Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 20:56

General

  • Target

    3802d8a89f33d99adfa41d68337eadca0c403dc6bb7fc62a03b7b152f09184bc.exe

  • Size

    2.9MB

  • MD5

    8de749e0b121eea01abc9b0659bfc487

  • SHA1

    28a90aa3924eb5beb72b6a4b3a6f7df2fd1cb321

  • SHA256

    3802d8a89f33d99adfa41d68337eadca0c403dc6bb7fc62a03b7b152f09184bc

  • SHA512

    4ee94e08a02ccaeb2bcfcddcb18e2191c7a7094de9a7dead7f6b842039e09fbe0f8039f6284a5b4b9c84e0fa9ee7225eea73034a95fba98ae96915a21db02690

  • SSDEEP

    49152:q352VdJdFFlQoCY6itLqSdkhYoFxVuvjer6wF:+wdrFFlVCY6CbkhlX0vk

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

risepro

C2

147.45.47.93:58709

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Extracted

Family

lumma

C2

https://affordcharmcropwo.shop/api

https://cleartotalfisherwo.shop/api

https://worryfillvolcawoi.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3802d8a89f33d99adfa41d68337eadca0c403dc6bb7fc62a03b7b152f09184bc.exe
    "C:\Users\Admin\AppData\Local\Temp\3802d8a89f33d99adfa41d68337eadca0c403dc6bb7fc62a03b7b152f09184bc.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3408
      • C:\Users\Admin\AppData\Local\Temp\1000055001\953c46ec11.exe
        "C:\Users\Admin\AppData\Local\Temp\1000055001\953c46ec11.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3528
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
          4⤵
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2028
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc8cf79758,0x7ffc8cf79768,0x7ffc8cf79778
            5⤵
              PID:3356
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1864,i,12918411063755157437,10492532187442293774,131072 /prefetch:2
              5⤵
                PID:736
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1864,i,12918411063755157437,10492532187442293774,131072 /prefetch:8
                5⤵
                  PID:4456
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2280 --field-trial-handle=1864,i,12918411063755157437,10492532187442293774,131072 /prefetch:8
                  5⤵
                    PID:4064
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1864,i,12918411063755157437,10492532187442293774,131072 /prefetch:1
                    5⤵
                      PID:4692
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3268 --field-trial-handle=1864,i,12918411063755157437,10492532187442293774,131072 /prefetch:1
                      5⤵
                        PID:1336
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4792 --field-trial-handle=1864,i,12918411063755157437,10492532187442293774,131072 /prefetch:1
                        5⤵
                          PID:3432
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4976 --field-trial-handle=1864,i,12918411063755157437,10492532187442293774,131072 /prefetch:1
                          5⤵
                            PID:60
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4636 --field-trial-handle=1864,i,12918411063755157437,10492532187442293774,131072 /prefetch:8
                            5⤵
                              PID:4660
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3784 --field-trial-handle=1864,i,12918411063755157437,10492532187442293774,131072 /prefetch:8
                              5⤵
                              • Modifies registry class
                              PID:2896
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3424 --field-trial-handle=1864,i,12918411063755157437,10492532187442293774,131072 /prefetch:8
                              5⤵
                                PID:5448
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1864,i,12918411063755157437,10492532187442293774,131072 /prefetch:8
                                5⤵
                                  PID:5536
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2668 --field-trial-handle=1864,i,12918411063755157437,10492532187442293774,131072 /prefetch:2
                                  5⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1052
                            • C:\Windows\SysWOW64\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                              3⤵
                              • Loads dropped DLL
                              PID:5660
                              • C:\Windows\system32\rundll32.exe
                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                4⤵
                                • Blocklisted process makes network request
                                • Loads dropped DLL
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5680
                                • C:\Windows\system32\netsh.exe
                                  netsh wlan show profiles
                                  5⤵
                                    PID:5728
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\808065738166_Desktop.zip' -CompressionLevel Optimal
                                    5⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5832
                              • C:\Users\Admin\AppData\Local\Temp\1000056001\5aca9a8f8a.exe
                                "C:\Users\Admin\AppData\Local\Temp\1000056001\5aca9a8f8a.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                PID:6116
                              • C:\Windows\SysWOW64\rundll32.exe
                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                3⤵
                                • Blocklisted process makes network request
                                • Loads dropped DLL
                                PID:3964
                              • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5844
                              • C:\Users\Admin\AppData\Local\Temp\1000059001\amert.exe
                                "C:\Users\Admin\AppData\Local\Temp\1000059001\amert.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Drops file in Windows directory
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of FindShellTrayWindow
                                PID:2896
                          • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                            C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3044
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:660
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:8
                              1⤵
                                PID:5508
                              • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5856
                              • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
                                C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5348
                                • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  PID:660
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                    3⤵
                                      PID:5672
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                      3⤵
                                        PID:4364
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 660 -s 876
                                        3⤵
                                        • Program crash
                                        PID:116
                                  • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                    C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3512
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 660 -ip 660
                                    1⤵
                                      PID:3508

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      360B

                                      MD5

                                      5af3f21a0c89e47b566a3b2a983408e8

                                      SHA1

                                      02b68c9d1c91c21a1b0e16fa245439be51f31ba0

                                      SHA256

                                      f0bff319120f39f0d987b158df059c7317957b7bbc133fb491ae165500a7e09b

                                      SHA512

                                      164b13ac76f059d5f7f2afbcf8c4550478f7aa7d7374a57945a29e781d99f93344358b885d6624725263d86b32756ef81f4d35d509f6fc48c449aee5c9dd414b

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                      Filesize

                                      1KB

                                      MD5

                                      d6fcd64d0667badd6dab11e46e04fb68

                                      SHA1

                                      da598608484538fa9fd82989cf6dce064d1406c7

                                      SHA256

                                      176270abd5d6a35e8de1cf4959052c062a7c92b2bdf0a2e3549e44d682499ba4

                                      SHA512

                                      b21e11af5d968c161590dc373b2ae52e1fc67ac055d30e509d2daa1cb6c9c7472400d04bb565d23e737d5e447ea3de6b4c87c88069beb3aaf846231a4099bb05

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      539B

                                      MD5

                                      3fd44eed44de08588e42537d062064c6

                                      SHA1

                                      15fb52620b8f50aa6c631ea604b4e213d008e7f6

                                      SHA256

                                      ce64824fc287b25cbfc6048b65d2b8f29397341b6afbaf8e07e2055d7cf42236

                                      SHA512

                                      05d67c1d4b5b1d4c9de7459b0783ace3bec77da1b12d75449169a1c2ffa23af63b05db97950b3713748448181d2c9adaa3bfc5fd20aa67785098c3c387adb26c

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      539B

                                      MD5

                                      adbaae755c0378e19aa6ba5c091cd721

                                      SHA1

                                      5a3243ce8793ba8fa36f2d740b87f728437d8492

                                      SHA256

                                      a846668188b374ccc5dce74c8edf25e1087f0cc132ae713cea859ac31c297e9e

                                      SHA512

                                      e424edeb7d4e17f0d163c5de3895e12bb5052ae772170ddcafdb0b643c49986a88a13f1f8ec601402caa87a1a465b3d2a79b8a54d45b68b21586b5f07bad7f78

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      10938c225b8053de59be4b3641f12e03

                                      SHA1

                                      114ab392dfa6e552befc45948e606d31cf9e4ef7

                                      SHA256

                                      c38a176b2a13a853eba0351c512017afc2b98c5857855042bc3553011848f1d2

                                      SHA512

                                      82270b194a4553b63e0f72076074f8256594f0ff4908c94f66d974d988b4447d8664d97d3cacc99a0fbdfd226c792618c5b5cd6fb0d68c89fc592662e08ab73b

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      b34cf8281c8ecbe300b6e49992467f57

                                      SHA1

                                      59c12bcc0d01718d4d6b3516e0e8d92c42a10de1

                                      SHA256

                                      499bafa5428700249dfc5b7bfa8dce85dd36895497f7bdd9a33d105ca1a4118b

                                      SHA512

                                      e3445806280df7ffb31c9c6e41026e831d38ad2ad28d069a466baee887e29ae49c237f17cec3606110ed7b36fca1111153bd5eee67c60e657a84108a5d8817e8

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      14245f9100070e20b06c4fb4e6d12ca8

                                      SHA1

                                      d1ffebdeeac64503280c4cd4acf92a3cfe794792

                                      SHA256

                                      03d8aa9b3012172ec64f27ebd76e9508eb118e1624c6cd283d7e42b8ca3dbfd6

                                      SHA512

                                      273b56161e62898ebc49b98a45577a7ebea2d12755a1d594b9f22f4fa10fd0e1ef57cb1c858c6f7fe4d2a7ea6d5a22f872d897502b9c2f96b821fde9bcad11ac

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      264KB

                                      MD5

                                      3297ce56d8e7fedca5686943b896f86c

                                      SHA1

                                      70735c272924aa349d65701152dbbd7eec7d8131

                                      SHA256

                                      4e4dc0acbe79e29101ac4e40a400180de43b4f6218b2316a70dee72ceb006b08

                                      SHA512

                                      e195709509aa4aa99b6bb6c2058827e7cbaccc077e77d5e5fe80c08638e17fa12f28df58fe055ae3e3953502a7ad9765e49a57c72c4cbdfbf87be7aecbec7374

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                      Filesize

                                      2B

                                      MD5

                                      99914b932bd37a50b983c5e7c90ae93b

                                      SHA1

                                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                      SHA256

                                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                      SHA512

                                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                      Filesize

                                      2.9MB

                                      MD5

                                      8de749e0b121eea01abc9b0659bfc487

                                      SHA1

                                      28a90aa3924eb5beb72b6a4b3a6f7df2fd1cb321

                                      SHA256

                                      3802d8a89f33d99adfa41d68337eadca0c403dc6bb7fc62a03b7b152f09184bc

                                      SHA512

                                      4ee94e08a02ccaeb2bcfcddcb18e2191c7a7094de9a7dead7f6b842039e09fbe0f8039f6284a5b4b9c84e0fa9ee7225eea73034a95fba98ae96915a21db02690

                                    • C:\Users\Admin\AppData\Local\Temp\1000055001\953c46ec11.exe

                                      Filesize

                                      1.1MB

                                      MD5

                                      86c89b35f1a98a835898997c85fe512b

                                      SHA1

                                      361bcd16dcd2c5e3e9825084973fac56078139b2

                                      SHA256

                                      b1399d79f17926760301dfc4409dc6dcf2fe7b405af3bfad7bde2a5245424962

                                      SHA512

                                      65f7f834a5ea1573a62800e2935416c85b4b0b4151e9d0086d064cbcb4a0152d53e36a64cc1c4aebfe5c16cbd89949f1f359caef737d5e8a572133c5b2086511

                                    • C:\Users\Admin\AppData\Local\Temp\1000056001\5aca9a8f8a.exe

                                      Filesize

                                      2.2MB

                                      MD5

                                      4b0d0c94d11cb1566e4139e3a8897af9

                                      SHA1

                                      e627fe1a11f5489b5c64f3102158f673a5c9f55b

                                      SHA256

                                      71aedc9866a19f8b4b24245196ca0eebf4aed41bfe6fe8d84dbe6ebcbfe0e7eb

                                      SHA512

                                      7eb1b84591a7eb9cb31b36cbdcb9a7a8d361025aa4338fb5d573b969592f7b2c9bb33f3794ab34f992e232eac6c10c2e92d8b8cc3e16c1e5955f6b7fdcb2f455

                                    • C:\Users\Admin\AppData\Local\Temp\1000059001\amert.exe

                                      Filesize

                                      1.8MB

                                      MD5

                                      3996a3a682941cc65cc868d457d62d34

                                      SHA1

                                      574ccd8f67a879a98b13a64aded9e5628e3572fe

                                      SHA256

                                      205010ffb506d61705281f0a41608f15759700d2d39de55a27248ac13d270025

                                      SHA512

                                      9900ae8a799cf76cfc67536659efeec99c772212d5e91f1663c0a2c5211430c42141b6886f62e4f85cf76d11634f8c6a0421f47c1be1c4960a7391e9c1428f77

                                    • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe

                                      Filesize

                                      321KB

                                      MD5

                                      1c7d0f34bb1d85b5d2c01367cc8f62ef

                                      SHA1

                                      33aedadb5361f1646cffd68791d72ba5f1424114

                                      SHA256

                                      e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c

                                      SHA512

                                      53bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vfhclvr4.cp5.ps1

                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                      Filesize

                                      109KB

                                      MD5

                                      726cd06231883a159ec1ce28dd538699

                                      SHA1

                                      404897e6a133d255ad5a9c26ac6414d7134285a2

                                      SHA256

                                      12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                      SHA512

                                      9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                    • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                      Filesize

                                      1.2MB

                                      MD5

                                      15a42d3e4579da615a384c717ab2109b

                                      SHA1

                                      22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                      SHA256

                                      3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                      SHA512

                                      1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                    • \??\pipe\crashpad_2028_TWPOAKTPCWHYJIEE

                                      MD5

                                      d41d8cd98f00b204e9800998ecf8427e

                                      SHA1

                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                      SHA256

                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                      SHA512

                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                    • memory/2132-10-0x0000000004D80000-0x0000000004D81000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2132-6-0x0000000004D60000-0x0000000004D61000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2132-25-0x00000000004A0000-0x00000000007B8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/2132-13-0x00000000004A0000-0x00000000007B8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/2132-1-0x0000000077E24000-0x0000000077E26000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/2132-11-0x0000000004D70000-0x0000000004D71000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2132-9-0x0000000004D50000-0x0000000004D51000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2132-8-0x0000000004D00000-0x0000000004D01000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2132-2-0x00000000004A0000-0x00000000007B8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/2132-3-0x0000000004D20000-0x0000000004D21000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2132-4-0x0000000004D30000-0x0000000004D31000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2132-5-0x0000000004D10000-0x0000000004D11000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2132-0-0x00000000004A0000-0x00000000007B8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/2132-7-0x0000000004CF0000-0x0000000004CF1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2896-342-0x0000000000870000-0x0000000000D28000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/3044-62-0x0000000004D40000-0x0000000004D41000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3044-58-0x0000000004D50000-0x0000000004D51000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3044-56-0x0000000004D20000-0x0000000004D21000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3044-63-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3044-59-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3044-61-0x0000000004CF0000-0x0000000004CF1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3044-60-0x0000000004D00000-0x0000000004D01000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3044-57-0x0000000004D10000-0x0000000004D11000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3044-55-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3044-44-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-73-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-359-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-24-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-295-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-230-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-26-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-97-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-28-0x0000000005270000-0x0000000005271000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3408-32-0x0000000005240000-0x0000000005241000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3408-261-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-218-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-31-0x0000000005230000-0x0000000005231000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3408-30-0x0000000005290000-0x0000000005291000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3408-29-0x0000000005250000-0x0000000005251000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3408-397-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-34-0x00000000052B0000-0x00000000052B1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3408-199-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-116-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-357-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-355-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-353-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3408-33-0x00000000052C0000-0x00000000052C1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3408-27-0x0000000005260000-0x0000000005261000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3408-325-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3512-381-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/4364-412-0x0000000000400000-0x000000000044C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/4364-415-0x0000000000400000-0x000000000044C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/5348-420-0x0000000000CB0000-0x0000000001168000-memory.dmp

                                      Filesize

                                      4.7MB

                                    • memory/5832-166-0x00007FFC893E0000-0x00007FFC89EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5832-150-0x0000020D57BA0000-0x0000020D57BAA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/5832-149-0x0000020D57BB0000-0x0000020D57BC2000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/5832-148-0x0000020D579E0000-0x0000020D579F0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/5832-138-0x0000020D579E0000-0x0000020D579F0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/5832-137-0x00007FFC893E0000-0x00007FFC89EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5832-136-0x0000020D57A20000-0x0000020D57A42000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/5844-270-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-238-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-239-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-240-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-241-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-242-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-243-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-244-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-245-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-247-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-246-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-248-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-249-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-250-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-251-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-252-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-253-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-254-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-255-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-256-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-257-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-258-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-237-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/5844-262-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-259-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-265-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-266-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-263-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-268-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-272-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-275-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5844-233-0x0000000000400000-0x00000000009A6000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/5856-269-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/5856-264-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/5856-274-0x0000000005470000-0x0000000005471000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/5856-276-0x00000000054C0000-0x00000000054C1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/5856-278-0x0000000005460000-0x0000000005461000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/5856-279-0x0000000005480000-0x0000000005481000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/5856-280-0x00000000054B0000-0x00000000054B1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/5856-277-0x0000000005450000-0x0000000005451000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/5856-273-0x0000000005490000-0x0000000005491000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/5856-289-0x0000000000C90000-0x0000000000FA8000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/6116-180-0x0000000004A00000-0x0000000004A01000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/6116-354-0x0000000000C10000-0x00000000011AB000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/6116-296-0x0000000000C10000-0x00000000011AB000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/6116-220-0x0000000000C10000-0x00000000011AB000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/6116-219-0x0000000000C10000-0x00000000011AB000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/6116-217-0x0000000000C10000-0x00000000011AB000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/6116-179-0x0000000004A10000-0x0000000004A11000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/6116-235-0x0000000000C10000-0x00000000011AB000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/6116-343-0x0000000000C10000-0x00000000011AB000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/6116-183-0x0000000004A60000-0x0000000004A61000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/6116-182-0x0000000004A90000-0x0000000004A91000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/6116-271-0x0000000000C10000-0x00000000011AB000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/6116-184-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/6116-356-0x0000000000C10000-0x00000000011AB000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/6116-187-0x0000000004AC0000-0x0000000004AC2000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/6116-358-0x0000000000C10000-0x00000000011AB000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/6116-185-0x0000000004A40000-0x0000000004A41000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/6116-186-0x00000000049F0000-0x00000000049F1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/6116-382-0x0000000000C10000-0x00000000011AB000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/6116-181-0x0000000004A70000-0x0000000004A71000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/6116-178-0x0000000004A80000-0x0000000004A81000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/6116-177-0x0000000004A20000-0x0000000004A21000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/6116-176-0x0000000004A50000-0x0000000004A51000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/6116-175-0x0000000000C10000-0x00000000011AB000-memory.dmp

                                      Filesize

                                      5.6MB