Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250211-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2025 16:40

General

  • Target

    daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe

  • Size

    2.0MB

  • MD5

    cc8bd47e840a98a8ee43b37608275684

  • SHA1

    263b14b75634c53aa33b0ee108743fcfd8d0e362

  • SHA256

    daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32

  • SHA512

    da32624bd08d85a4db92a1214c5198e0b19b0476b1517ad789dbce4e7500d841c76500766e7ac46605457489244f98764fd7bebc51ac4f410eeebab8e98df2fa

  • SSDEEP

    49152:XPEpksGULjU7cAGVRHxOOonAjZPeDaAVDjzP/V/Oc:XcpkCfUIvVRjoSZCzVmc

Malware Config

Extracted

Family

phorphiex

C2

http://185.215.113.66/

http://91.202.233.141/

Wallets

0xCa90599132C4D88907Bd8E046540284aa468a035

TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6

qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r

XryzFMFVpDUvU7famUGf214EXD3xNUSmQf

rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9

AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z

LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT

MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q

4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK

15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC

1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK

ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp

3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc

3ESHude8zUHksQg1h6hHmzY79BS36L91Yn

DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA

t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh

stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj

bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2

bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr

bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd

Attributes
  • mutex

    753f85d83d

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36

Signatures

  • Phorphiex family
  • Phorphiex payload 1 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Downloads MZ/PE file 3 IoCs
  • Executes dropped EXE 36 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 56 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 32 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
    "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"
    1⤵
    • Downloads MZ/PE file
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Users\Admin\AppData\Local\Temp\8618.exe
      "C:\Users\Admin\AppData\Local\Temp\8618.exe"
      2⤵
      • Downloads MZ/PE file
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Users\Admin\AppData\Local\Temp\2285919817.exe
        C:\Users\Admin\AppData\Local\Temp\2285919817.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1408
        • C:\Windows\sysnldcvmr.exe
          C:\Windows\sysnldcvmr.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:452
    • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
      "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --local-service
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1176
      • C:\Users\Admin\AppData\Local\Temp\8E55.exe
        "C:\Users\Admin\AppData\Local\Temp\8E55.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2128
        • C:\Users\Admin\AppData\Local\Temp\456225277.exe
          C:\Users\Admin\AppData\Local\Temp\456225277.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2688
    • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
      "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --local-control
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:764
      • C:\Users\Admin\AppData\Local\Temp\8E75.exe
        "C:\Users\Admin\AppData\Local\Temp\8E75.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4948
        • C:\Users\Admin\AppData\Local\Temp\2925925633.exe
          C:\Users\Admin\AppData\Local\Temp\2925925633.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2656
    • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
      "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend
      2⤵
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Users\Admin\AppData\Local\Temp\A21C.exe
        "C:\Users\Admin\AppData\Local\Temp\A21C.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Users\Admin\AppData\Local\Temp\14918327.exe
          C:\Users\Admin\AppData\Local\Temp\14918327.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1572
      • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
        "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:4840
        • C:\Users\Admin\AppData\Local\Temp\BA47.exe
          "C:\Users\Admin\AppData\Local\Temp\BA47.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4424
          • C:\Users\Admin\AppData\Local\Temp\201728786.exe
            C:\Users\Admin\AppData\Local\Temp\201728786.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3664
        • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
          "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend
          4⤵
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          PID:4092
          • C:\Users\Admin\AppData\Local\Temp\D282.exe
            "C:\Users\Admin\AppData\Local\Temp\D282.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4676
            • C:\Users\Admin\AppData\Local\Temp\777116379.exe
              C:\Users\Admin\AppData\Local\Temp\777116379.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2776
          • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
            "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend
            5⤵
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            PID:1920
            • C:\Users\Admin\AppData\Local\Temp\EAFC.exe
              "C:\Users\Admin\AppData\Local\Temp\EAFC.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2408
              • C:\Users\Admin\AppData\Local\Temp\219524223.exe
                C:\Users\Admin\AppData\Local\Temp\219524223.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:5452
        • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
          "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend
          4⤵
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          PID:4888
          • C:\Users\Admin\AppData\Local\Temp\EAFE.exe
            "C:\Users\Admin\AppData\Local\Temp\EAFE.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1460
            • C:\Users\Admin\AppData\Local\Temp\86746519.exe
              C:\Users\Admin\AppData\Local\Temp\86746519.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:5748
      • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
        "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        PID:384
        • C:\Users\Admin\AppData\Local\Temp\D283.exe
          "C:\Users\Admin\AppData\Local\Temp\D283.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3536
          • C:\Users\Admin\AppData\Local\Temp\783416787.exe
            C:\Users\Admin\AppData\Local\Temp\783416787.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2512
        • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
          "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend
          4⤵
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          PID:2800
          • C:\Users\Admin\AppData\Local\Temp\EAED.exe
            "C:\Users\Admin\AppData\Local\Temp\EAED.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2576
            • C:\Users\Admin\AppData\Local\Temp\245664174.exe
              C:\Users\Admin\AppData\Local\Temp\245664174.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:5408
      • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
        "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        PID:1048
        • C:\Users\Admin\AppData\Local\Temp\EAFF.exe
          "C:\Users\Admin\AppData\Local\Temp\EAFF.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2736
          • C:\Users\Admin\AppData\Local\Temp\164314122.exe
            C:\Users\Admin\AppData\Local\Temp\164314122.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5384
    • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
      "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend
      2⤵
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:540
      • C:\Users\Admin\AppData\Local\Temp\BA48.exe
        "C:\Users\Admin\AppData\Local\Temp\BA48.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2924
        • C:\Users\Admin\AppData\Local\Temp\2113028633.exe
          C:\Users\Admin\AppData\Local\Temp\2113028633.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3396
      • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
        "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:2904
        • C:\Users\Admin\AppData\Local\Temp\D292.exe
          "C:\Users\Admin\AppData\Local\Temp\D292.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4792
          • C:\Users\Admin\AppData\Local\Temp\2989029365.exe
            C:\Users\Admin\AppData\Local\Temp\2989029365.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1472
        • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
          "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend
          4⤵
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          PID:3960
          • C:\Users\Admin\AppData\Local\Temp\EB0D.exe
            "C:\Users\Admin\AppData\Local\Temp\EB0D.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4596
            • C:\Users\Admin\AppData\Local\Temp\86116111.exe
              C:\Users\Admin\AppData\Local\Temp\86116111.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:5664
      • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
        "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        PID:1408
        • C:\Users\Admin\AppData\Local\Temp\EAFD.exe
          "C:\Users\Admin\AppData\Local\Temp\EAFD.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4000
          • C:\Users\Admin\AppData\Local\Temp\167456163.exe
            C:\Users\Admin\AppData\Local\Temp\167456163.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5712
    • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
      "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend
      2⤵
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      PID:3860
      • C:\Users\Admin\AppData\Local\Temp\D293.exe
        "C:\Users\Admin\AppData\Local\Temp\D293.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1548
        • C:\Users\Admin\AppData\Local\Temp\2142616533.exe
          C:\Users\Admin\AppData\Local\Temp\2142616533.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4484
      • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
        "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        PID:4052
        • C:\Users\Admin\AppData\Local\Temp\EAEC.exe
          "C:\Users\Admin\AppData\Local\Temp\EAEC.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4192
          • C:\Users\Admin\AppData\Local\Temp\246294583.exe
            C:\Users\Admin\AppData\Local\Temp\246294583.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5600
    • C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
      "C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend
      2⤵
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      PID:3896
      • C:\Users\Admin\AppData\Local\Temp\EB0C.exe
        "C:\Users\Admin\AppData\Local\Temp\EB0C.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4852
        • C:\Users\Admin\AppData\Local\Temp\274734325.exe
          C:\Users\Admin\AppData\Local\Temp\274734325.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5560
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7N0Q5NTVBNDgtREM5RS00M0I1LUJBNjItMUFBM0QxMzc0NUU1fSIgdXNlcmlkPSJ7NTlGODlGMDQtMkQ2RC00OEE5LUIxN0ItODc5NjdGMjYzQ0I0fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7NERGRUE0NkUtREI2Qi00MjMwLTlGN0QtMTlCMTlDNzE0OEVEfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODIxNjkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1MzE4NTEwMTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTU1NzE3NjY1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:5816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2285919817.exe

    Filesize

    79KB

    MD5

    0c883b1d66afce606d9830f48d69d74b

    SHA1

    fe431fe73a4749722496f19b3b3ca0b629b50131

    SHA256

    d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1

    SHA512

    c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5

  • C:\Users\Admin\AppData\Local\Temp\8618.exe

    Filesize

    10KB

    MD5

    8ce09f13942ab5bcb81b175996c8385f

    SHA1

    6fa685d66ac5fff4e9d984dc1903c47a1a6b6cbd

    SHA256

    757bf8be40693456e7cdee5c53416d1cb223da5f7d0b9d55f4aca95f6a57605d

    SHA512

    11ae4651b3dd55355b2cb7bf2f6b042dea47bb895f898d967d63ee652652c633cc5becf31cb2fd7f8797b238b264195d09d4e08211b797eae29e2a7bb31b277f

  • C:\Users\Admin\AppData\Roaming\AnyDesk\ad.trace

    Filesize

    31KB

    MD5

    620b27a9481e6937c33138b494387532

    SHA1

    af4b98ecf4f114829e6b3053ea9ba9c4adae3fc1

    SHA256

    c012da5cd4fd87cc9594e3995329222cef85ab40261792066035c9065bbd772d

    SHA512

    8a8f84514aa2e207fba73c98d116f87b3b32a7c428bc5f4c16458029600ef3086f9aa726ca630c674b578a17ad6ab1a7f6e4b24c1bb549a2b9050128f380cf49

  • C:\Users\Admin\AppData\Roaming\AnyDesk\ad.trace

    Filesize

    43KB

    MD5

    988d23a0813c74f74cfc73c86ce08f27

    SHA1

    7532c3b45736a4648710b410fa82f9828e22ad08

    SHA256

    72b245debe947fc34343de9929dd668fc18a0071a7ea2fdee261338aeb85da9a

    SHA512

    4f0d1693b9b00266af56eff4c813cbbfee833917d687d70351156dc00e6e4f698bdad25df321510a29fac0bee82d68fe37e8afc00ee5a0bcdbfaf771c944cce0

  • C:\Users\Admin\AppData\Roaming\AnyDesk\ad.trace

    Filesize

    45KB

    MD5

    536adec89918d4aec6179206b88c1f28

    SHA1

    238e646a6fafded86d70857c5b2e78d65e1212ac

    SHA256

    b2bc6d4653627c5e314801e1c13dc9028e6e886baa6f699ffdfc79e21184114f

    SHA512

    3137e31eac98891a20608fd81285ba986b5aff297744e2bf35c4ecc11b4dacacc290b6a080f587d94b5c212d5f2eff7410505550c442a97688cfb12e1377abc4

  • C:\Users\Admin\AppData\Roaming\AnyDesk\ad.trace

    Filesize

    48KB

    MD5

    683138701a57c4aea4368f31e5de2251

    SHA1

    632b318fdcd56fb3278cffe35948734e82cfe5a4

    SHA256

    06f867fea174e88f6d1bc46e9423958a0bebcc4ac8e3e1537827aebe4af9931f

    SHA512

    f10ad732942a03d65a8566acafd956f8f9a1b187d369d7235cbe0784df7ec3803967d2e40aa12b6cefbd85753d598882880395d26a2447a6717cac2864069e2e

  • C:\Users\Admin\AppData\Roaming\AnyDesk\ad.trace

    Filesize

    4KB

    MD5

    50c2f1e0b83edf7464954836bcab4e7a

    SHA1

    bc6af20ffda89a6e4351e1ade7fabaaaa5aae6d9

    SHA256

    a1c6ed722d650df32696281eba2ee3ae43a8dd383a54b1a07c98e0f6b1c8b9c3

    SHA512

    77542576f76651c352ff069108efffa84baee4f7ef2ad5c82834121f37adbc992c9a23e2b8ed15323daad911c49c468841c1a67e387659c416b4bd7daf166755

  • C:\Users\Admin\AppData\Roaming\AnyDesk\ad.trace

    Filesize

    15KB

    MD5

    87653b6ee790dfea6602d3bd2ff4c3a3

    SHA1

    7c98900fae4bcd74ca12e855ff52cc9f1f33ae3f

    SHA256

    fc0ad996173d990ff15953fb8e856e01d935a0f356940515059fee33abb4ec10

    SHA512

    c892cca622b49647ba85fe3067ea72972e7ea9e507a99e3857ebd31d137379de17c807f0af7ef33f77af3446d526595214095b44be2eb51317da2e88438b93fc

  • C:\Users\Admin\AppData\Roaming\AnyDesk\ad.trace

    Filesize

    20KB

    MD5

    2668f3837ddb2ecb67358ecace110b12

    SHA1

    2a3fffd69285a056f0ed59ec6a23051e515a05a3

    SHA256

    373b961e4530f591bf6c0101761f0971fd25c8cb00b1e1095f7705295385ffdc

    SHA512

    9a23225f617dbd9c81486249eae83aa06380e374e4a360651dafd2acaf495ba5925d45491cd9265584a9f76a1a09366e43277ae990cb49e245ae2c1b628d2fd2

  • C:\Users\Admin\AppData\Roaming\AnyDesk\service.conf

    Filesize

    2KB

    MD5

    6ea9b6d3570290bcffb41cfa1775a3af

    SHA1

    0da272171529afbcfa0c4f54e89b273f65bebc28

    SHA256

    87dc616f96847dcb22f9dd52a62fc18bb7c97b2709545fdef62076c4eacd7feb

    SHA512

    a955c3a89877d76161a651a51f1626cc661f97149dbe51cbc14f9ff0016a0b28bf6ae622befdc0a21e9ea33c405375cd8464f11cc8888c75f70eab2b2c7db6e8

  • C:\Users\Admin\AppData\Roaming\AnyDesk\system.conf

    Filesize

    105B

    MD5

    788efe12f6439dec8aa394234cc29b08

    SHA1

    5f32b101add75331247ec3397496924e3791b65b

    SHA256

    2d27061afec8d92c4b1c163136d4e187ec3ad2b4e8583ab9087d6b970302d07f

    SHA512

    4f581f3bd45e5af9a84fa5c29f6268fbc10492a88110d4c27d67d9ad7e24b882df4ee96cf4107ff64cbd1456b79ed31a2adb5415db6949df0133c40895fa0978

  • C:\Users\Admin\AppData\Roaming\AnyDesk\user.conf

    Filesize

    132B

    MD5

    123c524682c9ff72ec7924efdb41b28c

    SHA1

    1e696d9f3e2bf149773186496c7ab9d5df35f9dd

    SHA256

    e67a68c5e7fa7d227a2fbdd50789472dbbf58471664b1d9b776a579de2757ff6

    SHA512

    676e5e2c4ff76b1942c1013a7ee9cd88b42424798e07c699c0cb534575bf4f6908366fe9c9a7e17d81e3f2209bf3fd7dd31463cdab5eea5d19475c10c00f696b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0HVQW03YJFNG3PRGHWCC.temp

    Filesize

    4KB

    MD5

    de89e40873d1073eef1a84272fddcd6a

    SHA1

    d52d52a590f0119d50092a6f60cc24fcc6b98916

    SHA256

    cc4e754cf2e19f30416c516beb9363ba2c1b40b6e9d59c6165951b0ee7572390

    SHA512

    32aa12b9a31b56e4e2415bf6d9fee928f9e7d977c9b4b961a711367e56123386a91814846a635840afdcdd9ac18f33db6057015a42d12892348ba019e5587b81

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\26YKM6JW0F75FKDDHCI5.temp

    Filesize

    4KB

    MD5

    909244f5ae12abea93590312a0d7d25e

    SHA1

    db62f5032288b20cff29923864ba9645376212e9

    SHA256

    30c24e535f036281037238ac62bab73ce10da17a04979933678245e40fef677a

    SHA512

    53b88682af226ad167becf6d8c546119206bed60c7e90fef2e9fde155efe55ad97eb3e3707fc3e054a330adffff2db1246a64e31d1b415cec62316a237ea64af

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    a671cbae07f8d7749efc4e66406535a2

    SHA1

    8d9cb836029ef62d8aed6495c01a50f375dfb4f5

    SHA256

    cb42fd3ade6e8e023c7ebc1555049aa9777052ece0286668e02fad10d08d9426

    SHA512

    d8fe455c2ff05d34a153adcfafca00d47d7b8b525b3b9b1f01576f08acec23e73c2363bb507eadfbe94444c20e0704e464f03d0f6bf0d76f9c441e07d7c688f8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    c83e7397a6cc94121f584a956b0ab519

    SHA1

    851be7cdfc08989af4543dc8a972a5c650159c19

    SHA256

    890a197687328aba2712811dee1d11ca2311d8c78abbb85eeb1edffe33b7c4c3

    SHA512

    f0badcd4a6bd3f2f81ed39747d2e33ae74e9fce8e6ba30cbca4f7bd68a8a9987522102c63dd88a1744ef379ab2d50acc11184ddf30af9acdb8425dd1e936473b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    dc3923974ad74ae3772f27a2c0795c24

    SHA1

    7df35b9a81bb6a337a67ca2d4e50eb09eeafe5f3

    SHA256

    254af1dd9e315a7e918d46d49b45a37f87a0205d92431f50d03e77b4738b490a

    SHA512

    3d56328f7ecfe91d9cb6cd945e923d4abd7a5b4d39331cf46346f005477b920e59ce4b24b0fce0d437061cf75dd25fdbc5fd1bb7feae9f42a68d8ac25f9476da

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    1fd12be76720acd7b7cbfbc386f0c507

    SHA1

    1e75623b71e50390aaa99f929dd9d2279bc8cdeb

    SHA256

    f8efbd6409dc7ec6f251c91404d705ce9ce20921d2209cee272484faba3e430a

    SHA512

    093a0c96d7600959c2c52020552ffd05c81dde0afb35b748a85badf3f8fcb157c7026d6de3be71a003487712ee4eea7ee87422509d975073fd706e383e81f012

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    c79ecf747980f188ad655aa9517c0376

    SHA1

    7c5b3efb27824d8a8c40d2a14ef40a97a3ea7ea7

    SHA256

    dc583fc13fa9455528eab28e0973595681ad07955f0347101dc34f37f7aeb6ba

    SHA512

    ae3510362d4b9f0ff8a2438a86e54b5aaeee45ed157832f86e1a07dc900ee41bc9e66b2bc110f7f9b482663478b493ed0f62206a7f926ed5ebb6f7b7167e572c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    52caa84900d626f8cd2cf8eeac179694

    SHA1

    f2809844cc0a3e538a22cfa352d356e64f5242fc

    SHA256

    905aa949c0b54019695523500acdff99605c33766e904d12e5221c935febc1da

    SHA512

    1ece2d3612f895704619eede1f5f07396e880c86d0f3308edd14a9edb4f3a4d17fc668eb6fd9ea71a114e1995e3df622e128cbd12464f4fd23da0f54586aa6ed

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    8bc1674597855788cd92ef577e7dbc18

    SHA1

    05811a3b796fecdd505172f5ab17d2e783fd9f6b

    SHA256

    715549c2ea5a272589c2b2e1c80006ba6f8877104c436f79840f11a4cc754ebd

    SHA512

    0a311d50d5eae4556ac58670f77f093e0fbe240af0009135a66e9dd9756d164055bb7522252b1c5c060f2c3fad3cf57d9264f6e139f559c886e70bc8765c7af8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    d5819949423d5a9c953bfdbca23270e9

    SHA1

    b7e16f0f835c88db27f4cf52fd8af7de874bbbc5

    SHA256

    545516276eda0a0fa289625537ec3db709ff5fd06de04e271a6c9ba5bb0eed9d

    SHA512

    47236b1d619d362e144f6bcfd87d8cd5834759b66c5fda61e498a5f4c411cde7ce25672f4a859ba734ba117aac53999d56a8a5de14b892a8583a95e37209b7eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    804883a236d4dd3b6f4cbc7ad5f765be

    SHA1

    d90239467caa2288a94a2e908e3f68d06273f422

    SHA256

    1e9e25075d8788fd9a5273d198e98eb518bfef86cfa87f9223e455a38e0bb512

    SHA512

    c7c49d1ed559fb0dac694f6583aaf5bd2cdcabd84524596a926929fdd7fd524d7d9d398b504d09b50c00c264f3ca583f82f4d57180462634558bd77009fb8307

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    b8731b6a402332cabc9274826be66d99

    SHA1

    4102eeb01d6f205a5c480ee6e5a7318ca2b3eed8

    SHA256

    ef78fbdf5d428496bee449de45bcdeeb48504ea1ff37be243b7a655a2bf6112b

    SHA512

    c11b2e09199ef17790c02b5e5d8c48720fb2e5773ce96418bb2fb971ea597100e1dbb2e7d55936c8602308cb06530bbb0ac14af76973f5386b9f0012d2a1729e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    4b9cfb71e6253955a9fce84d0fc1b396

    SHA1

    aa98bc2eeb624e8f05e27b4c9e76b40edf180a86

    SHA256

    ab43ea5d99a7dfc67670466cbf3776f4a8e6461dc7c0cd07c84520351f71f7a4

    SHA512

    7159c139ddece657520ced798574406da1c1e5e3d93c182a5c7ec4f22d3284d61eb1482acb574fbe8a526fdb0b5b36168a443c27d38dd1092a634d5eb0644081

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    e8224c39b609a8e60537646a4a0e2774

    SHA1

    b097447e657d5031cb40e7f9ce4c0bd591f5dd4f

    SHA256

    c51bbb56fe48b2d5a9d1694bd3d58b0e88e05ce79aaf4efeed758f15bda13686

    SHA512

    41d1804898f8417e10a036ebdd6a4cb48c965460f60e84fa56c4fdb82d56a0e191531b2bd8f01e0846ae504094f51de8bfa9624470011274fd1b523528377d90

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    869ed7493b6b802c685910367d1dfd35

    SHA1

    93aa0ca65539ae5ebb9aa6df19a12437816be9e1

    SHA256

    df4cf3732b4cfb2ef85844312613afb742915c317ebd412a6d3f7894afb3c8d6

    SHA512

    279a8ad58efdc3ecb5aa6d698364b3d0ad896b577f66bcacd3c13daafd94fa7d4fc02be7dce018a8da7328a5b3c7b8ad82f3cc0bb78218da4d863a3869fcb246

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    9172a1099cb9f27680522971bcfa66f6

    SHA1

    8646fec2b3d802e64d486ca4736cc7576adfffad

    SHA256

    fcc8c15dce5051f7465e3a21c2465b201f89e10b44f12a2c84bd0ad8bd3af985

    SHA512

    7559c35ec1d109d8f706f904533a03d3d4d4a0b5778706ee334b769252d37e15156db6bcfadc9636a926c1f65b6a96378ce5315f0643dd9bb7860f1cfe97cb11

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    3ea550b50039eae0ae6b1c71832d7754

    SHA1

    3d71e298083d68d106389adecf7eb31e135d4ea3

    SHA256

    2154695862dc570288f4d3c04497163e380a7d7f1d8d3c05e7b6a7ab57b44c36

    SHA512

    0992ac83312c20f3110fdd9103e2806d1b352bed631263cdf6496c3aecbba90fdc1c254557e8e6259f7449683278dc8b757ede2223a713352b4bcd4b8c1fc656

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    194d59f52c96f9b0f3e58f97af094563

    SHA1

    d829b45da05cab15bb1ce8c002b07ff3be2c42e3

    SHA256

    722bbd98271d35d2487d4ecc0b3249bd8745f60b78a0da9357775b4e9d0e651f

    SHA512

    2208ba90e0b684420d18622216ae991ec36360db796c4b689199aa3b73006c92df21b2f877ad2cfcc4445a17fe09a5a1f7fa49e58d89d199bc65b6db0dec5604

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    4c033871738455f046ca90ff094177b4

    SHA1

    8feae0876fdf80f2d31e81f21660ade8d77a73f3

    SHA256

    dd345fe3df31eebb6e3092f7eb5edf46ae57cba450401dd2f8e6b77591ec3504

    SHA512

    803165606cbac10d53d8b9b4b4779954c3dc87d205405eb227eb2e153944be714027b3ca72b10111feecbe03cd713ffdd546885b8ea335876bd295b39af2a2f5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms

    Filesize

    4KB

    MD5

    016bf62ea813ec509071510efeeed9dc

    SHA1

    864514270f3f79c53b5dbb78b4f6d7a0af738d61

    SHA256

    ebbf2d52fde08e9c7de9ea074947bc922504dd02781180ad67634fcf863064d5

    SHA512

    8028a212a4d1c17752d36d37ba603142aee77b5530a55c575daecd6fa535f0bd31e8638f357bee1201e28538f066146da2ba12a64848bf237a9f75d1bd98e3c9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7G4CSJY8P868YUM0P49X.temp

    Filesize

    4KB

    MD5

    b8da8b7f1a4930f05afaa9549c332b34

    SHA1

    bcde552fb2b65cadbacc2ddb1b7f37feed4c1d31

    SHA256

    04da0be808912e52e6ca97afa04f7b779d6af9ec8d81a075ee433672dd7f9c2b

    SHA512

    23c70121fc83798e96a3553cd34d755eee103248529f7ec5a4b475cee05d5d524f8d16a1edd7cbbd9dfc6ec63fd2dbfaa15334c8ba1c5b31161ce280b8e48c9a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LLU6WTE06BI8OOY3T7TA.temp

    Filesize

    4KB

    MD5

    8f2764c1f5b9df0b1dc97b048cda78d7

    SHA1

    3aa00a856ef85dd5c13273cbab78425849a12574

    SHA256

    645c2b27ad804284d0742a2a801b5674be5ebfeef6a63c8af855ae211de5025e

    SHA512

    4d90bd65898031fc717b61e6635cb8e157705ab24721be749202cac82ea5170197f865996ebe7958c9b8486429c3c45f23a6fbd8e5fa7e702ab55a76d91cf17a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\O5F0FMHNVDRUQ8BQRB7P.temp

    Filesize

    4KB

    MD5

    26c0bafc6290e1fbe7c5e98f8db9dd95

    SHA1

    e27949b50997bfe561d8054e0f9a9d3653afca47

    SHA256

    2b98173a1487bbfcf320a73ca0714a03b2ab03fbc17964e1e2069b29cc31f4e8

    SHA512

    522749ee417ef71df90692854cbc8532b0c5969caf6078809238d2807af80a8285c7433ad00da793dcca2cabcabbc1c32d1080f813dac0a1e523c84135540821

  • memory/384-444-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/540-284-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/764-119-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/764-48-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/1048-456-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/1176-446-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/1176-281-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/1176-118-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/1176-44-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/1408-454-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/1500-83-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/1500-173-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/1920-452-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/2800-451-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/2804-117-0x0000000000404000-0x0000000000A82000-memory.dmp

    Filesize

    6.5MB

  • memory/2804-9-0x0000000000404000-0x0000000000A82000-memory.dmp

    Filesize

    6.5MB

  • memory/2804-34-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/2804-33-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/2804-22-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/2804-20-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/2804-10-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/2804-7-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/2904-442-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/3860-445-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/3896-457-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/3960-453-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/4052-450-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/4092-443-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/4840-283-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB

  • memory/4888-455-0x0000000000400000-0x0000000000C77DA0-memory.dmp

    Filesize

    8.5MB