Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 22:39

General

  • Target

    random_2.exe

  • Size

    3.1MB

  • MD5

    00961d161138aa0b47dba68d37496786

  • SHA1

    ca31f7bd78c56fdc78819df24dc25c43b8c7e621

  • SHA256

    d359d667ffb1630874144e309250f07e6337a24fa79901e088893dbdd7ed5c1a

  • SHA512

    6f11ccf00591ece1183efe70e39ff05d2c744c69b2dfb42d02a8c3a95ccbbfde23695a2acd86158ca04487d20a1bd2a3f63abeae98708f2d204d648f4996efcd

  • SSDEEP

    98304:zAhP04tDAa9fRyMH0BcUSrc9etZBETLL:zAhP04BJc9etYTL

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

amadey

Version

5.21

Botnet

a4d2cd

C2

http://cobolrationumelawrtewarms.com

http://�������� jlgenfekjlfnvtgpegkwr.xyz

Attributes
  • install_dir

    a58456755d

  • install_file

    Gxtuum.exe

  • strings_key

    00fadbeacf092dfd58b48ef4ac68f826

  • url_paths

    /3ofn3jf3e2ljk/index.php

rc4.plain

Extracted

Family

systembc

C2

towerbingobongoboom.com

62.60.226.86

Attributes
  • dns

    5.132.191.104

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

redline

Botnet

testproliv

C2

45.155.103.183:1488

Extracted

Family

svcstealer

Version

3.1

C2

185.81.68.156

176.113.115.149

Attributes
  • url_paths

    /svcstealer/get.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 2 IoCs
  • Detects SvcStealer Payload 10 IoCs

    SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • SvcStealer, Diamotrix

    SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.

  • Svcstealer family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file 14 IoCs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 26 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\random_2.exe
      "C:\Users\Admin\AppData\Local\Temp\random_2.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Users\Admin\AppData\Local\Temp\ADKX9KSZ9Z3406FCROM3NT8FV.exe
        "C:\Users\Admin\AppData\Local\Temp\ADKX9KSZ9Z3406FCROM3NT8FV.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2400
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3216
          • C:\Users\Admin\AppData\Local\Temp\10087020101\OEHBOHk.exe
            "C:\Users\Admin\AppData\Local\Temp\10087020101\OEHBOHk.exe"
            5⤵
            • Executes dropped EXE
            PID:8
          • C:\Users\Admin\AppData\Local\Temp\10089420101\4klgwMz.exe
            "C:\Users\Admin\AppData\Local\Temp\10089420101\4klgwMz.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4600
          • C:\Users\Admin\AppData\Local\Temp\10089720101\8jQumY5.exe
            "C:\Users\Admin\AppData\Local\Temp\10089720101\8jQumY5.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4376
          • C:\Users\Admin\AppData\Local\Temp\10089790101\wBalaPT.exe
            "C:\Users\Admin\AppData\Local\Temp\10089790101\wBalaPT.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1292
            • C:\Users\Admin\AppData\Local\Temp\10089790101\wBalaPT.exe
              "C:\Users\Admin\AppData\Local\Temp\10089790101\wBalaPT.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2016
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 788
              6⤵
              • Program crash
              PID:3284
          • C:\Users\Admin\AppData\Local\Temp\10090400101\W6ySCZP.exe
            "C:\Users\Admin\AppData\Local\Temp\10090400101\W6ySCZP.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1800
            • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
              "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3760
              • C:\Users\Admin\AppData\Roaming\10000640100\coredrive.exe
                "C:\Users\Admin\AppData\Roaming\10000640100\coredrive.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2088
          • C:\Users\Admin\AppData\Local\Temp\10092140101\Ps7WqSx.exe
            "C:\Users\Admin\AppData\Local\Temp\10092140101\Ps7WqSx.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3432
          • C:\Users\Admin\AppData\Local\Temp\10095320101\bPDDW9F.exe
            "C:\Users\Admin\AppData\Local\Temp\10095320101\bPDDW9F.exe"
            5⤵
            • Downloads MZ/PE file
            • Executes dropped EXE
            PID:4608
          • C:\Users\Admin\AppData\Local\Temp\10095330101\z3SJkC5.exe
            "C:\Users\Admin\AppData\Local\Temp\10095330101\z3SJkC5.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4848
            • C:\Windows\TEMP\{77AFC1C7-4A33-4102-A0BF-8550DD39AE5F}\.cr\z3SJkC5.exe
              "C:\Windows\TEMP\{77AFC1C7-4A33-4102-A0BF-8550DD39AE5F}\.cr\z3SJkC5.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10095330101\z3SJkC5.exe" -burn.filehandle.attached=724 -burn.filehandle.self=728
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5116
              • C:\Windows\TEMP\{FB6AA94B-999D-4C88-9FF3-181F2B01A2BF}\.ba\WiseTurbo.exe
                C:\Windows\TEMP\{FB6AA94B-999D-4C88-9FF3-181F2B01A2BF}\.ba\WiseTurbo.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:4280
                • C:\Users\Admin\AppData\Roaming\streamfirefox\WiseTurbo.exe
                  C:\Users\Admin\AppData\Roaming\streamfirefox\WiseTurbo.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of WriteProcessMemory
                  PID:1096
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\SysWOW64\cmd.exe
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:4256
                    • C:\Users\Admin\AppData\Local\Temp\WatcherUpdate_test.exe
                      C:\Users\Admin\AppData\Local\Temp\WatcherUpdate_test.exe
                      10⤵
                      • Loads dropped DLL
                      PID:3812
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 744
                7⤵
                • Program crash
                PID:4584
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 652
                7⤵
                • Program crash
                PID:4576
          • C:\Users\Admin\AppData\Local\Temp\10095340101\8jQumY5.exe
            "C:\Users\Admin\AppData\Local\Temp\10095340101\8jQumY5.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5080
          • C:\Users\Admin\AppData\Local\Temp\10095350101\BXxKvLN.exe
            "C:\Users\Admin\AppData\Local\Temp\10095350101\BXxKvLN.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:396
          • C:\Users\Admin\AppData\Local\Temp\10095360101\mAtJWNv.exe
            "C:\Users\Admin\AppData\Local\Temp\10095360101\mAtJWNv.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:1360
            • C:\Users\Admin\AppData\Local\Temp\10095360101\mAtJWNv.exe
              "C:\Users\Admin\AppData\Local\Temp\10095360101\mAtJWNv.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              PID:4672
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 788
              6⤵
              • Program crash
              PID:4584
          • C:\Users\Admin\AppData\Local\Temp\10095370101\zY9sqWs.exe
            "C:\Users\Admin\AppData\Local\Temp\10095370101\zY9sqWs.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4788
    • C:\Users\Admin\AppData\Local\Temp\B0C8.tmp.exe
      C:\Users\Admin\AppData\Local\Temp\B0C8.tmp.exe
      2⤵
      • Downloads MZ/PE file
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4972
      • C:\Users\Admin\AppData\Local\Temp\temp_19551.exe
        "C:\Users\Admin\AppData\Local\Temp\temp_19551.exe"
        3⤵
          PID:764
          • C:\Users\Admin\AppData\Local\Temp\temp_19551.exe
            "C:\Users\Admin\AppData\Local\Temp\temp_19551.exe"
            4⤵
              PID:3148
          • C:\Users\Admin\AppData\Local\Temp\temp_19604.exe
            "C:\Users\Admin\AppData\Local\Temp\temp_19604.exe"
            3⤵
              PID:4892
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:2436
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1292 -ip 1292
          1⤵
            PID:4940
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5116 -ip 5116
            1⤵
              PID:1564
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5116 -ip 5116
              1⤵
                PID:2196
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1360 -ip 1360
                1⤵
                  PID:944
                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                  C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  PID:2004
                • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                  C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  PID:340
                • C:\ProgramData\cwsrddn\jarlgwi.exe
                  C:\ProgramData\cwsrddn\jarlgwi.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  PID:4736

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\10087020101\OEHBOHk.exe

                  Filesize

                  909KB

                  MD5

                  3babce4f85902c7bcfde22e222508c4e

                  SHA1

                  4898ae5c075322b47ab2f512b5463ee6116d98f7

                  SHA256

                  06b678b55cb81e6999b25903def2ac02336dc6c9ff3cd6afdaafffd55e2e5302

                  SHA512

                  f8687729c8931579f8120f6451f669726f115123c10a7c5ce6d9a24746940153efcf7e33b719e8f543f9b4316db485633272943f462bf948b4044f234795d629

                • C:\Users\Admin\AppData\Local\Temp\10089420101\4klgwMz.exe

                  Filesize

                  615KB

                  MD5

                  19668940080169c70b830bed8c390783

                  SHA1

                  5e6b72e52abc7d221d512111e39cbdd3f2ad40c1

                  SHA256

                  cdbc641b8c23b5699f899b408394ecfc946af9ac7a38c5d44c78a4a938e7b02c

                  SHA512

                  c322eba01ff4544b8077ec400f15ecffd3b66f89e0e0e26946224771c1ffb9c687ff4adc2e0a5e6b119766b3c8300971cfc2c990ff48346d9d3d514ab5d4bed2

                • C:\Users\Admin\AppData\Local\Temp\10089720101\8jQumY5.exe

                  Filesize

                  7.6MB

                  MD5

                  e82c4c3f7a2994eeecc1f81a5e4a4180

                  SHA1

                  660820f778073332dcd5ec446d2fcf00de887abd

                  SHA256

                  11eec5d71c7fadae9d7176448d8fff3de44ec8d3b4df86f0eca59e06adf202d3

                  SHA512

                  4d3e42e68b9fa6330edfee677ad55ae24964c33d6fd2d25ba6c2876d80f8d9cbc999c6e27192ce58a45559d00b3c0bc71ddbee1ad8d6fd7083b705ef5cf84d76

                • C:\Users\Admin\AppData\Local\Temp\10089790101\wBalaPT.exe

                  Filesize

                  413KB

                  MD5

                  3f84f670f0e10ad43bcb6df7c25cdc1a

                  SHA1

                  0e04beff1beec91fa9408c0b1e28da8283c9c70e

                  SHA256

                  787490502d51da937007d81c84ae8929ab20e5516f0fa36dec97b30b5f154351

                  SHA512

                  4cbcc517ec10f0e40f88da1e43cd2d776bc4bc493d355b6186e03f07343319386496e57d56bcfa775fc9b8ce0586260dfb0a900c47b3c77d9202909a71835d40

                • C:\Users\Admin\AppData\Local\Temp\10090400101\W6ySCZP.exe

                  Filesize

                  1.8MB

                  MD5

                  a308ca3417da9a5fd27823d205e2944a

                  SHA1

                  a623c58df6d2f75b3ffda3268cc6ed7ef48ce070

                  SHA256

                  973bb90580ab417bea0568823bb7852eeed34f6d83461f3de275fcda727c73ee

                  SHA512

                  4a9e58b99bf736a20f4b7f7a740546c2e2a4c46ab9bfd44b15a76b75f14a90a0ba4eca0302a4b0006086e035b4e739bec9da98d9ff416880dcc4f44aa8e3f7f2

                • C:\Users\Admin\AppData\Local\Temp\10092140101\Ps7WqSx.exe

                  Filesize

                  6.8MB

                  MD5

                  dab2bc3868e73dd0aab2a5b4853d9583

                  SHA1

                  3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                  SHA256

                  388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                  SHA512

                  3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                • C:\Users\Admin\AppData\Local\Temp\10095320101\bPDDW9F.exe

                  Filesize

                  1.3MB

                  MD5

                  cde0f4bf8c4605529175bbb5e86c6bad

                  SHA1

                  8194071706458c456a021e8e17b0a63ba3b54b44

                  SHA256

                  989ab0b506d60a468a8ab919dd973cae0f00072d60615d9b0243825e4b4a4e7e

                  SHA512

                  265a84c26b56abdd0548503eea7b1ce76b6661ce874e7ef0235dad6d424b568ac104adf5324ee164924b67d4865222e5bc4567ea4ce67b39f08215ad301697ea

                • C:\Users\Admin\AppData\Local\Temp\10095330101\z3SJkC5.exe

                  Filesize

                  7.8MB

                  MD5

                  001d7acad697c62d8a2bd742c4955c26

                  SHA1

                  840216756261f1369511b1fd112576b3543508f7

                  SHA256

                  de53f6f359af6ccc361faf2aa74690c9575b987a01f1250a6eb042cf9d4ea4af

                  SHA512

                  f06039d1d7ad28a04877e4eabb6fb7a5137a0040b8c316bee502bce6c68058bfe62db9480674bb69c9aeabae34304adeeff86dc3a8427929d00a842d2f2e80eb

                • C:\Users\Admin\AppData\Local\Temp\10095350101\BXxKvLN.exe

                  Filesize

                  1.7MB

                  MD5

                  971c0e70de5bb3de0c9911cf96d11743

                  SHA1

                  43badfc19a7e07671817cf05b39bc28a6c22e122

                  SHA256

                  67c9bb968cd0de2bfb2c24b00cfb2b98ac7403135ea47d98961652518584e45d

                  SHA512

                  a46523d8c71c0df25a043e2250ee1b6792e147314ec2097870a7972c892fd1a2022994f10823dadf54f161d11e808251b85a18efb9db9450d97af4b2f173f3c2

                • C:\Users\Admin\AppData\Local\Temp\10095360101\mAtJWNv.exe

                  Filesize

                  350KB

                  MD5

                  b60779fb424958088a559fdfd6f535c2

                  SHA1

                  bcea427b20d2f55c6372772668c1d6818c7328c9

                  SHA256

                  098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                  SHA512

                  c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                • C:\Users\Admin\AppData\Local\Temp\10095370101\zY9sqWs.exe

                  Filesize

                  361KB

                  MD5

                  2bb133c52b30e2b6b3608fdc5e7d7a22

                  SHA1

                  fcb19512b31d9ece1bbe637fe18f8caf257f0a00

                  SHA256

                  b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630

                  SHA512

                  73229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f

                • C:\Users\Admin\AppData\Local\Temp\ADKX9KSZ9Z3406FCROM3NT8FV.exe

                  Filesize

                  1.8MB

                  MD5

                  a02d35ec85cbb4c53c1e3ce513edf3e3

                  SHA1

                  42a357048694c44f1dec312f1866effabb515ea3

                  SHA256

                  6f6dad758b64241539cc5b87abe7dbc4df651900f6bfc618527fa76596985b78

                  SHA512

                  d1664b37136453257e36c7fee9b5b336f1c0c7b04c196b09482e43b9814e3d2598e9217b814b8035ef8e72204c9179d4481ee647998201aa480f40b26945abc4

                • C:\Users\Admin\AppData\Local\Temp\B0C8.tmp.exe

                  Filesize

                  1.2MB

                  MD5

                  a8d5951e44a77f82627bd0a98fde78d9

                  SHA1

                  423fd487ab2a50e1160a08bde17ae790dd556c16

                  SHA256

                  d278cc9dafdafb263a646c041f37118cdf835d397ec0a7c0c4d0cd0babfb5234

                  SHA512

                  0e71bf2dff31eae4d5870d3544536a6f2c9b09b547dfae62d0f1371184e82e731830a4a210e34af6a0bee06537a55e10b688059c474e364ca5c0e0d1d3647c68

                • C:\Users\Admin\AppData\Local\Temp\History

                  Filesize

                  124KB

                  MD5

                  9618e15b04a4ddb39ed6c496575f6f95

                  SHA1

                  1c28f8750e5555776b3c80b187c5d15a443a7412

                  SHA256

                  a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                  SHA512

                  f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                • C:\Users\Admin\AppData\Local\Temp\WatcherUpdate_test.exe

                  Filesize

                  2.3MB

                  MD5

                  967f4470627f823f4d7981e511c9824f

                  SHA1

                  416501b096df80ddc49f4144c3832cf2cadb9cb2

                  SHA256

                  b22bf1210b5fd173a210ebfa9092390aa0513c41e1914cbe161eb547f049ef91

                  SHA512

                  8883ead428c9d4b415046de9f8398aa1f65ae81fe7945a840c822620e18f6f9930cce2e10acff3b5da8b9c817ade3dabc1de576cbd255087267f77341900a41c

                • C:\Users\Admin\AppData\Local\Temp\_MEI7642\ucrtbase.dll

                  Filesize

                  1021KB

                  MD5

                  4e326feeb3ebf1e3eb21eeb224345727

                  SHA1

                  f156a272dbc6695cc170b6091ef8cd41db7ba040

                  SHA256

                  3c60056371f82e4744185b6f2fa0c69042b1e78804685944132974dd13f3b6d9

                  SHA512

                  be9420a85c82eeee685e18913a7ff152fcead72a90ddcc2bcc8ab53a4a1743ae98f49354023c0a32b3a1d919bda64b5d455f6c3a49d4842bbba4aa37c1d05d67

                • C:\Users\Admin\AppData\Local\Temp\cb1e3570

                  Filesize

                  5.5MB

                  MD5

                  51dc3a87caf755c551b983b90fb3259a

                  SHA1

                  f287bf7f5568ef3938c0fa8030fc56baf52aeb5a

                  SHA256

                  c0812c4a360a9e623d1a69dee7f805fddacf6daf74e957a70531b8020bf9a967

                  SHA512

                  d6f0c52a56cd684d567cd3fd433fa162b83c77350685482a7c658a4087796d0bd0eeaa73c32bafb4b3abfc4341770503741bc75108f280ae9e04103b536409e7

                • C:\Users\Admin\AppData\Local\Temp\temp_19551.exe

                  Filesize

                  5.6MB

                  MD5

                  5f0b24ae3c62d53654aefb8ce7b3df42

                  SHA1

                  808074206c7d8253fe747648748241564f763443

                  SHA256

                  f6bb2348bfefb8f96e47f2195e42c3b49bbab0ebded99a1d030eb7ed1ed8c738

                  SHA512

                  e47b8d995cf2fea1ad930c40f75835fdcaa170f12bba95ab30cc59d53949878f86debd4a792ed6dba815faae63d5f6aa28dd6f85cfdc60de8cf2cfd46f8159dd

                • C:\Users\Admin\AppData\Local\Temp\temp_19551.exe

                  Filesize

                  5.6MB

                  MD5

                  da901815806145f7433e2034ae90940e

                  SHA1

                  2cead2e05d12283db595a7b9ca1c5d3d568e73b1

                  SHA256

                  03ca444fd4a88b4585e1ebeb93c698881b986be7cf10fc4fb10bd796bea1fc4a

                  SHA512

                  0bcb3cdbe1a85657806d29eeaa91442e2286fc2fe2d4ce0bbe031518d6247da6b6c730c12f7876b7f33ff63b27f4c990faac380373eea1df3f91eb371e3bfc22

                • C:\Users\Admin\AppData\Local\Temp\temp_19604.exe

                  Filesize

                  175KB

                  MD5

                  ce977569ace61fe7a3feca3ff6353754

                  SHA1

                  c31b8eddb5fef01f18589c92aebd56d9b1691384

                  SHA256

                  f4adcfcc3677778d9fa9e4e313f2fe60d08f1d5e69d1f4391c4f309ce6c6bf06

                  SHA512

                  4277ccff02f15acbcbd43efb4fbf7db7c21c53cb582f70cf885e29b42c47ddd367cbb6e49b78023b86dbe1e60258ae6907188a1b7f8384dce64c6eb51460805f

                • C:\Users\Admin\AppData\Roaming\10000640100\coredrive.exe

                  Filesize

                  1.6MB

                  MD5

                  c6a399eb155322a8cbf1390c118553cb

                  SHA1

                  c59b0aa34638e8991358520e29625bb7fb4e3b6b

                  SHA256

                  a7c8390922ecfe4e4be4c9ffff567e91298a8bbf96dc96318305f45ec59f5221

                  SHA512

                  6437b6ea8990130f8e69b113f6ec8310e8831a80a2cf7ef1d8d16b323729a89c4a00a8900030e77f5671a7a40971e519731ec22519d98d7af29577dcb5dfe44e

                • C:\Windows\TEMP\{77AFC1C7-4A33-4102-A0BF-8550DD39AE5F}\.cr\z3SJkC5.exe

                  Filesize

                  7.7MB

                  MD5

                  eff9e9d84badf4b9d4c73155d743b756

                  SHA1

                  fd0ad0c927617a3f7b7e1df2f5726259034586af

                  SHA256

                  d61ef1bfa73bd5b013066d86f1c41e33bb396fc547cf5ab7191f56cc7b463aad

                  SHA512

                  0006273c86e8130e06e705a2be46c3433c0d1b34463123354c1857ebf88503d6e7e90602dc40960351baa03155074f8c5834b251be9da90fd95b10e498a98a19

                • C:\Windows\TEMP\{FB6AA94B-999D-4C88-9FF3-181F2B01A2BF}\.ba\blast.tar.gz

                  Filesize

                  4.4MB

                  MD5

                  219fe0e290712a35fd4c648f681e2d25

                  SHA1

                  83658f481a6aeeea45da571cf5e406078f8993cb

                  SHA256

                  51964920f5d4ddc699d5e6259df554798a305b87dd1a38afd4ed56a5f7713571

                  SHA512

                  5e75a5b5c80f3ec76b78e3993f694d6d2fc747a3f04363ff1de36e25669dfc68bbbdd8a0559ad3754ae956faab4cd53d73fb32044d7d82aee0b2ca012f969fe8

                • C:\Windows\Tasks\Test Task17.job

                  Filesize

                  242B

                  MD5

                  af1447935808f7f9b1ad76dd997966fa

                  SHA1

                  b27d251f70dce482f90693fe4266c9c21d2d4c8b

                  SHA256

                  75ead20cf6a147666324aa9d28453ec1a310a1a82cf6a5ece7ace84a015568f4

                  SHA512

                  31f22380b919274449340aacdb1806fdcfbeb2c5d8e0129bff8c418d45187c074c3326b1a9f7fe6705a983bdbd34d8e393de9f7d83819cb8480acbda73197af2

                • C:\Windows\Temp\{FB6AA94B-999D-4C88-9FF3-181F2B01A2BF}\.ba\Quadrisyllable.dll

                  Filesize

                  168KB

                  MD5

                  a1e561bc201a14277dfc3bf20d1a6cd7

                  SHA1

                  1895fd97fb75ad6b59fc6d2222cf36b7dc608b29

                  SHA256

                  7ae39cb5cd14a875af3e43df4a309d6a7a44c0339c413bf21b0300c84e35b66c

                  SHA512

                  aaa4e7350094dc7574e5f18ce619f48a45062674353f0f2a340a1fea0055c7961a9b257455d8ea877d739635e3444df08f049484f48fa9729d8fb1667374cf3c

                • C:\Windows\Temp\{FB6AA94B-999D-4C88-9FF3-181F2B01A2BF}\.ba\WiseTurbo.exe

                  Filesize

                  8.7MB

                  MD5

                  1f166f5c76eb155d44dd1bf160f37a6a

                  SHA1

                  cd6f7aa931d3193023f2e23a1f2716516ca3708c

                  SHA256

                  2d13424b09ba004135a26ccd60b64cdd6917d80ce43070cbc114569eae608588

                  SHA512

                  38ad8f1308fe1aae3ddf7dbc3b1c5442663571137390b3e31e2527b8fec70e7266b06df295df0c411fcc500424022f274fd467d36040def2e1a4feff88c749b7

                • C:\Windows\Temp\{FB6AA94B-999D-4C88-9FF3-181F2B01A2BF}\.ba\phyllopod.html

                  Filesize

                  39KB

                  MD5

                  7acd5f1bb75aef6681027e02232f3b7d

                  SHA1

                  caef0696cf3a2c86078fe068cf37a2a58ea495c5

                  SHA256

                  7501366637ca181f4f0c310d4020ace9d58cbf872f47abf82dd42ed98d2d6bef

                  SHA512

                  0887ba61cefb6e5010d276a4c9596e126dd782f672928e32d2126935fba487ea2ff729c8ab840f7db8babc31c00db981957f5d90249da0972082ce9d7062f533

                • C:\Windows\Temp\{FB6AA94B-999D-4C88-9FF3-181F2B01A2BF}\.ba\sqlite3.dll

                  Filesize

                  891KB

                  MD5

                  1e24135c3930e1c81f3a0cd287fb0f26

                  SHA1

                  9d13bfe63ddb15743f7770387b21e15652f96267

                  SHA256

                  1ce645aa8d3e5ef2a57a0297121e54b31cc29b44b59a49b1330e3d0880ce5012

                  SHA512

                  04e3ffa4d71b2324fafcb856b9e686ffd3f7a24e1cb6531b3715aa3b0abd52709a9dcb79643384315ebc16cf8899bd9b218ca5c6d47dc97df278126d0836201f

                • memory/340-440-0x0000000000730000-0x0000000000BFA000-memory.dmp

                  Filesize

                  4.8MB

                • memory/340-432-0x0000000000730000-0x0000000000BFA000-memory.dmp

                  Filesize

                  4.8MB

                • memory/396-374-0x0000022DED3B0000-0x0000022DED3EC000-memory.dmp

                  Filesize

                  240KB

                • memory/396-372-0x0000022DED4C0000-0x0000022DED5CA000-memory.dmp

                  Filesize

                  1.0MB

                • memory/396-362-0x0000022DEAC90000-0x0000022DEACE2000-memory.dmp

                  Filesize

                  328KB

                • memory/396-373-0x0000022DEADE0000-0x0000022DEADF2000-memory.dmp

                  Filesize

                  72KB

                • memory/396-378-0x00007FF602D00000-0x00007FF602EAE000-memory.dmp

                  Filesize

                  1.7MB

                • memory/1096-301-0x0000000000400000-0x0000000000D48000-memory.dmp

                  Filesize

                  9.3MB

                • memory/1096-298-0x00000000727D0000-0x000000007294B000-memory.dmp

                  Filesize

                  1.5MB

                • memory/1096-272-0x00000000727D0000-0x000000007294B000-memory.dmp

                  Filesize

                  1.5MB

                • memory/1096-273-0x00007FFBD4150000-0x00007FFBD4345000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1292-117-0x0000000000D20000-0x0000000000D90000-memory.dmp

                  Filesize

                  448KB

                • memory/1292-118-0x0000000005AF0000-0x0000000006094000-memory.dmp

                  Filesize

                  5.6MB

                • memory/1360-338-0x0000000000AF0000-0x0000000000B50000-memory.dmp

                  Filesize

                  384KB

                • memory/1388-9-0x0000000000A70000-0x0000000000D82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1388-0-0x0000000000A70000-0x0000000000D82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1388-2-0x0000000000A71000-0x0000000000AD1000-memory.dmp

                  Filesize

                  384KB

                • memory/1388-17-0x0000000000A70000-0x0000000000D82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1388-4-0x0000000000A70000-0x0000000000D82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1388-5-0x0000000000A70000-0x0000000000D82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1388-13-0x0000000000A70000-0x0000000000D82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1388-6-0x0000000000A71000-0x0000000000AD1000-memory.dmp

                  Filesize

                  384KB

                • memory/1388-7-0x0000000000A70000-0x0000000000D82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1388-3-0x0000000000A70000-0x0000000000D82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1388-1-0x0000000077354000-0x0000000077356000-memory.dmp

                  Filesize

                  8KB

                • memory/1388-8-0x0000000000A70000-0x0000000000D82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1388-10-0x0000000000A70000-0x0000000000D82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1388-11-0x0000000000A70000-0x0000000000D82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1388-12-0x0000000000A70000-0x0000000000D82000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1800-153-0x0000000000A00000-0x0000000000ECA000-memory.dmp

                  Filesize

                  4.8MB

                • memory/1800-141-0x0000000000A00000-0x0000000000ECA000-memory.dmp

                  Filesize

                  4.8MB

                • memory/2004-427-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/2004-429-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/2016-123-0x0000000000400000-0x0000000000465000-memory.dmp

                  Filesize

                  404KB

                • memory/2016-121-0x0000000000400000-0x0000000000465000-memory.dmp

                  Filesize

                  404KB

                • memory/2088-296-0x0000000000400000-0x0000000000823000-memory.dmp

                  Filesize

                  4.1MB

                • memory/2088-190-0x0000000000400000-0x0000000000823000-memory.dmp

                  Filesize

                  4.1MB

                • memory/2088-215-0x0000000000400000-0x0000000000823000-memory.dmp

                  Filesize

                  4.1MB

                • memory/2088-421-0x0000000000400000-0x0000000000823000-memory.dmp

                  Filesize

                  4.1MB

                • memory/2088-216-0x0000000000400000-0x0000000000823000-memory.dmp

                  Filesize

                  4.1MB

                • memory/2088-334-0x0000000000400000-0x0000000000823000-memory.dmp

                  Filesize

                  4.1MB

                • memory/2400-21-0x0000000000551000-0x000000000057F000-memory.dmp

                  Filesize

                  184KB

                • memory/2400-22-0x0000000000550000-0x0000000000A10000-memory.dmp

                  Filesize

                  4.8MB

                • memory/2400-24-0x0000000000550000-0x0000000000A10000-memory.dmp

                  Filesize

                  4.8MB

                • memory/2400-36-0x0000000000550000-0x0000000000A10000-memory.dmp

                  Filesize

                  4.8MB

                • memory/2400-19-0x0000000000550000-0x0000000000A10000-memory.dmp

                  Filesize

                  4.8MB

                • memory/2436-126-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/2436-124-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3216-60-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3216-38-0x00000000005F1000-0x000000000061F000-memory.dmp

                  Filesize

                  184KB

                • memory/3216-59-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3216-37-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3216-41-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3216-195-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3216-297-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3216-423-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3216-61-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3216-218-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3216-140-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3216-82-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3216-39-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3216-343-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3216-40-0x00000000005F0000-0x0000000000AB0000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3432-194-0x0000000000FD0000-0x00000000016BE000-memory.dmp

                  Filesize

                  6.9MB

                • memory/3432-217-0x0000000000FD0000-0x00000000016BE000-memory.dmp

                  Filesize

                  6.9MB

                • memory/3444-77-0x0000000002700000-0x00000000027A5000-memory.dmp

                  Filesize

                  660KB

                • memory/3444-366-0x0000000002700000-0x00000000027A5000-memory.dmp

                  Filesize

                  660KB

                • memory/3444-367-0x0000000002700000-0x00000000027A5000-memory.dmp

                  Filesize

                  660KB

                • memory/3444-371-0x0000000002700000-0x00000000027A5000-memory.dmp

                  Filesize

                  660KB

                • memory/3444-365-0x0000000002700000-0x00000000027A5000-memory.dmp

                  Filesize

                  660KB

                • memory/3444-78-0x0000000002700000-0x00000000027A5000-memory.dmp

                  Filesize

                  660KB

                • memory/3760-198-0x0000000000730000-0x0000000000BFA000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3760-156-0x0000000000730000-0x0000000000BFA000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3760-199-0x0000000000730000-0x0000000000BFA000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3760-349-0x0000000000730000-0x0000000000BFA000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3760-219-0x0000000000730000-0x0000000000BFA000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3760-424-0x0000000000730000-0x0000000000BFA000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3760-302-0x0000000000730000-0x0000000000BFA000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4256-319-0x00007FFBD4150000-0x00007FFBD4345000-memory.dmp

                  Filesize

                  2.0MB

                • memory/4280-257-0x00000000727D0000-0x000000007294B000-memory.dmp

                  Filesize

                  1.5MB

                • memory/4280-258-0x00007FFBD4150000-0x00007FFBD4345000-memory.dmp

                  Filesize

                  2.0MB

                • memory/4280-268-0x0000000000400000-0x0000000000D48000-memory.dmp

                  Filesize

                  9.3MB

                • memory/4376-158-0x0000000002C40000-0x0000000002CA5000-memory.dmp

                  Filesize

                  404KB

                • memory/4600-81-0x00007FF633FD0000-0x00007FF63406F000-memory.dmp

                  Filesize

                  636KB

                • memory/4600-76-0x00007FF633FD0000-0x00007FF63406F000-memory.dmp

                  Filesize

                  636KB

                • memory/4608-265-0x00007FF619E70000-0x00007FF619FC0000-memory.dmp

                  Filesize

                  1.3MB

                • memory/4672-340-0x0000000000400000-0x0000000000429000-memory.dmp

                  Filesize

                  164KB

                • memory/4672-342-0x0000000000400000-0x0000000000429000-memory.dmp

                  Filesize

                  164KB

                • memory/4736-438-0x0000000000400000-0x0000000000823000-memory.dmp

                  Filesize

                  4.1MB

                • memory/4736-461-0x0000000000400000-0x0000000000823000-memory.dmp

                  Filesize

                  4.1MB

                • memory/5080-345-0x0000000000B60000-0x0000000000BC5000-memory.dmp

                  Filesize

                  404KB