Analysis

  • max time kernel
    139s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 17:21

General

  • Target

    d4d1d1c7bbe05e60beb4bd3afe40994d6da9d7dd4a1860ada76fcf9601e784e3.exe

  • Size

    3.1MB

  • MD5

    00fbf4d07fd4393e9d31543312489a60

  • SHA1

    08c4243f594ab761ee6d19a0213cf1a60ebdc5fb

  • SHA256

    d4d1d1c7bbe05e60beb4bd3afe40994d6da9d7dd4a1860ada76fcf9601e784e3

  • SHA512

    a02fe499481fb311ab7c44221e41b697a30e4328c6f9bfb853a552cb33a748425eeb45d7cc77e2730b160baf8e05112589299015179b483efa07c8372a7150e1

  • SSDEEP

    49152:0D8oHs/Uadmc8Ttg6fVRTvxqZ0bqbG97JOa8lfiGLI:u8r/Uadmc8Ttg6fVtxKYmaYa8UWI

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

4.184.225.183:30592

Extracted

Family

stealc

C2

http://52.143.157.84

Attributes
  • url_path

    /c73eed764cc59dcb.php

Extracted

Family

lumma

C2

https://affordcharmcropwo.shop/api

https://cleartotalfisherwo.shop/api

https://worryfillvolcawoi.shop/api

https://enthusiasimtitleow.shop/api

https://dismissalcylinderhostw.shop/api

https://diskretainvigorousiw.shop/api

https://communicationgenerwo.shop/api

https://pillowbrocccolipe.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 10 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 19 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4d1d1c7bbe05e60beb4bd3afe40994d6da9d7dd4a1860ada76fcf9601e784e3.exe
    "C:\Users\Admin\AppData\Local\Temp\d4d1d1c7bbe05e60beb4bd3afe40994d6da9d7dd4a1860ada76fcf9601e784e3.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:5116
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1508
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            5⤵
              PID:1744
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\177723727746_Desktop.zip' -CompressionLevel Optimal
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3588
        • C:\Users\Admin\AppData\Local\Temp\1000059001\amert.exe
          "C:\Users\Admin\AppData\Local\Temp\1000059001\amert.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          PID:2444
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:620
    • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
      C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4520
      • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe
        "C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2856
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
            PID:2744
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 876
            3⤵
            • Program crash
            PID:3608
        • C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe
          "C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2220
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:2980
            • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
              "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
              4⤵
              • Executes dropped EXE
              • Modifies system certificate store
              PID:1836
            • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
              "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1648
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:4888
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
            3⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5100
            • C:\Windows\system32\netsh.exe
              netsh wlan show profiles
              4⤵
                PID:2804
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\177723727746_Desktop.zip' -CompressionLevel Optimal
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4920
          • C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe
            "C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2008
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3452
          • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
            "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:3140
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe" /F
              3⤵
              • Creates scheduled task(s)
              PID:4916
          • C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe
            "C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"
            2⤵
            • Executes dropped EXE
            PID:4752
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
            2⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            PID:2424
          • C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe
            "C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:1996
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:4916
          • C:\Users\Admin\AppData\Local\Temp\1000173001\Startup.exe
            "C:\Users\Admin\AppData\Local\Temp\1000173001\Startup.exe"
            2⤵
            • Executes dropped EXE
            PID:6140
          • C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe
            "C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe"
            2⤵
            • UAC bypass
            • Windows security bypass
            • Checks computer location settings
            • Executes dropped EXE
            • Windows security modification
            • Checks whether UAC is enabled
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • System policy modification
            PID:5688
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe" -Force
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5844
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
              3⤵
                PID:6028
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:5908
                • C:\Users\Admin\Pictures\Gv8A2OpVnB37BFXgyK3LklSk.exe
                  "C:\Users\Admin\Pictures\Gv8A2OpVnB37BFXgyK3LklSk.exe"
                  4⤵
                  • Executes dropped EXE
                  PID:5752
                • C:\Users\Admin\Pictures\6pDn9thQFCk8ejkthWCcHdlQ.exe
                  "C:\Users\Admin\Pictures\6pDn9thQFCk8ejkthWCcHdlQ.exe"
                  4⤵
                  • Executes dropped EXE
                  PID:5332
                • C:\Users\Admin\Pictures\0SlayC8KY4axLdgI56eBjScQ.exe
                  "C:\Users\Admin\Pictures\0SlayC8KY4axLdgI56eBjScQ.exe"
                  4⤵
                  • Executes dropped EXE
                  PID:5280
                  • C:\Users\Admin\AppData\Local\Temp\u42o.0.exe
                    "C:\Users\Admin\AppData\Local\Temp\u42o.0.exe"
                    5⤵
                      PID:5708
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
                  3⤵
                    PID:5936
              • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                1⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                PID:3932
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2856 -ip 2856
                1⤵
                  PID:4092
                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5856
                • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                  C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                  1⤵
                  • Executes dropped EXE
                  PID:6048

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  3KB

                  MD5

                  fe3aab3ae544a134b68e881b82b70169

                  SHA1

                  926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6

                  SHA256

                  bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b

                  SHA512

                  3fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  7f5130f8643f9c281b6384704d27b900

                  SHA1

                  c384737918a1e492e8742800a251d31de1842de2

                  SHA256

                  e5a21b6e080bd51ab39ae0aa91aa0573951a52aafd2f021263141d0755e1cf8f

                  SHA512

                  ff471d00db8f4ec88cd0d52894e4f1a91ad32473cb173b7a5d431def9717cbe106c2ae431869651a3a9fc1801f9997a9d35d22a85cdb605ed98731e6dc129161

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  494f1425f7582e3ef6c02a02f0581098

                  SHA1

                  b6972aed261c28dbc6d3add64502373baca33912

                  SHA256

                  d7e75ff6fdd0716782ec13140e355b6a46b8c84eed4c4a87e82fc08aa0c2cdbb

                  SHA512

                  f25c96d7f08c0220dcbc71ff9fc52485e394580ffba136f644064abfb252f4c5c64c48cd7326ed5a224a94e50bf9a6e434da101235e1f1d89c048c72e95cc54e

                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                  Filesize

                  3.1MB

                  MD5

                  00fbf4d07fd4393e9d31543312489a60

                  SHA1

                  08c4243f594ab761ee6d19a0213cf1a60ebdc5fb

                  SHA256

                  d4d1d1c7bbe05e60beb4bd3afe40994d6da9d7dd4a1860ada76fcf9601e784e3

                  SHA512

                  a02fe499481fb311ab7c44221e41b697a30e4328c6f9bfb853a552cb33a748425eeb45d7cc77e2730b160baf8e05112589299015179b483efa07c8372a7150e1

                • C:\Users\Admin\AppData\Local\Temp\1000059001\amert.exe

                  Filesize

                  1.8MB

                  MD5

                  bfa432a499b56a408bd91c96b5c7e0f1

                  SHA1

                  5e98176f87cb0d6827f581f026729b3d2ea80424

                  SHA256

                  6db2485c49287482f128327cd80c18c294da6d626751fe58d70bff19dd26149c

                  SHA512

                  c2b28ec0fdae14b42612fe2efcbe617838b32e0ac42057cdcb260014b623394a9e69f79bf6608332eba1d9b665e7b2ebbb7dabb3d26f3b4b00f7e4366b023feb

                • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe

                  Filesize

                  321KB

                  MD5

                  1c7d0f34bb1d85b5d2c01367cc8f62ef

                  SHA1

                  33aedadb5361f1646cffd68791d72ba5f1424114

                  SHA256

                  e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c

                  SHA512

                  53bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d

                • C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe

                  Filesize

                  1.7MB

                  MD5

                  85a15f080b09acace350ab30460c8996

                  SHA1

                  3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                  SHA256

                  3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                  SHA512

                  ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

                • C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe

                  Filesize

                  488KB

                  MD5

                  82053649cadec1a338509e46ba776fbd

                  SHA1

                  6d8e479a6dc76d54109bb2e602b8087d55537510

                  SHA256

                  30468f8b767772214c60a701ecfee11c634516c3e2de146cd07638ea00dd0b6e

                  SHA512

                  e4b2b219483477a73fec5a207012f77c7167bf7b7f9adcb80ee92f87ddfe592a0d520f2afee531d1cce926ef56da2b065b13630a1cc171f48db8f7987e10897a

                • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe

                  Filesize

                  418KB

                  MD5

                  0099a99f5ffb3c3ae78af0084136fab3

                  SHA1

                  0205a065728a9ec1133e8a372b1e3864df776e8c

                  SHA256

                  919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                  SHA512

                  5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                • C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe

                  Filesize

                  304KB

                  MD5

                  8510bcf5bc264c70180abe78298e4d5b

                  SHA1

                  2c3a2a85d129b0d750ed146d1d4e4d6274623e28

                  SHA256

                  096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6

                  SHA512

                  5ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d

                • C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe

                  Filesize

                  158KB

                  MD5

                  586f7fecacd49adab650fae36e2db994

                  SHA1

                  35d9fb512a8161ce867812633f0a43b042f9a5e6

                  SHA256

                  cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e

                  SHA512

                  a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772

                • C:\Users\Admin\AppData\Local\Temp\1000173001\Startup.exe

                  Filesize

                  3.3MB

                  MD5

                  76eae6ef736073145d6c06d981615ff9

                  SHA1

                  6612a26d5db4a6a745fed7518ec93a1121fffd9c

                  SHA256

                  3acdea11112584cd1f78da03f6af5cfc0f883309fc5ec552fa6b9c85a6c483bb

                  SHA512

                  e7c118bbe9f62d5834b374e05242636b32daab2c1fe607521d6e78520665c59f78637b74c85d171f8608e255be50731771f0a09dcca69e016b281ee02ab77231

                • C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe

                  Filesize

                  404KB

                  MD5

                  15ce9e885610d5b85500ea0d139f6d21

                  SHA1

                  99f1392185a70453f33e15d6f5b75064217c2c18

                  SHA256

                  95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e

                  SHA512

                  9ee8e3fb682cf7abb5804106f841551f2f0fd8ace9842e67f3bda573772d39a6482d19e853de5a9a48d177350a3398cb814105ced01fdfb1be6db7e8bc9055b9

                • C:\Users\Admin\AppData\Local\Temp\Tmp6C80.tmp

                  Filesize

                  2KB

                  MD5

                  1420d30f964eac2c85b2ccfe968eebce

                  SHA1

                  bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                  SHA256

                  f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                  SHA512

                  6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vrcc34ow.uc0.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\u42o.0.exe

                  Filesize

                  300KB

                  MD5

                  e965474beb540e3e06258c43394f3808

                  SHA1

                  62cf5e660080e94f7ab601fa5fb071431e17dbf9

                  SHA256

                  e7d01bd9be89df004023b65241047382885bb8f89df0f2f6be274bbb2f2eaf3f

                  SHA512

                  4cc04091fbfdeebf28f1eaeb6ac85e93af01214fc3a7b17de601761b5976615a2dbc9919d7eff6185720d3693701f699fe3daa70106dd1d41c4914c3f1a16e0c

                • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2177723727-746291240-1644359950-1000\76b53b3ec448f7ccdda2063b15d2bfc3_83f067b2-4236-4e0d-83e4-ef79b7da67b0

                  Filesize

                  2KB

                  MD5

                  11b77c68836324545569e7aeb382de21

                  SHA1

                  234ce048eb2b342fb8d85f9e1390d77d768ce25a

                  SHA256

                  9f93d18331c328c4375220c3ada51ff2970c9e792389e963b39dbecd24b7ff12

                  SHA512

                  249b5c5c210ff4a615c1c3bf12cbf46ba0bc61e6927b502cf4c08c1b25c5a4bb5fc4203dc2edd828bae7b5e7f4d8d564a973f82bdc5c6f8f5e425c542a48644b

                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                  Filesize

                  109KB

                  MD5

                  726cd06231883a159ec1ce28dd538699

                  SHA1

                  404897e6a133d255ad5a9c26ac6414d7134285a2

                  SHA256

                  12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                  SHA512

                  9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                  Filesize

                  1.2MB

                  MD5

                  15a42d3e4579da615a384c717ab2109b

                  SHA1

                  22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                  SHA256

                  3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                  SHA512

                  1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                  Filesize

                  109KB

                  MD5

                  154c3f1334dd435f562672f2664fea6b

                  SHA1

                  51dd25e2ba98b8546de163b8f26e2972a90c2c79

                  SHA256

                  5f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f

                  SHA512

                  1bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841

                • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                  Filesize

                  1.2MB

                  MD5

                  f35b671fda2603ec30ace10946f11a90

                  SHA1

                  059ad6b06559d4db581b1879e709f32f80850872

                  SHA256

                  83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7

                  SHA512

                  b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

                • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe

                  Filesize

                  541KB

                  MD5

                  1fc4b9014855e9238a361046cfbf6d66

                  SHA1

                  c17f18c8246026c9979ab595392a14fe65cc5e9f

                  SHA256

                  f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

                  SHA512

                  2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

                • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe

                  Filesize

                  304KB

                  MD5

                  cc90e3326d7b20a33f8037b9aab238e4

                  SHA1

                  236d173a6ac462d85de4e866439634db3b9eeba3

                  SHA256

                  bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

                  SHA512

                  b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

                • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                  Filesize

                  2KB

                  MD5

                  feec3f6386916a653f9ee6a76d776fd1

                  SHA1

                  f0b7ac91377f68aa6f1e757595ee47d464147da1

                  SHA256

                  c4dd7e1ecbdb672eefc45d4479cca3e6cc25ef5a140fa367cfa97c3e3d5d97f2

                  SHA512

                  b2b471384a59ab93be8af05c301bb2834b7cea67ce340b873b4c3f487c0f374a71147657dbdf6ddf857b8f47d90fc81c413371dfad9775b5f57de8808d2ac8b3

                • C:\Users\Admin\Pictures\0SlayC8KY4axLdgI56eBjScQ.exe

                  Filesize

                  445KB

                  MD5

                  679dbda18984bf8e308e5eee664eac7d

                  SHA1

                  0d5c8ec76fc459e1b8ef433412c5d18f1e550254

                  SHA256

                  1453acb57fda5d0c89c052540f531b20e1211112b2433dede93b43c726cfe656

                  SHA512

                  9b7cf48db7bf51ca8c7086e75dfa9cb41e9e987b21ff8f7bc8326042bc27145b3154d84f5f59f997665bc62eb238bf1c5bf3f42d378c75f27a851f3feb5203ee

                • C:\Users\Admin\Pictures\Gv8A2OpVnB37BFXgyK3LklSk.exe

                  Filesize

                  4.2MB

                  MD5

                  cf2c9f47ee207b14419adac5e185cfb6

                  SHA1

                  1214365de71a48e798998e5c0947f4fffaf7f030

                  SHA256

                  59f149b1c04d3a73d6d9fd658f881c91021ba67733b0c377be2eda6c6fb9a759

                  SHA512

                  37f84ad5fa5ac5e4e3b3ef92ce2dbc05018a3c7b07e82e562d2598e7898c41b18239a57c45ba1d07b4c857338b7ff32d84e60f7769a9569f2f6a4c19c68fa82c

                • C:\Users\Admin\Pictures\N7zIwCuVvtO1AvbDt6pfyGeB.exe

                  Filesize

                  7KB

                  MD5

                  5b423612b36cde7f2745455c5dd82577

                  SHA1

                  0187c7c80743b44e9e0c193e993294e3b969cc3d

                  SHA256

                  e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                  SHA512

                  c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                • C:\Users\Public\Desktop\Google Chrome.lnk

                  Filesize

                  2KB

                  MD5

                  c28b676b14efb4c26c559063e20f96c9

                  SHA1

                  a5254a724369c8bc65e51205023d9043aabbf74b

                  SHA256

                  acf94e15c0d1babdaf46348239df74d1f653da668db06a9eb85c58587c1c82fa

                  SHA512

                  efe61c496abd180cf09916ab3af144359818b62b5346fd739135a9c573aff7b47c575871ec1021f5ddfc2cc6b088d8e984f25b49b0f609a2370f64b28196da7c

                • memory/2444-110-0x0000000000A60000-0x0000000000F1F000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2444-103-0x0000000004FC0000-0x0000000004FC1000-memory.dmp

                  Filesize

                  4KB

                • memory/2444-97-0x0000000000A60000-0x0000000000F1F000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2444-98-0x0000000004FE0000-0x0000000004FE1000-memory.dmp

                  Filesize

                  4KB

                • memory/2444-99-0x0000000004FF0000-0x0000000004FF1000-memory.dmp

                  Filesize

                  4KB

                • memory/2444-100-0x0000000004FD0000-0x0000000004FD1000-memory.dmp

                  Filesize

                  4KB

                • memory/2444-101-0x0000000005010000-0x0000000005011000-memory.dmp

                  Filesize

                  4KB

                • memory/2444-102-0x0000000004FB0000-0x0000000004FB1000-memory.dmp

                  Filesize

                  4KB

                • memory/2444-105-0x0000000005040000-0x0000000005041000-memory.dmp

                  Filesize

                  4KB

                • memory/2444-106-0x0000000005030000-0x0000000005031000-memory.dmp

                  Filesize

                  4KB

                • memory/2444-86-0x0000000000A60000-0x0000000000F1F000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2744-165-0x0000000000400000-0x000000000044C000-memory.dmp

                  Filesize

                  304KB

                • memory/2744-159-0x0000000000400000-0x000000000044C000-memory.dmp

                  Filesize

                  304KB

                • memory/2744-162-0x0000000000400000-0x000000000044C000-memory.dmp

                  Filesize

                  304KB

                • memory/2744-164-0x00000000009E0000-0x00000000009E1000-memory.dmp

                  Filesize

                  4KB

                • memory/2856-163-0x0000000002F60000-0x0000000004F60000-memory.dmp

                  Filesize

                  32.0MB

                • memory/2856-155-0x0000000000A60000-0x0000000000AB2000-memory.dmp

                  Filesize

                  328KB

                • memory/2856-156-0x0000000073580000-0x0000000073D30000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2980-195-0x0000000000400000-0x0000000000592000-memory.dmp

                  Filesize

                  1.6MB

                • memory/3452-308-0x0000000000400000-0x0000000000452000-memory.dmp

                  Filesize

                  328KB

                • memory/3588-61-0x0000017E324B0000-0x0000017E324C0000-memory.dmp

                  Filesize

                  64KB

                • memory/3588-62-0x0000017E4AB70000-0x0000017E4AB82000-memory.dmp

                  Filesize

                  72KB

                • memory/3588-69-0x00007FFFFC560000-0x00007FFFFD021000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3588-58-0x0000017E4A780000-0x0000017E4A7A2000-memory.dmp

                  Filesize

                  136KB

                • memory/3588-59-0x00007FFFFC560000-0x00007FFFFD021000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3588-63-0x0000017E4AB50000-0x0000017E4AB5A000-memory.dmp

                  Filesize

                  40KB

                • memory/3588-60-0x0000017E324B0000-0x0000017E324C0000-memory.dmp

                  Filesize

                  64KB

                • memory/3932-118-0x0000000005150000-0x0000000005151000-memory.dmp

                  Filesize

                  4KB

                • memory/3932-120-0x0000000005140000-0x0000000005141000-memory.dmp

                  Filesize

                  4KB

                • memory/3932-119-0x0000000005160000-0x0000000005161000-memory.dmp

                  Filesize

                  4KB

                • memory/3932-123-0x0000000005130000-0x0000000005131000-memory.dmp

                  Filesize

                  4KB

                • memory/3932-122-0x0000000005120000-0x0000000005121000-memory.dmp

                  Filesize

                  4KB

                • memory/3932-121-0x0000000005180000-0x0000000005181000-memory.dmp

                  Filesize

                  4KB

                • memory/3932-132-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/3932-116-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/3932-131-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4520-134-0x0000000005500000-0x0000000005501000-memory.dmp

                  Filesize

                  4KB

                • memory/4520-367-0x0000000000500000-0x00000000009BF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4520-126-0x00000000054B0000-0x00000000054B1000-memory.dmp

                  Filesize

                  4KB

                • memory/4520-125-0x00000000054C0000-0x00000000054C1000-memory.dmp

                  Filesize

                  4KB

                • memory/4520-124-0x0000000000500000-0x00000000009BF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4520-128-0x0000000005480000-0x0000000005481000-memory.dmp

                  Filesize

                  4KB

                • memory/4520-133-0x0000000005510000-0x0000000005511000-memory.dmp

                  Filesize

                  4KB

                • memory/4520-167-0x0000000000500000-0x00000000009BF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4520-127-0x00000000054E0000-0x00000000054E1000-memory.dmp

                  Filesize

                  4KB

                • memory/4520-129-0x00000000054A0000-0x00000000054A1000-memory.dmp

                  Filesize

                  4KB

                • memory/4520-130-0x0000000005490000-0x0000000005491000-memory.dmp

                  Filesize

                  4KB

                • memory/4520-117-0x0000000000500000-0x00000000009BF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4520-455-0x0000000000500000-0x00000000009BF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4520-458-0x0000000000500000-0x00000000009BF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4520-502-0x0000000000500000-0x00000000009BF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4520-170-0x0000000000500000-0x00000000009BF000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4604-4-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

                  Filesize

                  4KB

                • memory/4604-3-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

                  Filesize

                  4KB

                • memory/4604-7-0x0000000004BA0000-0x0000000004BA1000-memory.dmp

                  Filesize

                  4KB

                • memory/4604-5-0x0000000004BF0000-0x0000000004BF1000-memory.dmp

                  Filesize

                  4KB

                • memory/4604-6-0x0000000004B80000-0x0000000004B81000-memory.dmp

                  Filesize

                  4KB

                • memory/4604-1-0x0000000077CD4000-0x0000000077CD6000-memory.dmp

                  Filesize

                  8KB

                • memory/4604-2-0x00000000004A0000-0x00000000007B2000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4604-0-0x00000000004A0000-0x00000000007B2000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4604-8-0x0000000004B90000-0x0000000004B91000-memory.dmp

                  Filesize

                  4KB

                • memory/4604-9-0x0000000004BE0000-0x0000000004BE1000-memory.dmp

                  Filesize

                  4KB

                • memory/4604-24-0x00000000004A0000-0x00000000007B2000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4604-10-0x0000000004C10000-0x0000000004C11000-memory.dmp

                  Filesize

                  4KB

                • memory/4604-11-0x0000000004C00000-0x0000000004C01000-memory.dmp

                  Filesize

                  4KB

                • memory/4916-461-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                  Filesize

                  972KB

                • memory/4916-439-0x0000000000400000-0x000000000063B000-memory.dmp

                  Filesize

                  2.2MB

                • memory/4916-442-0x0000000000400000-0x000000000063B000-memory.dmp

                  Filesize

                  2.2MB

                • memory/4972-70-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4972-26-0x0000000005030000-0x0000000005031000-memory.dmp

                  Filesize

                  4KB

                • memory/4972-29-0x0000000004FF0000-0x0000000004FF1000-memory.dmp

                  Filesize

                  4KB

                • memory/4972-111-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4972-28-0x0000000005060000-0x0000000005061000-memory.dmp

                  Filesize

                  4KB

                • memory/4972-27-0x0000000005010000-0x0000000005011000-memory.dmp

                  Filesize

                  4KB

                • memory/4972-415-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4972-35-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4972-23-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4972-32-0x0000000005050000-0x0000000005051000-memory.dmp

                  Filesize

                  4KB

                • memory/4972-25-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4972-456-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4972-33-0x0000000005080000-0x0000000005081000-memory.dmp

                  Filesize

                  4KB

                • memory/4972-112-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4972-31-0x0000000005020000-0x0000000005021000-memory.dmp

                  Filesize

                  4KB

                • memory/4972-34-0x0000000005070000-0x0000000005071000-memory.dmp

                  Filesize

                  4KB

                • memory/4972-271-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4972-30-0x0000000005000000-0x0000000005001000-memory.dmp

                  Filesize

                  4KB

                • memory/4972-460-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4972-135-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4972-48-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4972-36-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4972-168-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/5856-513-0x0000000000970000-0x0000000000C82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/6140-546-0x00000129599F0000-0x0000012959CAB000-memory.dmp

                  Filesize

                  2.7MB

                • memory/6140-548-0x00000129599F0000-0x0000012959CAB000-memory.dmp

                  Filesize

                  2.7MB

                • memory/6140-550-0x00000129599F0000-0x0000012959CAB000-memory.dmp

                  Filesize

                  2.7MB

                • memory/6140-552-0x00000129599F0000-0x0000012959CAB000-memory.dmp

                  Filesize

                  2.7MB

                • memory/6140-544-0x00000129599F0000-0x0000012959CAB000-memory.dmp

                  Filesize

                  2.7MB

                • memory/6140-542-0x00000129599F0000-0x0000012959CAB000-memory.dmp

                  Filesize

                  2.7MB

                • memory/6140-540-0x00000129599F0000-0x0000012959CAB000-memory.dmp

                  Filesize

                  2.7MB

                • memory/6140-538-0x00000129599F0000-0x0000012959CAB000-memory.dmp

                  Filesize

                  2.7MB

                • memory/6140-537-0x00000129599F0000-0x0000012959CAB000-memory.dmp

                  Filesize

                  2.7MB