    1.2MB

                                    MD5

                                    57e0943c3e2db6de3a44f42411daefc7

                                    SHA1

                                    96ae60764ab108301a6676f113e26de649976784

                                    SHA256

                                    8e69fa5bd94dc856c0c1de85415724d9092e4eff2e4cb6124487f41fb3438497

                                    SHA512

                                    65782a59143c47d50251bac2d303338fd0be000139c66dfb0882a210ffe9f7b875c9b6166f417ba2bff90946d8b08ef6cff5e0e913ca0e67b630345d2de57420

                                  • C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe

                                    Filesize

                                    534KB

                                    MD5

                                    a3f8b60a08da0f600cfce3bb600d5cb3

                                    SHA1

                                    b00d7721767b717b3337b5c6dade4ebf2d56345e

                                    SHA256

                                    0c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb

                                    SHA512

                                    14f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d

                                  • C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe

                                    Filesize

                                    464KB

                                    MD5

                                    c084d6f6ba40534fbfc5a64b21ef99ab

                                    SHA1

                                    0b4a17da83c0a8abbc8fab321931d5447b32b720

                                    SHA256

                                    afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624

                                    SHA512

                                    a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1

                                  • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                                    Filesize

                                    896KB

                                    MD5

                                    9a65d7b4ed5ffccc2b07479e43780318

                                    SHA1

                                    3b59128981b29668b475a7437cd93fcbe8591e7e

                                    SHA256

                                    92b3ca828ea705770a9fa7aae2cd05a12aa840539bd39cfb847822ca7ace5237

                                    SHA512

                                    871eaebcf3d185fda9dfdaf68f9ed9cc4ada508da0faeb2e90f5f3fe28930a71a0b697142e28a91366ccc413c4f4b5db5716e68f59d1b8fd320fa452a7e9a109

                                  • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe

                                    Filesize

                                    3.0MB

                                    MD5

                                    a2fc0d7ba6ede24d47bceba559881b93

                                    SHA1

                                    acfba7d1523b5ed2ddebae710abde899232b236a

                                    SHA256

                                    66e792786a978b4b4edcc5990cc2ce8d107976145acd5dc053649a4f8d6b7347

                                    SHA512

                                    f3bcfb2533decd44de2613725aa40804371196e594fe3360de66c5d1f592da03575bf20111d2c323d5cdca20516f320e68783de5b6b11973b6e54d7c3ccbf168

                                  • C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    d3fe829cb80bef7da149291b4991dd4e

                                    SHA1

                                    249d28ee45f0a6c4160dd1de2d95536df5a8de4c

                                    SHA256

                                    346187de7ff100d813b4d216d499564d4b533da14d047c52e3d63a797edc39b7

                                    SHA512

                                    4ef295bc0e01d5c732da5fcc97f2e0a4283fc2d9c363602eb123794a94539707f26887d5714eb25e8add80da43d6943fd71594b47c20383eaca358c11c06e771

                                  • C:\Users\Admin\AppData\Local\Temp\1000903001\lumma2.exe

                                    Filesize

                                    322KB

                                    MD5

                                    3c30dbf2e7d57fdb7babdf49b87d8b31

                                    SHA1

                                    33e72f2e8e6b93a2ecffccba64650bda87e08e0d

                                    SHA256

                                    8d2c29f6d94f4375450e54b8d9fcd645beb7642d4240a4137e7c8539a57040d2

                                    SHA512

                                    c48c83d1d9d459720bea88aa7fb56c13d886fff9ab65deb0ace750d7d35a7b61c66b5d697e506ec152534d788f1641c51bcba38610ae66a6a8e08b0dabdc7657

                                  • C:\Users\Admin\AppData\Local\Temp\1000978001\fullwork.exe

                                    Filesize

                                    451KB

                                    MD5

                                    b2b60c50903a73efffcb4e33ce49238f

                                    SHA1

                                    9b6f27fc410748ae1570978d7a6aba95a1041eea

                                    SHA256

                                    29d409af265261b204f6eeeedb5e9bb1f7a829b723a5d1d78384066744bddbe1

                                    SHA512

                                    2c66a1615de77157f57c662de2e3ec97deb8cb6aadc0a03ff0acc3b269affd5ae0d50dfef85939ca9c1a8c6d47ff915061157e7da92dc286cb6ddd9b06a88126

                                  • C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe

                                    Filesize

                                    541KB

                                    MD5

                                    3b069f3dd741e4360f26cb27cb10320a

                                    SHA1

                                    6a9503aaf1e297f2696482ddf1bd4605a8710101

                                    SHA256

                                    f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e

                                    SHA512

                                    bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9

                                  • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    85a15f080b09acace350ab30460c8996

                                    SHA1

                                    3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                                    SHA256

                                    3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                                    SHA512

                                    ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

                                  • C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe

                                    Filesize

                                    230KB

                                    MD5

                                    d0db1b2b56320462120c9f6776c41fcc

                                    SHA1

                                    df9740b7a6ce86968c46f08b78d42cbabe7f16c1

                                    SHA256

                                    02acd3cd16959a23cfcfa6cd6e1068fa96f006705483366c613371c4e81da80e

                                    SHA512

                                    38247ece4438647d996e12059ed7f7c9fb5d5db586c651ab48a51093a7d5482b19cdb898e3ed1f42303a84118d768202edc749d09ed5bd1c7e03925f05dc6d54

                                  • C:\Users\Admin\AppData\Local\Temp\1000996001\cmon.exe

                                    Filesize

                                    2.7MB

                                    MD5

                                    2bae8753475af921d7258f9b1e9fccd4

                                    SHA1

                                    0da0ad8fbea157d468e4ccbf66575808103246f7

                                    SHA256

                                    9df4aaa956d54f55f1bb038f3e8f086169983e094ef8432cd71df928a888a2d0

                                    SHA512

                                    0a346f1dc1771f4e049d04eda7bfc021120cf3797011f89b3a6e2b5ad2fb6bb88d6218d8c6383d8a98bc9eaef2797a01632e7a2526005b04a5000c2889cdd12d

                                  • C:\Users\Admin\AppData\Local\Temp\1000996001\cmon.exe

                                    Filesize

                                    2.1MB

                                    MD5

                                    98df7850dd7160cc64deff3b7a43e3b6

                                    SHA1

                                    38ef2273a92921ce35bede57576d5a02e833d34e

                                    SHA256

                                    b7f9cd9626ebc8f767f31b94bc44d60d2ea89bdcdf38f81127f8624eea218a7d

                                    SHA512

                                    bc36a71a8bf517a8fe5cbce81700213a4663c7686b251d44fd16ad2370909f40293a968b9383a6ecaa61f2baa09257336a923d279b0f852a961ac86c74a03f31

                                  • C:\Users\Admin\AppData\Local\Temp\1000996001\cmon.exe

                                    Filesize

                                    1.9MB

                                    MD5

                                    188f359373783700438710019b1fbcb6

                                    SHA1

                                    7cdcdd662bc61134bd0b85a745c59a36b7a893ce

                                    SHA256

                                    ea7b28795aa7ab7e4432da11ea4e920bbcc8ad4fb37502096ee18c4d4f6ea30a

                                    SHA512

                                    232dd955f48c8a01437689d5c49e8114c52e859cb095da675ffd364b6bc16f9d591b6b15147dc35ad544953dc4f8673b091fb729bcff94ebdd83554c660f3a18

                                  • C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe

                                    Filesize

                                    78KB

                                    MD5

                                    49cbc2a900c14f330dcc3e772b918f8a

                                    SHA1

                                    e780df64ed64b960e80921621be85eb3459e7d59

                                    SHA256

                                    4dc4e73a22eb1a968b2d87480541d7cf2ae0beb22d7fd197fddc419caa9a8a1b

                                    SHA512

                                    a5805b2ae8a566b89b985386ec6f858ce08865801c8fcf135936ee4ac8c93b881da82f5cee383916de4ea7746094166795449139d1f486c5ae1e467805b79e4b

                                  • C:\Users\Admin\AppData\Local\Temp\1000999001\ISetup3.exe

                                    Filesize

                                    403KB

                                    MD5

                                    db35d187ff054b94a413290cb60b29c1

                                    SHA1

                                    3fe05dd60f6204a57909bbf9b590d011e4a488d9

                                    SHA256

                                    a06ddaa3bffc154507e8619b1baedc66d559e5a142e8951749a407b6dc0ee18f

                                    SHA512

                                    20e86247c71d93131075de618ef5899b6f3c92fa5a0eae8114d03bd9c1a984c527af360a9685d4417b559af2d3d1b8fb5abd2917bb2a0a385f9f974e64f93e77

                                  • C:\Users\Admin\AppData\Local\Temp\Tmp7F78.tmp

                                    Filesize

                                    2KB

                                    MD5

                                    1420d30f964eac2c85b2ccfe968eebce

                                    SHA1

                                    bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                    SHA256

                                    f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                    SHA512

                                    6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_htaihinn.ka0.ps1

                                    Filesize

                                    60B

                                    MD5

                                    d17fe0a3f47be24a6453e9ef58c94641

                                    SHA1

                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                    SHA256

                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                    SHA512

                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                    Filesize

                                    109KB

                                    MD5

                                    2afdbe3b99a4736083066a13e4b5d11a

                                    SHA1

                                    4d4856cf02b3123ac16e63d4a448cdbcb1633546

                                    SHA256

                                    8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                                    SHA512

                                    d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                    Filesize

                                    1.1MB

                                    MD5

                                    ae35d90527a41a66dd595a37255c7b64

                                    SHA1

                                    26dc0b05a5bc938f766d02f0e63ca76db126d81c

                                    SHA256

                                    68275a95b9795d5d78f95076d0a200255b0fcbd7284b22441403e6f06319fc5b

                                    SHA512

                                    bf560459f307592e5f59810bb6663c1ce5d9e83d158ed12c275d8bca20593070c1e16ed91cef78a9a173946dae45fa02d01c3b2b256d6efc27d0e4846805bf63

                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                    Filesize

                                    1.2MB

                                    MD5

                                    92fbdfccf6a63acef2743631d16652a7

                                    SHA1

                                    971968b1378dd89d59d7f84bf92f16fc68664506

                                    SHA256

                                    b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                                    SHA512

                                    b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                                  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                    Filesize

                                    109KB

                                    MD5

                                    726cd06231883a159ec1ce28dd538699

                                    SHA1

                                    404897e6a133d255ad5a9c26ac6414d7134285a2

                                    SHA256

                                    12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                    SHA512

                                    9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                    Filesize

                                    1.2MB

                                    MD5

                                    15a42d3e4579da615a384c717ab2109b

                                    SHA1

                                    22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                    SHA256

                                    3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                    SHA512

                                    1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                  • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe

                                    Filesize

                                    541KB

                                    MD5

                                    1fc4b9014855e9238a361046cfbf6d66

                                    SHA1

                                    c17f18c8246026c9979ab595392a14fe65cc5e9f

                                    SHA256

                                    f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

                                    SHA512

                                    2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

                                  • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe

                                    Filesize

                                    304KB

                                    MD5

                                    cc90e3326d7b20a33f8037b9aab238e4

                                    SHA1

                                    236d173a6ac462d85de4e866439634db3b9eeba3

                                    SHA256

                                    bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

                                    SHA512

                                    b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

                                  • memory/256-10-0x00000000053F0000-0x00000000053F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/256-7-0x0000000005370000-0x0000000005371000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/256-5-0x0000000005390000-0x0000000005391000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/256-2-0x0000000000BD0000-0x0000000001083000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/256-4-0x00000000053B0000-0x00000000053B1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/256-3-0x00000000053A0000-0x00000000053A1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/256-1-0x0000000077726000-0x0000000077728000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/256-15-0x0000000000BD0000-0x0000000001083000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/256-9-0x0000000005400000-0x0000000005401000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/256-0-0x0000000000BD0000-0x0000000001083000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/256-6-0x00000000053D0000-0x00000000053D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/256-8-0x0000000005380000-0x0000000005381000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1472-192-0x0000000000F50000-0x00000000013F3000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/1472-232-0x0000000000F50000-0x00000000013F3000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/1472-190-0x0000000000F50000-0x00000000013F3000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/1472-193-0x0000000005000000-0x0000000005001000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1472-194-0x0000000004FF0000-0x0000000004FF1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1972-390-0x0000000000500000-0x00000000009A3000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/2056-280-0x0000000000400000-0x000000000044B000-memory.dmp

                                    Filesize

                                    300KB

                                  • memory/2056-283-0x0000000000400000-0x000000000044B000-memory.dmp

                                    Filesize

                                    300KB

                                  • memory/2324-418-0x0000000000400000-0x0000000000592000-memory.dmp

                                    Filesize

                                    1.6MB

                                  • memory/2868-148-0x000002E0EB9C0000-0x000002E0EB9D2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/2868-143-0x000002E0EB440000-0x000002E0EB462000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/2868-158-0x00007FFD0AE30000-0x00007FFD0B8F2000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/2868-149-0x000002E0EB430000-0x000002E0EB43A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/2868-146-0x000002E0EB470000-0x000002E0EB480000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2868-145-0x000002E0EB470000-0x000002E0EB480000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2868-144-0x00007FFD0AE30000-0x00007FFD0B8F2000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3008-160-0x0000000000010000-0x00000000003B5000-memory.dmp

                                    Filesize

                                    3.6MB

                                  • memory/3008-121-0x0000000000010000-0x00000000003B5000-memory.dmp

                                    Filesize

                                    3.6MB

                                  • memory/3008-391-0x0000000000010000-0x00000000003B5000-memory.dmp

                                    Filesize

                                    3.6MB

                                  • memory/3008-289-0x0000000000010000-0x00000000003B5000-memory.dmp

                                    Filesize

                                    3.6MB

                                  • memory/3008-326-0x0000000000010000-0x00000000003B5000-memory.dmp

                                    Filesize

                                    3.6MB

                                  • memory/3008-497-0x0000000000010000-0x00000000003B5000-memory.dmp

                                    Filesize

                                    3.6MB

                                  • memory/3008-504-0x0000000000010000-0x00000000003B5000-memory.dmp

                                    Filesize

                                    3.6MB

                                  • memory/3008-378-0x0000000000010000-0x00000000003B5000-memory.dmp

                                    Filesize

                                    3.6MB

                                  • memory/3008-120-0x0000000000010000-0x00000000003B5000-memory.dmp

                                    Filesize

                                    3.6MB

                                  • memory/3232-549-0x0000000004DB0000-0x0000000005060000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/3232-545-0x0000000004DB0000-0x0000000005060000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/3232-537-0x0000000004DB0000-0x0000000005060000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/3232-572-0x0000000004DB0000-0x0000000005060000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/3232-539-0x0000000004DB0000-0x0000000005060000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/3232-566-0x0000000004DB0000-0x0000000005060000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/3232-541-0x0000000004DB0000-0x0000000005060000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/3232-543-0x0000000004DB0000-0x0000000005060000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/3232-555-0x0000000004DB0000-0x0000000005060000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/3232-553-0x0000000004DB0000-0x0000000005060000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/3232-551-0x0000000004DB0000-0x0000000005060000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/3232-534-0x0000000004DB0000-0x0000000005060000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/3232-547-0x0000000004DB0000-0x0000000005060000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/3412-88-0x00000000730E0000-0x0000000073891000-memory.dmp

                                    Filesize

                                    7.7MB

                                  • memory/3412-47-0x0000000000DF0000-0x0000000000E7C000-memory.dmp

                                    Filesize

                                    560KB

                                  • memory/3412-48-0x00000000730E0000-0x0000000073891000-memory.dmp

                                    Filesize

                                    7.7MB

                                  • memory/3412-65-0x00000000059C0000-0x00000000059D0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3620-239-0x0000000000400000-0x000000000044B000-memory.dmp

                                    Filesize

                                    300KB

                                  • memory/3620-242-0x0000000000400000-0x000000000044B000-memory.dmp

                                    Filesize

                                    300KB

                                  • memory/3780-355-0x0000000000400000-0x0000000000541000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/3780-353-0x0000000000400000-0x0000000000541000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/3780-351-0x0000000000400000-0x0000000000541000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/3892-380-0x0000000000B20000-0x0000000000FD3000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3892-360-0x0000000000B20000-0x0000000000FD3000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3892-18-0x0000000000B20000-0x0000000000FD3000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3892-313-0x0000000000B20000-0x0000000000FD3000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3892-19-0x0000000000B20000-0x0000000000FD3000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3892-20-0x0000000004D80000-0x0000000004D81000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3892-500-0x0000000000B20000-0x0000000000FD3000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3892-159-0x0000000000B20000-0x0000000000FD3000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3892-21-0x0000000004D90000-0x0000000004D91000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3892-22-0x0000000004D70000-0x0000000004D71000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3892-23-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3892-24-0x0000000004D50000-0x0000000004D51000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3892-25-0x0000000004D60000-0x0000000004D61000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3892-449-0x0000000000B20000-0x0000000000FD3000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3892-26-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3892-100-0x0000000000B20000-0x0000000000FD3000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3892-27-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3892-530-0x0000000000B20000-0x0000000000FD3000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3892-95-0x0000000000B20000-0x0000000000FD3000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3892-237-0x0000000000B20000-0x0000000000FD3000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3916-71-0x0000000004C60000-0x0000000004C70000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3916-70-0x00000000730E0000-0x0000000073891000-memory.dmp

                                    Filesize

                                    7.7MB

                                  • memory/3916-69-0x0000000000290000-0x000000000030A000-memory.dmp

                                    Filesize

                                    488KB

                                  • memory/3916-84-0x00000000730E0000-0x0000000073891000-memory.dmp

                                    Filesize

                                    7.7MB

                                  • memory/3916-171-0x0000000002660000-0x0000000004660000-memory.dmp

                                    Filesize

                                    32.0MB

                                  • memory/3916-86-0x0000000002660000-0x0000000004660000-memory.dmp

                                    Filesize

                                    32.0MB

                                  • memory/4436-78-0x0000000000400000-0x0000000000448000-memory.dmp

                                    Filesize

                                    288KB

                                  • memory/4436-151-0x0000000000400000-0x0000000000448000-memory.dmp

                                    Filesize

                                    288KB

                                  • memory/4436-92-0x0000000001360000-0x0000000001361000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4436-82-0x0000000000400000-0x0000000000448000-memory.dmp

                                    Filesize

                                    288KB

                                  • memory/4436-99-0x0000000000400000-0x0000000000448000-memory.dmp

                                    Filesize

                                    288KB

                                  • memory/5656-531-0x0000000000500000-0x00000000009A3000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/5656-314-0x0000000000500000-0x00000000009A3000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/5656-361-0x0000000000500000-0x00000000009A3000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/5656-501-0x0000000000500000-0x00000000009A3000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/5656-446-0x0000000000500000-0x00000000009A3000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/5656-381-0x0000000000500000-0x00000000009A3000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/6052-87-0x0000000005520000-0x00000000055B2000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/6052-131-0x0000000008C60000-0x0000000008CC6000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/6052-97-0x0000000006A20000-0x0000000006A5C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/6052-76-0x0000000000400000-0x0000000000450000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/6052-96-0x00000000054C0000-0x00000000054D0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/6052-85-0x0000000005A30000-0x0000000005FD6000-memory.dmp

                                    Filesize

                                    5.6MB

                                  • memory/6052-98-0x0000000006A70000-0x0000000006ABC000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/6052-94-0x00000000069C0000-0x00000000069D2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/6052-91-0x0000000006AC0000-0x00000000070D8000-memory.dmp

                                    Filesize

                                    6.1MB

                                  • memory/6052-93-0x0000000008280000-0x000000000838A000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/6052-147-0x0000000006650000-0x00000000066A0000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/6052-150-0x0000000009800000-0x00000000099C2000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/6052-89-0x0000000005500000-0x000000000550A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/6052-157-0x0000000009F00000-0x000000000A42C000-memory.dmp

                                    Filesize

                                    5.2MB

                                  • memory/6052-189-0x00000000730E0000-0x0000000073891000-memory.dmp

                                    Filesize

                                    7.7MB

                                  • memory/6052-90-0x00000000730E0000-0x0000000073891000-memory.dmp

                                    Filesize

                                    7.7MB

                                  • memory/6052-191-0x00000000054C0000-0x00000000054D0000-memory.dmp

                                    Filesize

                                    64KB