Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2025, 03:22

General

  • Target

    a2e607f38bb88e931b2b05476d39410ebf15420872a09847d5afc5244292a99c.exe

  • Size

    520KB

  • MD5

    5ac90bdd964329f989cbc68652f1093f

  • SHA1

    47120aa1a6ae5940b162624270f7d7cc65f1f89e

  • SHA256

    a2e607f38bb88e931b2b05476d39410ebf15420872a09847d5afc5244292a99c

  • SHA512

    3e62902fb8bfc1600e4be3d49e0d2514a9bfb6f05fd6c1bd2adeba4af5aebd255b8f8e0db45d5c161b0b2b39966f7765f3a8d66a13553d45000b1c95d4b9547f

  • SSDEEP

    12288:zW6n3sX4yCFr2ZemYOpSPIsGWeKZl4q7sioXH:zW6ncoyqOp6IsTl/mXH

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 10 IoCs
  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Checks computer location settings 2 TTPs 29 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 30 IoCs
  • Adds Run key to start application 2 TTPs 30 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2e607f38bb88e931b2b05476d39410ebf15420872a09847d5afc5244292a99c.exe
    "C:\Users\Admin\AppData\Local\Temp\a2e607f38bb88e931b2b05476d39410ebf15420872a09847d5afc5244292a99c.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempMUIJJ.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4624
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "EAAVQDLFKYHSPNR" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\GUQSWUXINSFCRQE\service.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:3664
    • C:\Users\Admin\AppData\Local\Temp\GUQSWUXINSFCRQE\service.exe
      "C:\Users\Admin\AppData\Local\Temp\GUQSWUXINSFCRQE\service.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3196
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempRSDWW.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3648
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "COSPDPAXDVURSEK" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\YRQAYMLNIGNJYMT\service.exe" /f
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:3036
      • C:\Users\Admin\AppData\Local\Temp\YRQAYMLNIGNJYMT\service.exe
        "C:\Users\Admin\AppData\Local\Temp\YRQAYMLNIGNJYMT\service.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5064
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempFRXOL.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1096
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "OXOCDXUPCYJEJYW" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IWSAUYWKPUBBHAE\service.exe" /f
            5⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            PID:2996
        • C:\Users\Admin\AppData\Local\Temp\IWSAUYWKPUBBHAE\service.exe
          "C:\Users\Admin\AppData\Local\Temp\IWSAUYWKPUBBHAE\service.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:492
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempWTDOU.bat" "
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4240
            • C:\Windows\SysWOW64\reg.exe
              REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "NAMULAVRMVHWBGV" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\TWLFELUKQHYPDOE\service.exe" /f
              6⤵
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              PID:2884
          • C:\Users\Admin\AppData\Local\Temp\TWLFELUKQHYPDOE\service.exe
            "C:\Users\Admin\AppData\Local\Temp\TWLFELUKQHYPDOE\service.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4804
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempFGDME.bat" "
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1584
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "JXENWUFBMFGWPSU" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\DUNTLCMFEGWSTBP\service.exe" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:4396
            • C:\Users\Admin\AppData\Local\Temp\DUNTLCMFEGWSTBP\service.exe
              "C:\Users\Admin\AppData\Local\Temp\DUNTLCMFEGWSTBP\service.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2900
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempFJXGS.bat" "
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4684
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HLQDAPXPCEYUPDK" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\UATDPOQLJQMBPWF\service.exe" /f
                  8⤵
                  • Adds Run key to start application
                  • System Location Discovery: System Language Discovery
                  PID:4948
              • C:\Users\Admin\AppData\Local\Temp\UATDPOQLJQMBPWF\service.exe
                "C:\Users\Admin\AppData\Local\Temp\UATDPOQLJQMBPWF\service.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2948
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempJGOBH.bat" "
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2648
                  • C:\Windows\SysWOW64\reg.exe
                    REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "RNMGPXHDOIJSVWI" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\YBSLRYJAKDXCEUQ\service.exe" /f
                    9⤵
                    • Adds Run key to start application
                    • System Location Discovery: System Language Discovery
                    PID:1420
                • C:\Users\Admin\AppData\Local\Temp\YBSLRYJAKDXCEUQ\service.exe
                  "C:\Users\Admin\AppData\Local\Temp\YBSLRYJAKDXCEUQ\service.exe"
                  8⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1192
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempWIGKF.bat" "
                    9⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1088
                    • C:\Windows\SysWOW64\reg.exe
                      REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "RISOJSETDSTQALR" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\LHWUKUOMPAEKXXJ\service.exe" /f
                      10⤵
                      • Adds Run key to start application
                      • System Location Discovery: System Language Discovery
                      PID:3984
                  • C:\Users\Admin\AppData\Local\Temp\LHWUKUOMPAEKXXJ\service.exe
                    "C:\Users\Admin\AppData\Local\Temp\LHWUKUOMPAEKXXJ\service.exe"
                    9⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:2580
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempPYPEN.bat" "
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:3640
                      • C:\Windows\SysWOW64\reg.exe
                        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "MIIUROSNVKLDKLT" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\RKJRFFGBGCXRFMH\service.exe" /f
                        11⤵
                        • Adds Run key to start application
                        • System Location Discovery: System Language Discovery
                        PID:4176
                    • C:\Users\Admin\AppData\Local\Temp\RKJRFFGBGCXRFMH\service.exe
                      "C:\Users\Admin\AppData\Local\Temp\RKJRFFGBGCXRFMH\service.exe"
                      10⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:5008
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempRMUIJ.bat" "
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:4352
                        • C:\Windows\SysWOW64\reg.exe
                          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "DFAAVQELGKYHSPN" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FTPSVTWHMREBQYQ\service.exe" /f
                          12⤵
                          • Adds Run key to start application
                          • System Location Discovery: System Language Discovery
                          PID:4356
                      • C:\Users\Admin\AppData\Local\Temp\FTPSVTWHMREBQYQ\service.exe
                        "C:\Users\Admin\AppData\Local\Temp\FTPSVTWHMREBQYQ\service.exe"
                        11⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:1632
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempGYXTU.bat" "
                          12⤵
                          • System Location Discovery: System Language Discovery
                          PID:4684
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "OPKILAOVFQVFSDB" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\HQIESWIJGPBHMAC\service.exe" /f
                            13⤵
                            • Adds Run key to start application
                            • System Location Discovery: System Language Discovery
                            PID:4360
                        • C:\Users\Admin\AppData\Local\Temp\HQIESWIJGPBHMAC\service.exe
                          "C:\Users\Admin\AppData\Local\Temp\HQIESWIJGPBHMAC\service.exe"
                          12⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of SetWindowsHookEx
                          PID:320
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempVGHFN.bat" "
                            13⤵
                            • System Location Discovery: System Language Discovery
                            PID:2648
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "MLYFOYVGCNGHXQU" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JBRAISOJEDTURAA\service.exe" /f
                              14⤵
                              • Adds Run key to start application
                              PID:656
                          • C:\Users\Admin\AppData\Local\Temp\JBRAISOJEDTURAA\service.exe
                            "C:\Users\Admin\AppData\Local\Temp\JBRAISOJEDTURAA\service.exe"
                            13⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:4448
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempEIJSO.bat" "
                              14⤵
                                PID:4488
                                • C:\Windows\SysWOW64\reg.exe
                                  REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "YAWVMCQMJYOBOQL" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\TVLFDKUKPHYPDOE\service.exe" /f
                                  15⤵
                                  • Adds Run key to start application
                                  • System Location Discovery: System Language Discovery
                                  PID:3700
                              • C:\Users\Admin\AppData\Local\Temp\TVLFDKUKPHYPDOE\service.exe
                                "C:\Users\Admin\AppData\Local\Temp\TVLFDKUKPHYPDOE\service.exe"
                                14⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of SetWindowsHookEx
                                PID:1904
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempSOWNC.bat" "
                                  15⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3612
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "KYHHSPNRMUIJCJJ" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\UNMUIHJECJEUIPK\service.exe" /f
                                    16⤵
                                    • Adds Run key to start application
                                    PID:2376
                                • C:\Users\Admin\AppData\Local\Temp\UNMUIHJECJEUIPK\service.exe
                                  "C:\Users\Admin\AppData\Local\Temp\UNMUIHJECJEUIPK\service.exe"
                                  15⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of SetWindowsHookEx
                                  PID:3004
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempTYKIM.bat" "
                                    16⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1664
                                    • C:\Windows\SysWOW64\reg.exe
                                      REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "TKUQLUFVAFUVSBN" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\ANJXVMWPOQCGLYK\service.exe" /f
                                      17⤵
                                      • Adds Run key to start application
                                      • System Location Discovery: System Language Discovery
                                      PID:2952
                                  • C:\Users\Admin\AppData\Local\Temp\ANJXVMWPOQCGLYK\service.exe
                                    "C:\Users\Admin\AppData\Local\Temp\ANJXVMWPOQCGLYK\service.exe"
                                    16⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1828
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempEWVSS.bat" "
                                      17⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4492
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "BNOJHKNUDPUEQBA" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\BJBTKHBVLMJSEKP\service.exe" /f
                                        18⤵
                                        • Adds Run key to start application
                                        • System Location Discovery: System Language Discovery
                                        PID:4624
                                    • C:\Users\Admin\AppData\Local\Temp\BJBTKHBVLMJSEKP\service.exe
                                      "C:\Users\Admin\AppData\Local\Temp\BJBTKHBVLMJSEKP\service.exe"
                                      17⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1916
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempWHFKX.bat" "
                                        18⤵
                                          PID:4992
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "CEGSTOMPESAJAUJ" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\CLCULIDWMNKTFLQ\service.exe" /f
                                            19⤵
                                            • Adds Run key to start application
                                            PID:2708
                                        • C:\Users\Admin\AppData\Local\Temp\CLCULIDWMNKTFLQ\service.exe
                                          "C:\Users\Admin\AppData\Local\Temp\CLCULIDWMNKTFLQ\service.exe"
                                          18⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:4448
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempMJSEK.bat" "
                                            19⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1412
                                            • C:\Windows\SysWOW64\reg.exe
                                              REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "QPBJBTKHBRLMVYL" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\EAVOUMDNGFHXTUC\service.exe" /f
                                              20⤵
                                              • Adds Run key to start application
                                              PID:3980
                                          • C:\Users\Admin\AppData\Local\Temp\EAVOUMDNGFHXTUC\service.exe
                                            "C:\Users\Admin\AppData\Local\Temp\EAVOUMDNGFHXTUC\service.exe"
                                            19⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SetWindowsHookEx
                                            PID:3004
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempRSXEF.bat" "
                                              20⤵
                                                PID:4648
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "IVCMVTDAYKEYFVO" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\GPGYQMHBBQROXJP\service.exe" /f
                                                  21⤵
                                                  • Adds Run key to start application
                                                  PID:4236
                                              • C:\Users\Admin\AppData\Local\Temp\GPGYQMHBBQROXJP\service.exe
                                                "C:\Users\Admin\AppData\Local\Temp\GPGYQMHBBQROXJP\service.exe"
                                                20⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:5040
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempPXODM.bat" "
                                                  21⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2264
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "LIIUQOSNVJLDKKT" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\RKJRFEGBGCWRFMH\service.exe" /f
                                                    22⤵
                                                    • Adds Run key to start application
                                                    PID:1856
                                                • C:\Users\Admin\AppData\Local\Temp\RKJRFEGBGCWRFMH\service.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\RKJRFEGBGCWRFMH\service.exe"
                                                  21⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3532
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempMQLTI.bat" "
                                                    22⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1064
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "DEYAVPDKFKXGSYP" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\ESORUTVHLQDBPXP\service.exe" /f
                                                      23⤵
                                                      • Adds Run key to start application
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1000
                                                  • C:\Users\Admin\AppData\Local\Temp\ESORUTVHLQDBPXP\service.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\ESORUTVHLQDBPXP\service.exe"
                                                    22⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1496
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempVWPIO.bat" "
                                                      23⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:672
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "UQREJQRCVVKTGFS" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\KGUSJTMLNDIWVHQ\service.exe" /f
                                                        24⤵
                                                        • Adds Run key to start application
                                                        PID:4920
                                                    • C:\Users\Admin\AppData\Local\Temp\KGUSJTMLNDIWVHQ\service.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\KGUSJTMLNDIWVHQ\service.exe"
                                                      23⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:4648
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempBEFPK.bat" "
                                                        24⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3628
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "AVSRVIMIGWULLNI" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\PSIBYAHQGMDULAK\service.exe" /f
                                                          25⤵
                                                          • Adds Run key to start application
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3132
                                                      • C:\Users\Admin\AppData\Local\Temp\PSIBYAHQGMDULAK\service.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\PSIBYAHQGMDULAK\service.exe"
                                                        24⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:3348
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempMPQVC.bat" "
                                                          25⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:784
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "GTAJXTRBWIBVYCT" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\EMEVNJEYOPMUHNS\service.exe" /f
                                                            26⤵
                                                            • Adds Run key to start application
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4300
                                                        • C:\Users\Admin\AppData\Local\Temp\EMEVNJEYOPMUHNS\service.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\EMEVNJEYOPMUHNS\service.exe"
                                                          25⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:4224
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempQRCVV.bat" "
                                                            26⤵
                                                              PID:3524
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "NSOCOAXCUYUQREJ" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\XQPXLLMHFMIYLSB\service.exe" /f
                                                                27⤵
                                                                • Adds Run key to start application
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1736
                                                            • C:\Users\Admin\AppData\Local\Temp\XQPXLLMHFMIYLSB\service.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\XQPXLLMHFMIYLSB\service.exe"
                                                              26⤵
                                                              • Checks computer location settings
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:4460
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempOXTAB.bat" "
                                                                27⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2752
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "FERHVRPUGTVAQJN" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\YQKDJQBCPUMUITJ\service.exe" /f
                                                                  28⤵
                                                                  • Adds Run key to start application
                                                                  PID:436
                                                              • C:\Users\Admin\AppData\Local\Temp\YQKDJQBCPUMUITJ\service.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\YQKDJQBCPUMUITJ\service.exe"
                                                                27⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1148
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempHQDYC.bat" "
                                                                  28⤵
                                                                    PID:1988
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "XUASWRNPBHOOXTS" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\DVNTLCMFEGXTTBP\service.exe" /f
                                                                      29⤵
                                                                      • Adds Run key to start application
                                                                      PID:1412
                                                                  • C:\Users\Admin\AppData\Local\Temp\DVNTLCMFEGXTTBP\service.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\DVNTLCMFEGXTTBP\service.exe"
                                                                    28⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:1720
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempMHQHF.bat" "
                                                                      29⤵
                                                                        PID:2728
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "MSXJHLGNCDVTCDW" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JCSBJTPKEETURAA\service.exe" /f
                                                                          30⤵
                                                                          • Adds Run key to start application
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3020
                                                                      • C:\Users\Admin\AppData\Local\Temp\JCSBJTPKEETURAA\service.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\JCSBJTPKEETURAA\service.exe"
                                                                        29⤵
                                                                        • Checks computer location settings
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:4412
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempTPCOW.bat" "
                                                                          30⤵
                                                                            PID:1508
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "XVNDRMKPCPRMFIK" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\TWMGELULQIQEOFA\service.exe" /f
                                                                              31⤵
                                                                              • Adds Run key to start application
                                                                              PID:2932
                                                                          • C:\Users\Admin\AppData\Local\Temp\TWMGELULQIQEOFA\service.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\TWMGELULQIQEOFA\service.exe"
                                                                            30⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:4556
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\TempLHVUG.bat" "
                                                                              31⤵
                                                                                PID:3180
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "POSFJFCTRHHJEBC" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\DUNTLCMFDGWSTBP\service.exe" /f
                                                                                  32⤵
                                                                                  • Adds Run key to start application
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2380
                                                                              • C:\Users\Admin\AppData\Local\Temp\DUNTLCMFDGWSTBP\service.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\DUNTLCMFDGWSTBP\service.exe"
                                                                                31⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:4340
                                                                                • C:\Users\Admin\AppData\Local\Temp\DUNTLCMFDGWSTBP\service.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\DUNTLCMFDGWSTBP\service.exe
                                                                                  32⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:1372
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                                                                                    33⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:1348
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                                                                                      34⤵
                                                                                      • Modifies firewall policy service
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Modifies registry key
                                                                                      PID:5064
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\DUNTLCMFDGWSTBP\service.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\DUNTLCMFDGWSTBP\service.exe:*:Enabled:Windows Messanger" /f
                                                                                    33⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:348
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\DUNTLCMFDGWSTBP\service.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\DUNTLCMFDGWSTBP\service.exe:*:Enabled:Windows Messanger" /f
                                                                                      34⤵
                                                                                      • Modifies firewall policy service
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Modifies registry key
                                                                                      PID:2372
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                                                                                    33⤵
                                                                                      PID:5004
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                                                                                        34⤵
                                                                                        • Modifies firewall policy service
                                                                                        • Modifies registry key
                                                                                        PID:2884
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\service.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\service.exe:*:Enabled:Windows Messanger" /f
                                                                                      33⤵
                                                                                        PID:4392
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\service.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\service.exe:*:Enabled:Windows Messanger" /f
                                                                                          34⤵
                                                                                          • Modifies firewall policy service
                                                                                          • Modifies registry key
                                                                                          PID:2876

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\TempBEFPK.txt

                        Filesize

                        163B

                        MD5

                        aac431dc8549bc5431e17ee23c36ce9c

                        SHA1

                        cd0c5b418b623b4f78c735970752264ef1c7ed9a

                        SHA256

                        3bc737f9d2fbfc4a893ff0eca13ae915a2a30019f59d65e3886972b3b2536bcf

                        SHA512

                        4c8ca25eb7ec49880a73e290b005bf836a70551dcf4445f72bc7463b9615557d7779f959a15a2461c9259108508708e568c113f31c3eb03460e5f5bed301b0ee

                      • C:\Users\Admin\AppData\Local\TempEIJSO.txt

                        Filesize

                        163B

                        MD5

                        ce316d102fe17369fb900df03386151d

                        SHA1

                        8bab2bd5df4620f24b14caeaecddbc6bba4ce07d

                        SHA256

                        c502884dc7a51d0501e9a4a09c9d1e53cc78d826c4fd7d4d57971ccc381da2f8

                        SHA512

                        0b64df1de5c1c846f0f0a1297eed4fb5ba0e1c096f106ae220a2082f33fb653195afd09d702e7b11db7f6260bf631d00091ac044ebb6a4158714f494c8786576

                      • C:\Users\Admin\AppData\Local\TempEWVSS.txt

                        Filesize

                        163B

                        MD5

                        50fa03f8f24da98daa21bd91cbdc2472

                        SHA1

                        f3d20a799f5253235922a1190c1b62423fde6b6a

                        SHA256

                        dc7cede8cf1806481d72ae17b8a5c78e26290e419f545ea3af56b768cb0bce4f

                        SHA512

                        47ff1ee87dcb6c01b628b43378f73264531f7479e9bb435407993d9b59c6f1504bcc209fc971bd74d68e0854197e5e5deef407b91532fb578b230893d2beb263

                      • C:\Users\Admin\AppData\Local\TempFJXGS.txt

                        Filesize

                        163B

                        MD5

                        f8adb22de8611b36afc5f91e216f8d35

                        SHA1

                        28a9b6903a363c34d134b2fad7eb71db05e77dfb

                        SHA256

                        0e7ca3a1a94c85f59889ebe9726178264ee27dec0da08bde5d15f5f474513082

                        SHA512

                        a5a70f85c36b1e7875c339e80a556e677474d3703222dacfac36de0418e465fcb177b71f6ff57b28413fec89eba826bccbb131ed5813fc868b803e28793f85e8

                      • C:\Users\Admin\AppData\Local\TempFRXOL.txt

                        Filesize

                        163B

                        MD5

                        dda02e64e705d87a5bd5abe8d2356004

                        SHA1

                        6c61fc9af14e670e29c441f348f4549beaeeaf6d

                        SHA256

                        20d6c44a59c6e1ec5d6c4b44e315fda351089dc6c6478429e05ebeaa7c8b229a

                        SHA512

                        cd4e2ee0a7d8e4958a28dfdff9e0a681e47c9d1a9b52cb42dbef51837eb3038907336fa389842b6cedeb420c713273b7138b01bb25d749428f69d7ef22947848

                      • C:\Users\Admin\AppData\Local\TempGYXTU.txt

                        Filesize

                        163B

                        MD5

                        fe25105cdc099e64d6994221574ca5f3

                        SHA1

                        4b794396333212c3809188900f8100108df5b339

                        SHA256

                        748b869bb2b75082a43f10f0878a10321086b91a7bea36f7f3ba91b367aaea1a

                        SHA512

                        fe3609128a7c8d64b1daaa2e8b0d749a98018d1df6f3105cca1162938b92d28a318265ac1e2518ed873a817953d17432b4f783b30e1384f6a3552b4ec2904dd5

                      • C:\Users\Admin\AppData\Local\TempHQDYC.txt

                        Filesize

                        163B

                        MD5

                        b9739eecb8062bf223d1fecd77a12b93

                        SHA1

                        b5d3647465c9b7d90d3827b565a834c0ea9ef99e

                        SHA256

                        a50a3f25ed7fe677818ed4bc0d61a94132feed4de21f4a28c2550e65f98abf49

                        SHA512

                        a0380663c6c674db40bb35f86ca213b4108696c4f1a79690a2e19b3c498bee6117a2a0e0fcf6dfc60919b5f934b3984983a066f3b4ca060d0c8e00fbed226026

                      • C:\Users\Admin\AppData\Local\TempJGOBH.txt

                        Filesize

                        163B

                        MD5

                        f87d5c52eef43f4774ff1f3f5546abbd

                        SHA1

                        1f2d1221095c4a20ef510c93fed95eb39532bd5c

                        SHA256

                        77242b1505b2b7eee2f8283d34d521a7e434775dcdd5df622d77297bed8b1843

                        SHA512

                        1f0f1d1274f3b95a8e0532a573b909f501304f9c06191142193adec33bd2cef6b5cc4acdede95a2dfad4e21faf30363a7a7dea5f883e6d704e36a716da96a673

                      • C:\Users\Admin\AppData\Local\TempLHVUG.txt

                        Filesize

                        163B

                        MD5

                        dabbaf5878ab0284652a7cb06684e4fb

                        SHA1

                        9314ef883853826f69fcb6486fe8af03efbdf6de

                        SHA256

                        822b30d9c1d4dca73a3bc3d7d54f8d526a362b6a04ef983ea0903fac01574fb7

                        SHA512

                        2ea7707e51ae5722854e2c1ca684ebca690632c4d12118af9ffe532bd383df4f1084f88fd48352ac4aa8682736f8ffc4d1ae7f3c571b86fd5fddfeaa8d61bd5c

                      • C:\Users\Admin\AppData\Local\TempMHQHF.txt

                        Filesize

                        163B

                        MD5

                        94feb1d592f93d0e067a85161601e956

                        SHA1

                        cf04d3753ae1babda07fdf71aa667a497aa5a490

                        SHA256

                        eedbc343819537785f5ef9600d0c365dccaa40c1eb47d925a9b764030da9e49c

                        SHA512

                        3682b5b4c9e2dddf4b6e2c5a61c6077778c00e2ed15331a5c5ebd9b93130eb87e776e1ae9aac8514a378339aa413f4c9567030f32626847d2eb14db5ddb8e0a4

                      • C:\Users\Admin\AppData\Local\TempMJSEK.txt

                        Filesize

                        163B

                        MD5

                        29a00f3273aea964d00e9b1d389d373f

                        SHA1

                        9761c3598b20ce16091679e37998d9915ed88b00

                        SHA256

                        f6ffc1a62a9bedd0c5fe8b6a030f87fe8df99eeba9df8b6d8db0ef6ab7169577

                        SHA512

                        85dc6cd08c8924bf98bfe4d6680bb5267cc56ba9a4b14b22e48212d17e13846c1116f441893fc7aba7e82f60df590155062ff65c1a1d4d242b50ed27f9bc0221

                      • C:\Users\Admin\AppData\Local\TempMPQVC.txt

                        Filesize

                        163B

                        MD5

                        80eeaee1456917ab39b5c8502e3c9e88

                        SHA1

                        a690788d8942ff90e99c8154640b2a2941dd2551

                        SHA256

                        bf4f06d107faebc7405bde4c02f40658ef02561f23d0eb402fdc9b93472c7801

                        SHA512

                        2bfdb5c42fd070c09725f28065d057838b6260ea333c7b7729835b391ed88b593b6e3f1f46e834a63030b686b8284d91cafe570498802623e4ac0e4938d16055

                      • C:\Users\Admin\AppData\Local\TempMQLTI.txt

                        Filesize

                        163B

                        MD5

                        5d5e18098b3cf11c1c03c39e3a4f55b2

                        SHA1

                        e4abcfae36455e36bae3444131488fb3f5b4de18

                        SHA256

                        ddca790c8f551f43ee598e3d5b7502657ea2ff8cfc01342e020fedc7ceca6266

                        SHA512

                        87fe2947d348c3b2a3f1d635edc9b01604f4bac699823ec4102a7664f9f083dae09a57e26b2a5ae357b80a065941d1bcf4d862e32f83405d11dc159c2cad90e0

                      • C:\Users\Admin\AppData\Local\TempMUIJJ.txt

                        Filesize

                        163B

                        MD5

                        4b307fd0a607ef531235e6a6c5dad374

                        SHA1

                        84fe4cb74c461e2a3aaccdcb506221eac560de0e

                        SHA256

                        194bb2541e6e6eefb636350e58f1f8e8d79f7b8d7ac85e16c49e614d89a94e12

                        SHA512

                        ec5b3a2444051c785e92356053d7518abed7758fb0bd6a251ec9e492f06d7c3442267ab1f007c0cb3fc96a53b17bac8a05ec6c58a220833b270fb68022c84b64

                      • C:\Users\Admin\AppData\Local\TempOXTAB.txt

                        Filesize

                        163B

                        MD5

                        fdc89c12761e8620e0325efac9e6e029

                        SHA1

                        9b9f7b82e2ec81662fee900a6ab9545bb449dc7b

                        SHA256

                        6fa19a2f12f45472c37d1a225d7643f8b8628fcba3805b8dafe126560bda4545

                        SHA512

                        796206c8875c5c09f9393c3ad741b52897fc3df1275703d5aa598579e50e2caf3d92721b8006665efa46bc41d5aed1094beb665c9f027148a97a62884e280a6a

                      • C:\Users\Admin\AppData\Local\TempPXODM.txt

                        Filesize

                        163B

                        MD5

                        f6bd5be39db4db89d196c2f9944a9580

                        SHA1

                        53b95e1a9c1e36709908f54d100d4d2bc62485c7

                        SHA256

                        7e918de8b52fdcc6b56b559131fc2da3dcae25a6ffa5d4e74fe14cc1c7f43c6f

                        SHA512

                        d9da08629c1f24b101a711d8fba4126a81fbad72a376a3671f2c4c28a57a0633954c8917f6f2b0ae1c4dcf59bbfc4395d1bbb9494861f63720027af32c8a1463

                      • C:\Users\Admin\AppData\Local\TempPYPEN.txt

                        Filesize

                        163B

                        MD5

                        e6348f4c811ee47c64701c4854ced368

                        SHA1

                        68ffe06a37d8f3204a521ec7b3357fb1b5cbb15d

                        SHA256

                        37575df12f3a31ef0ef92193c5f6e95d5693c23605f8d469c1990f11be89c6b3

                        SHA512

                        7a94944804c638197d435f2dbb392b8f9fec1edc40352ab6ea1a04a55cb8f1570dc13b31014d3ccb5ddd18a9de9ea626d9d6a4857a4414f417a3c4e462ff400e

                      • C:\Users\Admin\AppData\Local\TempQRCVV.txt

                        Filesize

                        163B

                        MD5

                        a10af8ead2ab9d0bd7d285f9a52f74e8

                        SHA1

                        cac553a4aed20dc65cac5fea0469f8e04c154424

                        SHA256

                        e751e8d49db817ca6ca6e80323db67217b6d64451ebac4f32b007694e51a88b9

                        SHA512

                        76fd0aaa92e85e4a415452cf974b7c21731cf56e53e279ee3c7e313c530e4ca6cbbbf80e1e57f2e894c9676f901a9dd929a7212295531777c50e8a4e2fd01875

                      • C:\Users\Admin\AppData\Local\TempRMUIJ.txt

                        Filesize

                        163B

                        MD5

                        147e4d1d539a94905cb7c743e7ce250d

                        SHA1

                        c4482b9bd941acb6cafce333fa98e369c1828b07

                        SHA256

                        28407de893ee67378931d1cf84a2756d085d2efa04de7ba161b4acfac9242417

                        SHA512

                        9f81a01713c2d2d2d23f6692a1a720ebfe71f8ddc15b2e98bcffb70e2e984cd174cb5144fe43c540a47955c9c4e3afac30d0406f2596ecdcca56145366e0f935

                      • C:\Users\Admin\AppData\Local\TempRSDWW.txt

                        Filesize

                        163B

                        MD5

                        fbfdf7df1883ce81b507c4eb9dbb240b

                        SHA1

                        bbe5501332c8d01b21722d5db6f7c161f6d41dc7

                        SHA256

                        20532e2e7c6a94325bebff8553bb4addcbbdf792ccb832eb05761da468565f5d

                        SHA512

                        b3ce1cff6959172d6682097a9a359bedccae250ae2645443875e2efbc255e959db3d82c3c1fef8ce70033964a761be2c9ad09866851d8abf79a17ad88eee981d

                      • C:\Users\Admin\AppData\Local\TempRSXEF.txt

                        Filesize

                        163B

                        MD5

                        a0a2de8b3049fa3eb6564df95527f498

                        SHA1

                        a1b2d30ec3e07233186bd7c1e304479a88bdc754

                        SHA256

                        a56171a3b9e2c59d0af718ebec1ee1c711523b0cd764668c325b42e44d860af2

                        SHA512

                        ec822c1670605baf9756b8cc6e149b9c2af5c0774d951a7a16d2241adc09ac07cdeb1ceb28f48e01e06dde72afe46632927d35afab22aa38b9f8c64f6a9b441b

                      • C:\Users\Admin\AppData\Local\TempSOWNC.txt

                        Filesize

                        163B

                        MD5

                        b24dc80ad6666fb076cbc5c0855ca0a1

                        SHA1

                        78e2fcca11a7bfd44c98c015f5c0088825bcf586

                        SHA256

                        0453fdc2f19498d6cab25583bfbfc1b59dbb229c6d7ee9a17c1d37dd06bca6d6

                        SHA512

                        2b0bc3b4130cf2874369c59b4fa679d8edcc4b4a2eb94631addd3cbed55e992dba9fbbcd1c52c91a040a4a2d1703c616e1854f41d4685932ea94ac332ceefdab

                      • C:\Users\Admin\AppData\Local\TempTPCOW.txt

                        Filesize

                        163B

                        MD5

                        4f05a7359d1a47247967ad197063ab50

                        SHA1

                        b253d2bde27a5ca65f55ade9424791d5e79ed3fb

                        SHA256

                        159b196afb3e0a5b45edf6086db71feffb4c900c2cb90989ec2c977c73f95245

                        SHA512

                        3071b211df13c9c86b0359713cae4f5e5c640def6590ae3eb0011c30940a28c8e692896bc3a32187c8d37cbeee6306376f582fd3f6ac67929803f0ac19c0ec24

                      • C:\Users\Admin\AppData\Local\TempTYKIM.txt

                        Filesize

                        163B

                        MD5

                        d6c294e6681b6ed947cd0025c2ceaf19

                        SHA1

                        eb4c2dd273775666d2bda0086805bd5d93f4f0f7

                        SHA256

                        674ca72e2f46c3e4d64ffd731659d9a183b71ad9bd6f2dffb4a63da0995189e0

                        SHA512

                        bf3f172d1b8d9316c76d0f2feea7f7cbdcbf7fb3e4376041589ceb866605d1a8dbe57fe2f0c9a3f0c0e3d457b19f259ae625dab51d8571b2de056e3f72eff378

                      • C:\Users\Admin\AppData\Local\TempVGHFN.txt

                        Filesize

                        163B

                        MD5

                        164862cf9c041f2e57db94dc14142445

                        SHA1

                        8805095476204301f8ca8d47b82e703f551f955c

                        SHA256

                        93bde983e5372fbc80e00d39c6bf98227af844a2ff5a0ab681388db1065aa0d8

                        SHA512

                        e2cb0cf19d90e8131b252acf60d7481d596c89952278114bbb4658341f5dfec36f328140eb5b435681f33caa80e6373ecceb6e73d578369499a8f44fca0a20df

                      • C:\Users\Admin\AppData\Local\TempVWPIO.txt

                        Filesize

                        163B

                        MD5

                        c49ab7541d0d2e5756982f07cded9975

                        SHA1

                        da95a5039311bf727d51be6fbb99a57c305bbe53

                        SHA256

                        5ca6f3eff777999b286c7e5bc16eb1174626aa3539b48bfcad2a6128653598e1

                        SHA512

                        51fa6ca96fdc4353a86d05fa0cf101079a5efea888d9f11cd7958059bda01ddb0282666a1596f94dc9b3c969effefeb1e20653c56f73cdd774ef5cb4703f29bb

                      • C:\Users\Admin\AppData\Local\TempWHFKX.txt

                        Filesize

                        163B

                        MD5

                        281ba2b07a95d0627a2dc38253e155a6

                        SHA1

                        888e9503169624c4831b9a507b70cce22a394fb9

                        SHA256

                        b290b1f8c098540d5b934d3c1dec40323cfd312591fa9eec5c6da88321e263d8

                        SHA512

                        e3a117d11466cfa034b610879c0b5ac5d8369f73e115705be4a4396ed97ed13c59071a6972b1572e2f2100fd2d9a07be815d8cc697c1473f96824074aacae425

                      • C:\Users\Admin\AppData\Local\TempWIGKF.txt

                        Filesize

                        163B

                        MD5

                        8c5699c4460a4a05b29e9f4b0fd2a5ac

                        SHA1

                        f02c062f9ec0a9d9c4fb00e5bd843300752af914

                        SHA256

                        49545e0959cffa87a212dc966c41fd7f2c55a2b724ee21725e8ae5385967a716

                        SHA512

                        52491f14476f1609660b11ba983218851ae7234f2447bd66c12da2816c47d9800b9659d9b5de2717751719f938d93b3aabf6a1b1eff0ad6299d17b031ac17b04

                      • C:\Users\Admin\AppData\Local\TempWTDOU.txt

                        Filesize

                        163B

                        MD5

                        ad2d6f94f847b4f0205474ac4d5c42ad

                        SHA1

                        0e3830f39136f824086efa05a86d809f66d7a8df

                        SHA256

                        995ea0a47410cf5f6f7a93abade39586052f7e1a30c4b798d3e2192645fbc087

                        SHA512

                        c32b158c8714730adfc6d8248b0a7ae41d19610ce917681fa19e16e59a5636fec0e9aaaebc31f0a1794f31d93fb2a653a6208c4edf0444928ceb892c9a133b20

                      • C:\Users\Admin\AppData\Local\Temp\ANJXVMWPOQCGLYK\service.exe

                        Filesize

                        520KB

                        MD5

                        cd296ba1514fee3baa0a8469e557fdf7

                        SHA1

                        085c1503efd87c716076f3708e2c681b39737bfe

                        SHA256

                        97dcd4988b0682269963180622d9e8479c1ccc4c328f26f48d998eb368e14623

                        SHA512

                        7b9ddbec83565bb8217dddf7d6885a14094a9e7bd4565d3f93bb5840e54fe20c04522b5effccca1f3a5d5c989d0fb490fd95d6a6932db36c06c0573f15d54cc2

                      • C:\Users\Admin\AppData\Local\Temp\BJBTKHBVLMJSEKP\service.exe

                        Filesize

                        520KB

                        MD5

                        a54c0473879557dec8aeb17d55a71bda

                        SHA1

                        06f958a311e28cfa417a5a9b147219c20bb49842

                        SHA256

                        9d43b780e6c98f4c889c42f2c478151551c47053665756b8dcc63bdcf38d6fef

                        SHA512

                        15cec52fe78a33866d6f5b2264143aac8627d9f1d317e204e31014e9b31593348d011678f0dc18edd6047302426a26df798d6b04b749021a99970bf3efb92559

                      • C:\Users\Admin\AppData\Local\Temp\CLCULIDWMNKTFLQ\service.exe

                        Filesize

                        520KB

                        MD5

                        5d92a8d9eb481123e13efc9b7981c152

                        SHA1

                        737b568239ae49e6e864f6549cb44a37ac228d6b

                        SHA256

                        4ac2fac27a470b8051ee48fdcebc95452feeeeaf449f45313b71ef90cbba4288

                        SHA512

                        a14d6690127c3ea0f2c00e6256587e95014aa93eb1c42b9ca823625e4228b346e1b58054934652080a87ab5b995ffa4bacd8e6033f65f984edd56ab6f5c457d7

                      • C:\Users\Admin\AppData\Local\Temp\EAVOUMDNGFHXTUC\service.exe

                        Filesize

                        520KB

                        MD5

                        7a6c589483d2b944bc6118f5619222f8

                        SHA1

                        08cb77ca1af2100471d261e7fd1e261aa7f2daf7

                        SHA256

                        a826dc49da5791e9c6a4367278e3a52e507f120464392a1ea3dbe90df4508e06

                        SHA512

                        d7c8758a980e5a75a49620cb92286f4b505fb5b94adc1fae941af251181cf08fa87d366d3a132124e1cc49d3ff57a0818c62d8861ddaf70c928a2e13bfcbfd0b

                      • C:\Users\Admin\AppData\Local\Temp\ESORUTVHLQDBPXP\service.exe

                        Filesize

                        520KB

                        MD5

                        b7a11cf84afde85e38a8a279f3fda181

                        SHA1

                        6f72fd6bdbfc33dd00f0766ba68bd90ac26db136

                        SHA256

                        f9f11d8d085d4299a94af0454ce01fcba72d650287b37779144a9f49cfed8e69

                        SHA512

                        084b99ff877b733725a97cd0df174bd41eddde240d3020affa77ece4c4f06615440740624705b7459c8c56c4bf3e0ddce3bf539e2cb5defd2f387d5106fdf3ca

                      • C:\Users\Admin\AppData\Local\Temp\FTPSVTWHMREBQYQ\service.exe

                        Filesize

                        520KB

                        MD5

                        c9933285099630e19e0821f128a4ff84

                        SHA1

                        03329fbe6511914c8cfd7f5f9438e0ffc2539d73

                        SHA256

                        aa42a611053d5a39b7ce644faf191d05b775cf34de55dc9a923ddaa63de34324

                        SHA512

                        ca2f65df81082d06b813c486946c2cca43e0806d5f86f9092876951261780799a093dc7b3add85374adadde836169ae4649495c5b5571300667824814544d9cd

                      • C:\Users\Admin\AppData\Local\Temp\GPGYQMHBBQROXJP\service.exe

                        Filesize

                        520KB

                        MD5

                        d33830e0b79f21dc9ee59158ddff27e3

                        SHA1

                        75b484c70273579c1e697f6d584f2016edcc92bb

                        SHA256

                        c0807b481eb7a8c4afbf9dc93d7970907ecbf5927ab71c8ad10f64126f54d206

                        SHA512

                        e2ce74ac641d1358431f2b607fc5e9878e5d58edb195b39153d98dc6d1a9637704010e17eb58d58c4b899058f9cba421dad29baf21e518929516127276bf60ba

                      • C:\Users\Admin\AppData\Local\Temp\GUQSWUXINSFCRQE\service.txt

                        Filesize

                        520KB

                        MD5

                        db9861487909e93ea21a2608012fadca

                        SHA1

                        ea38fffb9220d7d19b7aec518c643eb2671b25d2

                        SHA256

                        7ee976d89be05d3cad3d7002a4179887f88e201bad01d47d627ec16d72d586c2

                        SHA512

                        13a966fe8897970ae28985f624c8554f6485912f023c02ad4636195d35293d89c5af8cc7a528f513a887493c8c636339b3a0216dcf9ed286a2b1a69d15270c74

                      • C:\Users\Admin\AppData\Local\Temp\HQIESWIJGPBHMAC\service.exe

                        Filesize

                        520KB

                        MD5

                        8e82db9adf6fccbe689f288488509dc1

                        SHA1

                        8c9b8cad31a9217bb725f9a7bd617a9042e68ca0

                        SHA256

                        98d3bbb22aefe743ef6697e52a21674fb6f17f69b464ce7c2dc7a0ef8a0a2e58

                        SHA512

                        c716a23d96e624cc9da828954f06993c0a01a18c096c4e8f0e4932f00946856701fb41b16c1f69d280ce0c3040ff7befcbcc416eede1a0a2ddec3398db8c64a3

                      • C:\Users\Admin\AppData\Local\Temp\IWSAUYWKPUBBHAE\service.exe

                        Filesize

                        520KB

                        MD5

                        95c9585f0fa1be5a355044221ea46293

                        SHA1

                        325447a984c8b208b540aef3e4e6236279cd6c69

                        SHA256

                        835774290e4ebbd181cd965a12c6336be6f4bae2eaa8a699aea6f5cc03be2c86

                        SHA512

                        38c3deac86f2048f3dc7dbfeb2ebedc4f2afff465a88710f65a99ffa3eae6ebf5fb8180ad9a81cbc24311b51ce86423894c06118ad1c647dda5288e8239a6634

                      • C:\Users\Admin\AppData\Local\Temp\JBRAISOJEDTURAA\service.exe

                        Filesize

                        520KB

                        MD5

                        31606285bfddc0232df9ac343833c9be

                        SHA1

                        823cdc6a6feaadc8f68e617d9bc67e0028f09951

                        SHA256

                        b3aba4939a73432d543d6b8aa812d6e837460f6b0ed677892a7af83597eafeae

                        SHA512

                        890edb77a904e755973285714f1f6272bc03e3606a33f1181011d2dabda759bcbcce429cb38aad51a6c3262a249cdcf5d9161b22cc92a72054aef1d851c7b3c5

                      • C:\Users\Admin\AppData\Local\Temp\KGUSJTMLNDIWVHQ\service.exe

                        Filesize

                        520KB

                        MD5

                        3e74eb72dfa247181b22269cc9b1685c

                        SHA1

                        d19ae1482486c9b2c917a7e56223fd03c5fd2db9

                        SHA256

                        4e013ff6633efa9b8ed5d14a49e1ad164d8cce01f99131238eaa5eef32bb0a37

                        SHA512

                        220f2f5c7f3f108f00cee682b072c0e4d749fb3cccf3524aa894235666d5fb96cebc50b73800d6cd1acbb524b054f1c8cfc03fcdf0c88a9a074a8bedfedb3c30

                      • C:\Users\Admin\AppData\Local\Temp\LHWUKUOMPAEKXXJ\service.exe

                        Filesize

                        520KB

                        MD5

                        1bfd20e79382e4c1d760a48d092a3fe9

                        SHA1

                        7fc7eb4ef7537ed100292e8487bcab47a78f77af

                        SHA256

                        c8c95c37914da504665bcd481971fc274feae2694b67c10010d4ddfa9b90d4ef

                        SHA512

                        5c88bd454fe20ac820769051c08bfeb863d1338499fcfea3ea6a3183debc8f146dd21f24da082109bf65959fb61840e4f8f423d7ff25c3444f96418cf036483d

                      • C:\Users\Admin\AppData\Local\Temp\PSIBYAHQGMDULAK\service.exe

                        Filesize

                        520KB

                        MD5

                        15bc22cf6d40d0db769884b505bba0f0

                        SHA1

                        fa901fe789a6551f2555e13bfbcd1503cb9f2304

                        SHA256

                        c646991f54173dcaa05547aa0e752940feacb96ea8e239c4ee3dabdacca6833e

                        SHA512

                        dc3ac5d11159db07f8e65e45124481634367d833c380bc080212d8ea811b26e3b02da81ef1060e1832b73a9891ebc859f6f3bfaf47c84641b84ca7bbb31ec396

                      • C:\Users\Admin\AppData\Local\Temp\RKJRFEGBGCWRFMH\service.exe

                        Filesize

                        520KB

                        MD5

                        569d323c9a85bbbb67bcb0ede0cedfad

                        SHA1

                        b02c1e14d40eeb0b92559d3ae5e9efed0f96e0c4

                        SHA256

                        e268db4b0a104b0754b7260aa0ab55914d783d73abf0c7b4f7cb059fceaff108

                        SHA512

                        d5815251ea027ac686722a68f981a1b60b7ab6fe2cef35c9d4b080b28f7cfd8df2da72ef596e4c9891639b9aa4f03482e96dcb94381aa66b524156839928dd70

                      • C:\Users\Admin\AppData\Local\Temp\RKJRFFGBGCXRFMH\service.exe

                        Filesize

                        520KB

                        MD5

                        1e2afae9dec7f183e1b2544e9856c409

                        SHA1

                        8505fef5eaf52cab2c1042b6ebdefa6e9c47a888

                        SHA256

                        2f965484b486a8e1b2c88bb887fe22310155447ef1b2c3f9caec243f709fac29

                        SHA512

                        d814afb5f65c223479e1b64633664e6ab847bf89031e249666b64c4309d70595aae8d6bc2db2a874eee53bcdc3081f850b4c9c8e23ac5674d037333b19f0edab

                      • C:\Users\Admin\AppData\Local\Temp\TVLFDKUKPHYPDOE\service.exe

                        Filesize

                        520KB

                        MD5

                        e8c0ca4130520dfe861912d309202091

                        SHA1

                        0fc4887554ed282e840d55b3dce533b3eb448328

                        SHA256

                        8acbb9f817648cbe4874ac6ae79c658e841443ec5ae54eb068e20eb214af0dfc

                        SHA512

                        d64eec0ad455a7185c1c3b7940be4b46f2b539681df488c092f1edcf0447678a6ea1eb8f5fc649e881ae88dfd01a21a19949bae2f46ad7d1c197ca46e20e9506

                      • C:\Users\Admin\AppData\Local\Temp\TWLFELUKQHYPDOE\service.exe

                        Filesize

                        520KB

                        MD5

                        005058a8a570a2befb3e9c041894d3aa

                        SHA1

                        2650b10c5420b8ddb5993b24d2fa09b1e56bc05a

                        SHA256

                        88973dede2be607bea67b300dcfa53c691abd571094907d1d6ad6f7ed56485f5

                        SHA512

                        18733c0503fe44e53cfa62fab30829e7cde74ebde89be3f04a9365498dedbe92c78191d8bc576f5a58b456838a30e96164e0d9593e5b72f8a209c7c03139f9f2

                      • C:\Users\Admin\AppData\Local\Temp\UATDPOQLJQMBPWF\service.exe

                        Filesize

                        520KB

                        MD5

                        43f01e212dbb0d0eca314f05dcb12ada

                        SHA1

                        c3d997459e408c6b5878ad81c26c400b1a1937b6

                        SHA256

                        29e375d9961a1a47daad13d8465a1fa141a7ec8740d18e42440397b5c1addb0d

                        SHA512

                        a5ef46f02617e47ff97cd4cb5dce770d4ee7096f5100186f4e487667aae9df5ae593ec33353688da39c65fbe988eddb894c7e35b78b6b595b3d6f690e95f86a4

                      • C:\Users\Admin\AppData\Local\Temp\UNMUIHJECJEUIPK\service.exe

                        Filesize

                        520KB

                        MD5

                        6f07115821e4ee3604e52b40486be643

                        SHA1

                        7eecc5352e5b54fe71d41f12606658fcfe58b8e9

                        SHA256

                        c942e76608813366b7bc3336c782489a341d0922358e4edc67ae68ea595edf1b

                        SHA512

                        4d02aa8aeaa4e75e44f1ce19b489431be7079f08d2b12d6776c63d7d51c61e812059aaee961f6c9ba6d97c962fbcdc4e3c4ecc34b2827aa779ee8051d1e29aa5

                      • C:\Users\Admin\AppData\Local\Temp\YBSLRYJAKDXCEUQ\service.exe

                        Filesize

                        520KB

                        MD5

                        bdb9e614c02093377e6c162fd43375c4

                        SHA1

                        8ae53203278e1923c53604a0ef723e10c4d1f1d1

                        SHA256

                        0d7edefa56e4147f117dac4d083ad144cd0d513ea7318ef67901397c226374af

                        SHA512

                        dd68c41592c009fb037178f55cd319b332723523391877481c32eff52774ca517487dfa3c133f8f6bdc983849aeb2ea835c8f5ffc31235e2c21fdbe753c12736

                      • C:\Users\Admin\AppData\Local\Temp\YRQAYMLNIGNJYMT\service.exe

                        Filesize

                        520KB

                        MD5

                        ed7f51decdcbf0dc742ce389172dc0e3

                        SHA1

                        de9974bc859c66ab478bae5f7d39ce20d73c7f84

                        SHA256

                        b415b1b0b582f2cae0b60b78bc8ca9ed81cb1cb0922a130ca62e63b99a5dfabe

                        SHA512

                        e1b5fcac8065fcac83c30f9d63851c2cd6749a1b37badd097c77f1b1eae99a0f3898e349361fd1a1085d1a27a961d0ee789d06c84890b5008657d54a32c9da77

                      • memory/1372-762-0x0000000000400000-0x0000000000471000-memory.dmp

                        Filesize

                        452KB

                      • memory/1372-763-0x0000000000400000-0x0000000000471000-memory.dmp

                        Filesize

                        452KB

                      • memory/1372-768-0x0000000000400000-0x0000000000471000-memory.dmp

                        Filesize

                        452KB

                      • memory/1372-771-0x0000000000400000-0x0000000000471000-memory.dmp

                        Filesize

                        452KB

                      • memory/1372-772-0x0000000000400000-0x0000000000471000-memory.dmp

                        Filesize

                        452KB

                      • memory/1372-773-0x0000000000400000-0x0000000000471000-memory.dmp

                        Filesize

                        452KB

                      • memory/1372-775-0x0000000000400000-0x0000000000471000-memory.dmp

                        Filesize

                        452KB

                      • memory/1372-776-0x0000000000400000-0x0000000000471000-memory.dmp

                        Filesize

                        452KB

                      • memory/1372-777-0x0000000000400000-0x0000000000471000-memory.dmp

                        Filesize

                        452KB

                      • memory/1372-779-0x0000000000400000-0x0000000000471000-memory.dmp

                        Filesize

                        452KB