Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    28-11-2020 00:43

General

  • Target

    4448.exe

  • Size

    307KB

  • MD5

    3ba71636ccecaedce74887a8744f47f5

  • SHA1

    628a557f8952bac80acccf5fb5a110ca7957a40f

  • SHA256

    f0477a54192fcb83e719cab38b6ba9e12c677d37ba5b2ea20051ebbf3c9c3995

  • SHA512

    d16a2aa6a453ff47093c1249a7ef14f8cb2cc6d928f13fb1db1773c5b351f6e76b4e709a93da094ef4b481c69f272d94cb946d5a36e007a1bf24cee1ab1571d7

Malware Config

Extracted

Family

gozi_ifsb

Botnet

4448

C2

web.vortex.data.microsoft.com

ocsp.sca1b.amazontrust.com

89.249.65.165

Attributes
  • dga_season

    10

  • dns_servers

    107.174.86.134

    107.175.127.22

  • exe_type

    worker

  • server_id

    12

rsa_pubkey.base64
serpent.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Deletes itself 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Discovers systems in the same network 1 TTPs 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\4448.exe
      "C:\Users\Admin\AppData\Local\Temp\4448.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1744
    • C:\Windows\System32\mshta.exe
      "C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\CB4B3BAF-AEAE-3526-102F-C23944D3167D\\\Auxisext'));if(!window.flag)close()</script>"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\CB4B3BAF-AEAE-3526-102F-C23944D3167D").aepiesrv))
        3⤵
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1200
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mhwodcsb\mhwodcsb.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1036
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3A90.tmp" "c:\Users\Admin\AppData\Local\Temp\mhwodcsb\CSC30A71AC164AD49BBB8204E57CB4BB5B.TMP"
            5⤵
              PID:1756
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\b2mptg01\b2mptg01.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:516
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3B1D.tmp" "c:\Users\Admin\AppData\Local\Temp\b2mptg01\CSC591C21F4ECC24EE9A21A6767EAA8B54.TMP"
              5⤵
                PID:1792
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\4448.exe"
          2⤵
          • Deletes itself
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1104
          • C:\Windows\system32\PING.EXE
            ping localhost -n 5
            3⤵
            • Runs ping.exe
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:724
        • C:\Windows\system32\cmd.exe
          cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\2304.bi1"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1396
          • C:\Windows\system32\nslookup.exe
            nslookup myip.opendns.com resolver1.opendns.com
            3⤵
              PID:1916
          • C:\Windows\system32\cmd.exe
            cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\750.bi1"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1860
            • C:\Windows\system32\nslookup.exe
              nslookup myip.opendns.com resolver1.opendns.com
              3⤵
                PID:536
            • C:\Windows\system32\cmd.exe
              cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2304.bi1"
              2⤵
                PID:1728
              • C:\Windows\system32\cmd.exe
                cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\750.bi1"
                2⤵
                  PID:968
                • C:\Windows\system32\cmd.exe
                  cmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\32B8.bin1"
                  2⤵
                    PID:1640
                    • C:\Windows\system32\systeminfo.exe
                      systeminfo.exe
                      3⤵
                      • Gathers system information
                      PID:1908
                  • C:\Windows\system32\makecab.exe
                    makecab.exe /F "C:\Users\Admin\AppData\Local\Temp\496A.bin"
                    2⤵
                      PID:1156
                    • C:\Windows\system32\makecab.exe
                      makecab.exe /F "C:\Users\Admin\AppData\Local\Temp\E78E.bin"
                      2⤵
                        PID:644
                      • C:\Windows\system32\cmd.exe
                        cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"
                        2⤵
                          PID:1344
                        • C:\Windows\system32\cmd.exe
                          cmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"
                          2⤵
                            PID:924
                            • C:\Windows\system32\net.exe
                              net view
                              3⤵
                              • Discovers systems in the same network
                              PID:1780
                          • C:\Windows\system32\cmd.exe
                            cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"
                            2⤵
                              PID:1736
                            • C:\Windows\system32\cmd.exe
                              cmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"
                              2⤵
                                PID:1172
                                • C:\Windows\system32\nslookup.exe
                                  nslookup 127.0.0.1
                                  3⤵
                                    PID:1908
                                • C:\Windows\system32\cmd.exe
                                  cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"
                                  2⤵
                                    PID:1396
                                  • C:\Windows\system32\cmd.exe
                                    cmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"
                                    2⤵
                                      PID:1688
                                      • C:\Windows\system32\tasklist.exe
                                        tasklist.exe /SVC
                                        3⤵
                                        • Enumerates processes with tasklist
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1780
                                    • C:\Windows\system32\cmd.exe
                                      cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"
                                      2⤵
                                        PID:1152
                                      • C:\Windows\system32\cmd.exe
                                        cmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"
                                        2⤵
                                          PID:1200
                                          • C:\Windows\system32\driverquery.exe
                                            driverquery.exe
                                            3⤵
                                              PID:724
                                          • C:\Windows\system32\cmd.exe
                                            cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"
                                            2⤵
                                              PID:1564
                                            • C:\Windows\system32\cmd.exe
                                              cmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"
                                              2⤵
                                                PID:1752
                                                • C:\Windows\system32\reg.exe
                                                  reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s
                                                  3⤵
                                                    PID:1640
                                                • C:\Windows\system32\cmd.exe
                                                  cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\32B8.bin1"
                                                  2⤵
                                                    PID:1260
                                                  • C:\Windows\system32\cmd.exe
                                                    cmd /U /C "type C:\Users\Admin\AppData\Local\Temp\32B8.bin1 > C:\Users\Admin\AppData\Local\Temp\32B8.bin & del C:\Users\Admin\AppData\Local\Temp\32B8.bin1"
                                                    2⤵
                                                      PID:1192
                                                    • C:\Windows\system32\makecab.exe
                                                      makecab.exe /F "C:\Users\Admin\AppData\Local\Temp\EBD2.bin"
                                                      2⤵
                                                        PID:1420
                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                      1⤵
                                                      • Modifies Internet Explorer settings
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SetWindowsHookEx
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:396
                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:396 CREDAT:275457 /prefetch:2
                                                        2⤵
                                                        • Modifies Internet Explorer settings
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1816
                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:396 CREDAT:668677 /prefetch:2
                                                        2⤵
                                                        • Modifies Internet Explorer settings
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1648

                                                    Network

                                                    MITRE ATT&CK Matrix ATT&CK v6

                                                    Defense Evasion

                                                    Modify Registry

                                                    1
                                                    T1112

                                                    Discovery

                                                    System Information Discovery

                                                    2
                                                    T1082

                                                    Remote System Discovery

                                                    2
                                                    T1018

                                                    Process Discovery

                                                    1
                                                    T1057

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w5ukms8\imagestore.dat
                                                      MD5

                                                      8170668a7e1917d247bf57831c8bbdf0

                                                      SHA1

                                                      816e71f9296f6b2672d4aecd31c88afd147f9df2

                                                      SHA256

                                                      36c337fd4102004183c806538a63ac6c51a0d50b43a1e91192d86d70effbbaa8

                                                      SHA512

                                                      5228c6c9ed8c83fd45366d3d0e23ba4a4dc6c300621243cdbab74b947e74a04595e571781cfc9e3475fac5016b32499b68d4898520c82b446c10cd9697913f8a

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D73194RS\favicon[1].ico
                                                      MD5

                                                      f74755b4757448d71fdcb4650a701816

                                                      SHA1

                                                      0bcbe73d6a198f6e5ebafa035b734a12809cefa6

                                                      SHA256

                                                      e78286d0f5dfa2c85615d11845d1b29b0bfec227bc077e74cb1ff98ce8df4c5a

                                                      SHA512

                                                      e0fb5f740d67366106e80cbf22f1da3cf1d236fe11f469b665236ec8f7c08dea86c21ec8f8e66fc61493d6a8f4785292ce911d38982dbfa7f5f51dadebcc8725

                                                    • C:\Users\Admin\AppData\Local\Temp\13EE.bin\AuthRoot.pfx
                                                      MD5

                                                      d6387e77baf28f83e233182fdc06fa44

                                                      SHA1

                                                      46ad61329e19c49ef3c5c62f155dffc6970dbbe1

                                                      SHA256

                                                      f1b8c8c581be7652d3b28b90e5c978dac189359c4eed6dac7dbeb47b003f4f44

                                                      SHA512

                                                      a42a7588b93158b2cff14a1bc162fb9ff3d2ae2a68aa7b09c2c120c26e07ad46e4b96a82c3ab639f035af3424495b7a63ee40ee0de199a8588232410e85cbfaf

                                                    • C:\Users\Admin\AppData\Local\Temp\13EE.bin\Disallowed.pfx
                                                      MD5

                                                      4e9d769423a90cdbffffc29b7b215e56

                                                      SHA1

                                                      f50231a7bd9c8964a90a340f7e6e73c574b9835d

                                                      SHA256

                                                      b8e718b7955e82b88f56916089e6bc882863d390e3278da271e03c5d93899597

                                                      SHA512

                                                      7b9f9bf8cc18f86bdede1d215d80265bed9a333dc6a08ec4027e6db783b32597e5fd0625c382c3f719a7b39ac793414c70820666ae8bee86242df289b0b361d8

                                                    • C:\Users\Admin\AppData\Local\Temp\13EE.bin\Root.pfx
                                                      MD5

                                                      17f6a7958f7dbb297cd422b5b78d1e87

                                                      SHA1

                                                      9086a0e242a0d89e4a510996351f2226d8075572

                                                      SHA256

                                                      7a2d6c0d228ae169b1f75cb22149bf4ee9cbdd193cad01b18e9b8e839c4d5336

                                                      SHA512

                                                      fb912b507cf1df447397bb7f199a7ea55cdb6cf5f41d76299f948ec278d0e1ce636aa6c7ffe6a03c82ab2cb06c793c72dfa39acaa7a11af06e1eb7904ed0fef3

                                                    • C:\Users\Admin\AppData\Local\Temp\13EE.bin\setup.inf
                                                      MD5

                                                      2b396128667b04140ef82e1bd3d30815

                                                      SHA1

                                                      fe2a9abd8151b6f13cc4f8001b53976a0d908d3e

                                                      SHA256

                                                      a818a16f4c9000e79ff7bdb41742736c64af0814fd52d21399be41ee5fb7e814

                                                      SHA512

                                                      9cbd91e697df11e1b937e19ca0690f6ef92fee92acd415e001f7e8d76bcfc7ca70222723e7f9571302e372f747c1e425f7508e32248d03406015481820d82f25

                                                    • C:\Users\Admin\AppData\Local\Temp\13EE.bin\setup.rpt
                                                      MD5

                                                      45c8797d50b8240901dae3fc9dfc2c7f

                                                      SHA1

                                                      5e1d77ac3352b90ff3fbc4c55a6b09d8347a7f9f

                                                      SHA256

                                                      ea8ca91c534fb3276e307407624e6a638819445f13b83d839e560d71269a3e9e

                                                      SHA512

                                                      8b841f761101323d79f9a76c931071920b0558790e523137aff5b7d828e3d90ec8efe4b117774f5c97817155c3a9a8dce9c56fa97940d822443cde718b5d7a1d

                                                    • C:\Users\Admin\AppData\Local\Temp\2304.bi1
                                                      MD5

                                                      c4f77466fa6bb3b7b587745fd51eb73e

                                                      SHA1

                                                      c9ee49b895e2cec4483b9e3d84e32f0d650edcbb

                                                      SHA256

                                                      37d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8

                                                      SHA512

                                                      51c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7

                                                    • C:\Users\Admin\AppData\Local\Temp\2304.bi1
                                                      MD5

                                                      c4f77466fa6bb3b7b587745fd51eb73e

                                                      SHA1

                                                      c9ee49b895e2cec4483b9e3d84e32f0d650edcbb

                                                      SHA256

                                                      37d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8

                                                      SHA512

                                                      51c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7

                                                    • C:\Users\Admin\AppData\Local\Temp\32B8.bin
                                                      MD5

                                                      9cb237b01bdc88ebc88e8c7096f4ef24

                                                      SHA1

                                                      8fe0f75d7d826e12b1941c996869644797f06cf6

                                                      SHA256

                                                      47ccc0e567d32c7f7c4ab8a9c3528ae7b8d96669eb821db0650f1e8898905a6d

                                                      SHA512

                                                      f33a5a58d92b8ce53aa15743b9663a94a17b2115e098a04ec8a6be65d5204cc25c53b7c0d9a653ab9fe93e159731c95c3d7676f767f8deb17a3e1511c783d0bf

                                                    • C:\Users\Admin\AppData\Local\Temp\32B8.bin
                                                      MD5

                                                      9cb237b01bdc88ebc88e8c7096f4ef24

                                                      SHA1

                                                      8fe0f75d7d826e12b1941c996869644797f06cf6

                                                      SHA256

                                                      47ccc0e567d32c7f7c4ab8a9c3528ae7b8d96669eb821db0650f1e8898905a6d

                                                      SHA512

                                                      f33a5a58d92b8ce53aa15743b9663a94a17b2115e098a04ec8a6be65d5204cc25c53b7c0d9a653ab9fe93e159731c95c3d7676f767f8deb17a3e1511c783d0bf

                                                    • C:\Users\Admin\AppData\Local\Temp\32B8.bin1
                                                      MD5

                                                      b639463e733c2db24954535e40380f72

                                                      SHA1

                                                      377bdc5e0f13d062e7df426d8dbd37b644060565

                                                      SHA256

                                                      f94d6d8ca75f7d7fab7483fed14fed7bfd0e3380e2174b624541502e4d3facbd

                                                      SHA512

                                                      096ed8dc2a4eed9765d7c1bc6d320a3efa25c1bca3597faad66a5a3aeee7781390659881736b68c225b8960528152f7b2fb8ffcff9ce732f7cf5995f6a5202a0

                                                    • C:\Users\Admin\AppData\Local\Temp\32B8.bin1
                                                      MD5

                                                      20b350cf65330497f10dc1733f94dbdc

                                                      SHA1

                                                      18bf21908827ccf01b432f7a91ee70dd6a4762b9

                                                      SHA256

                                                      c15398a1b37efb9235adb96dd7cb02347e778fa745a2c4a37aedd6d291f21c8d

                                                      SHA512

                                                      eb68c7c6e851db2242c7e604fd37d355908e8f96736acb48f7a46c4af022974f9f60ce471e9a0b4efd15dbabc7320a12910807e03b83f1cb9a27d0f231f3bf52

                                                    • C:\Users\Admin\AppData\Local\Temp\32B8.bin1
                                                      MD5

                                                      7f4045b07ff2086761dca8d35a9b4fe5

                                                      SHA1

                                                      69a3729e7d5c7075f4665ad233e4b71e53abc5b2

                                                      SHA256

                                                      5e1c3e5ab60d40e2997485b7b23d6bbe4354665fdb2c776c17a37f2daa86574e

                                                      SHA512

                                                      81cb533be44eef0d8534ae9cbb2a6dc70abcea1b0049bc7413eccd40420d8e4891b2280871cbdabadacd8dbba9af245b66e9fc07e6db3faa95a5ac6d5b001243

                                                    • C:\Users\Admin\AppData\Local\Temp\32B8.bin1
                                                      MD5

                                                      7f4045b07ff2086761dca8d35a9b4fe5

                                                      SHA1

                                                      69a3729e7d5c7075f4665ad233e4b71e53abc5b2

                                                      SHA256

                                                      5e1c3e5ab60d40e2997485b7b23d6bbe4354665fdb2c776c17a37f2daa86574e

                                                      SHA512

                                                      81cb533be44eef0d8534ae9cbb2a6dc70abcea1b0049bc7413eccd40420d8e4891b2280871cbdabadacd8dbba9af245b66e9fc07e6db3faa95a5ac6d5b001243

                                                    • C:\Users\Admin\AppData\Local\Temp\32B8.bin1
                                                      MD5

                                                      48117fd7fea1cb8a07007763e6f08e46

                                                      SHA1

                                                      17071d86aa287e7450748b2fa1bf43947ad91a6d

                                                      SHA256

                                                      6b42aa7045fc99f349e39611aa3cf29d996725cb74a1b0508f5fa260aaa44dfd

                                                      SHA512

                                                      120cef4a1c322a6dd690d440119583640fdb25ae66c80e13cf5b9d54512f87e6ee63f8ae76715872d28065155b53f8d6af807305a64c0882fafe9309cccb2f98

                                                    • C:\Users\Admin\AppData\Local\Temp\32B8.bin1
                                                      MD5

                                                      d286c6e831e15fe3d9716d47fcac555d

                                                      SHA1

                                                      b676212360fbe831c968cefc88180590f4405fbc

                                                      SHA256

                                                      0d68af680f492b04a3f18b672629b447a1d4b0327fae53a8731ef00281eaaca1

                                                      SHA512

                                                      3ee73c7e2d684aae6effafaccead81b388aa3858b2305f9500f3353dba96bd2705a59c19056df3d3309465ad20824ca5f2b0f89264e598adb3857a7bd2e49c76

                                                    • C:\Users\Admin\AppData\Local\Temp\32B8.bin1
                                                      MD5

                                                      1e21d90d6c7cdb095df7de5cbaabdd4b

                                                      SHA1

                                                      09d1685e917ffce8a67a910979e6f406ac18fa4a

                                                      SHA256

                                                      f8fddc7410860e968936d0ed29a3b847100ce4a8e695fb834298f00423894717

                                                      SHA512

                                                      d1d6c5eac63004b1c8a004b8f4e3491bfecb9adecbf3a73c0db66d362df0571a750e4e7e66a2b3dfc417f3c406ad7b3e8f7bd6f2f3d284844adb697e4d9da078

                                                    • C:\Users\Admin\AppData\Local\Temp\32B8.bin1
                                                      MD5

                                                      1e21d90d6c7cdb095df7de5cbaabdd4b

                                                      SHA1

                                                      09d1685e917ffce8a67a910979e6f406ac18fa4a

                                                      SHA256

                                                      f8fddc7410860e968936d0ed29a3b847100ce4a8e695fb834298f00423894717

                                                      SHA512

                                                      d1d6c5eac63004b1c8a004b8f4e3491bfecb9adecbf3a73c0db66d362df0571a750e4e7e66a2b3dfc417f3c406ad7b3e8f7bd6f2f3d284844adb697e4d9da078

                                                    • C:\Users\Admin\AppData\Local\Temp\32B8.bin1
                                                      MD5

                                                      4f0c66478bf5840fce6775dec494bd7e

                                                      SHA1

                                                      c9857e454ae50db03f078db0a3488418b98005cb

                                                      SHA256

                                                      8e01a34a99ab7a4a3f5b0775d25125c302fd5a522c7e4993b5d5e42dfcae3f72

                                                      SHA512

                                                      2585ff7a9483e3734b414a4b1acb5744aa245147fa5e42a59d6eb898ef4dee80617ea2ef8b732fa15236f2c10775f3cb74674a880077fb5fb0dd0b61f93685af

                                                    • C:\Users\Admin\AppData\Local\Temp\32B8.bin1
                                                      MD5

                                                      4f0c66478bf5840fce6775dec494bd7e

                                                      SHA1

                                                      c9857e454ae50db03f078db0a3488418b98005cb

                                                      SHA256

                                                      8e01a34a99ab7a4a3f5b0775d25125c302fd5a522c7e4993b5d5e42dfcae3f72

                                                      SHA512

                                                      2585ff7a9483e3734b414a4b1acb5744aa245147fa5e42a59d6eb898ef4dee80617ea2ef8b732fa15236f2c10775f3cb74674a880077fb5fb0dd0b61f93685af

                                                    • C:\Users\Admin\AppData\Local\Temp\32B8.bin1
                                                      MD5

                                                      9cb237b01bdc88ebc88e8c7096f4ef24

                                                      SHA1

                                                      8fe0f75d7d826e12b1941c996869644797f06cf6

                                                      SHA256

                                                      47ccc0e567d32c7f7c4ab8a9c3528ae7b8d96669eb821db0650f1e8898905a6d

                                                      SHA512

                                                      f33a5a58d92b8ce53aa15743b9663a94a17b2115e098a04ec8a6be65d5204cc25c53b7c0d9a653ab9fe93e159731c95c3d7676f767f8deb17a3e1511c783d0bf

                                                    • C:\Users\Admin\AppData\Local\Temp\32B8.bin1
                                                      MD5

                                                      9cb237b01bdc88ebc88e8c7096f4ef24

                                                      SHA1

                                                      8fe0f75d7d826e12b1941c996869644797f06cf6

                                                      SHA256

                                                      47ccc0e567d32c7f7c4ab8a9c3528ae7b8d96669eb821db0650f1e8898905a6d

                                                      SHA512

                                                      f33a5a58d92b8ce53aa15743b9663a94a17b2115e098a04ec8a6be65d5204cc25c53b7c0d9a653ab9fe93e159731c95c3d7676f767f8deb17a3e1511c783d0bf

                                                    • C:\Users\Admin\AppData\Local\Temp\496A.bin
                                                      MD5

                                                      a00d540c98c51db12502f25c362fed22

                                                      SHA1

                                                      6606c30cca180dc29d1c2e5326fa9b5c59757a4e

                                                      SHA256

                                                      136a1e18ddaeb6c8ff671157b6665524ff2d44ac79fe2e6bd94e9737f03eca61

                                                      SHA512

                                                      34de0f0052bbc488f953ca86025e4fa18b8a908b2eb5d4d5b0b36a45625e5504849c5c2dba1c7e1cfae0ba2136b59d98a9a74dbe7ec2e0a85a7d5655867448ac

                                                    • C:\Users\Admin\AppData\Local\Temp\520E.bin
                                                      MD5

                                                      19e6a29447ddbd3eb9027f0dbd1807fa

                                                      SHA1

                                                      d3ffbce5588ee6661096b47b3d4c23be0ac3be22

                                                      SHA256

                                                      59f662476955d02f44457ed8475d1706a834e794cf43256d12b1448805377690

                                                      SHA512

                                                      15ac38a5a8e26788f7952d2e89ce4ef730e36e79674a92ca28a7153a5447b58e054ef3fdfa51627af3c8018378bc98dffc77f698812fdc596680a556c2383261

                                                    • C:\Users\Admin\AppData\Local\Temp\750.bi1
                                                      MD5

                                                      c4f77466fa6bb3b7b587745fd51eb73e

                                                      SHA1

                                                      c9ee49b895e2cec4483b9e3d84e32f0d650edcbb

                                                      SHA256

                                                      37d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8

                                                      SHA512

                                                      51c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7

                                                    • C:\Users\Admin\AppData\Local\Temp\750.bi1
                                                      MD5

                                                      c4f77466fa6bb3b7b587745fd51eb73e

                                                      SHA1

                                                      c9ee49b895e2cec4483b9e3d84e32f0d650edcbb

                                                      SHA256

                                                      37d5f9a9a4db772e5bcc6a0211a3092049c09f438067bc36cde152e10b79eeb8

                                                      SHA512

                                                      51c1ddeac48567d106cbcc5bad19b31639b73ec66d11ed83dbc90da880792df0b6bd6c6e28a712e854ceeb6bd96a3985e521cb9d666b0ccd087e96f4a90fc7d7

                                                    • C:\Users\Admin\AppData\Local\Temp\E78E.bin
                                                      MD5

                                                      988409dfdd08f9da924e8549eefac10d

                                                      SHA1

                                                      4632e4944aed08f486ea6540b78f16f0f87d3bb4

                                                      SHA256

                                                      7632f5fd94d5a8e076fe9d04a251fe93f692ab379d5921407c8a145c2fd66bf7

                                                      SHA512

                                                      30d536031237748cd7c9637575360c56b1dbc68c28d9681304c97c95365760211da396a568a8439f22c7a4b1c21f4e30e293b8f2ed27125903a719180b97e4cf

                                                    • C:\Users\Admin\AppData\Local\Temp\EBD2.bin
                                                      MD5

                                                      639674213e036d7dd58ffe162d94b964

                                                      SHA1

                                                      f24a2c483be099a8577dc7c0ab0621c162dca176

                                                      SHA256

                                                      625f690d87c1d0157b3fc5addf1cb8f1910b9522dea7eff2ca3894de0bc04cfd

                                                      SHA512

                                                      102e514204a966ced6b2128ce11241baf3ee994cd9f0572d35e22be08c92b0d92edc95d14f459cbd8562490eb94ebc31706dcaa63e08c08ef81541fbb8c49c70

                                                    • C:\Users\Admin\AppData\Local\Temp\F032.bin
                                                      MD5

                                                      99accf5a7fa1cc529cba0694001fc61f

                                                      SHA1

                                                      3ace85ebeda76c9f2ffb8b21ca037a3ce1b6e734

                                                      SHA256

                                                      dd179c7187b95835f3b73b363eced6a3ad41bb0b55bb4e5d33e70c8abfa5d581

                                                      SHA512

                                                      c62aeea71820ac2518e66c6b03d011ca3faa8a3dc1777e5897eb9d0c3bb7284efe4ce59b16ae0b61c076b946f7ef7540f65d675aa9d00fd5503a93e5863785c2

                                                    • C:\Users\Admin\AppData\Local\Temp\F476.bin
                                                      MD5

                                                      7179e67568ebfb8fed24248e7b900f26

                                                      SHA1

                                                      06ad3c8683fc0f2033e27b25e9da14937754de47

                                                      SHA256

                                                      87739a90fdd980605decfae242eac64034683ad0fa56d6cf5d03cc3043777c37

                                                      SHA512

                                                      dda95f24f937961a3fa06aa8b59c6759dd1935c6a00b4e8d98ee82e190432d5adf437385be45ac3ca53997776d704f1910cfaf8de5e6bac8e9798a5534438353

                                                    • C:\Users\Admin\AppData\Local\Temp\RES3A90.tmp
                                                      MD5

                                                      5f5515971538b09c79dc8681cf7d42a8

                                                      SHA1

                                                      a73c8a81d5303d2b42e0980c6a67325c04801c54

                                                      SHA256

                                                      79106f4ab9d66d359eb918bcf6d7a585b22282cc6c77580b5eb1f9ab4cf6d8d0

                                                      SHA512

                                                      3ed05e1b26856c872d8e65bdfd7a445debba469e96774437134be052fbdd159f9fcdb00674816e3ad574c4d0f39a7851a0944a00db48a2afe9ef21555cd676dd

                                                    • C:\Users\Admin\AppData\Local\Temp\RES3B1D.tmp
                                                      MD5

                                                      305e37a0bb5e86607d95dbf8c2a9e47d

                                                      SHA1

                                                      2d1b4a6e427a78d262a77557ba4e9aac81c5a4d5

                                                      SHA256

                                                      e6a5551e1322ebca4e76e79e8d2202908e5125ba93eecae9369454cbffa2e3ec

                                                      SHA512

                                                      a5d4f77fac18b3316b37229d6ec58c5196b7e17e62e402f98ad27c53e13441a6434065d75a6fb890a83803c50cd40c2634b2c281ba76a13449cfe1ca4a05ef36

                                                    • C:\Users\Admin\AppData\Local\Temp\b2mptg01\b2mptg01.dll
                                                      MD5

                                                      5228884e8bb3e51bf696ec5990078d00

                                                      SHA1

                                                      9ac37d495ab67a81d7cf518a2cf5d5975717cd4b

                                                      SHA256

                                                      e2a35d97504ca22851660a312e9e39f643c849d7b317ba5052bfe2cd3b2dfc2f

                                                      SHA512

                                                      a62ec2a95b5fd25b5005326d55e850cea46a035bab99f68862f8512ab8b15acaba33ba675e98cdf582779ef328914aa3b27935ebf4b7faa649ebadb994151ea8

                                                    • C:\Users\Admin\AppData\Local\Temp\mhwodcsb\mhwodcsb.dll
                                                      MD5

                                                      a9d7c43d69be46b170afeae940ff31da

                                                      SHA1

                                                      9e073c079794c4c0b48ab8af823a606ad9af934d

                                                      SHA256

                                                      cf9b4a27e2a8f226b2591bf1e230ec3a05aaf04ac4b2760f034b0305e84d5578

                                                      SHA512

                                                      b56a424b7664876cbbe882342825d0896517dc5e9c06533ddcd573c5c08c6129a4666821104cf6e2c7f4157f527a756e37066e62774ef97a306300fa46dbbd62

                                                    • C:\Users\Admin\AppData\Local\Temp\setup.inf
                                                      MD5

                                                      77a665c63c6fff740660ba4e5812d30b

                                                      SHA1

                                                      1007a20b6e27c841a0eb11bce93ea26125c3d626

                                                      SHA256

                                                      d70593ade7ff73f8a53b8dec8be8974a681d21cd0dc2016bda4947f1c7812f8f

                                                      SHA512

                                                      13951ab4a77a2db631659ceef32cf40a669031399c3ad2f8b0bf96276bec95f9ebe3105860bfbe9ce821a052def39073a834b32b965cc3ca8601197391bbf1b0

                                                    • C:\Users\Admin\AppData\Local\Temp\setup.rpt
                                                      MD5

                                                      2c77a7a4265a85523f7d1944aa6aaf86

                                                      SHA1

                                                      abed6b031902cae5400d8f7a0bca9789a629e187

                                                      SHA256

                                                      5fb98a132aed3c46003d11629cada5195b99fd87f2667220f31c39c4c27af689

                                                      SHA512

                                                      debe78d9a247bf5c071552c4c6a754f158f8faff6ab79f78566155e052091ef1d819140073bfa6cd9258bf440339aa9fd31180335adc45132bd04672403d0868

                                                    • C:\Users\Admin\AppData\Roaming\MICROS~1\{C2C77~1\cookie.ff\jl56y3z6.default-release\cookies.sqlite.ff
                                                      MD5

                                                      89d4b62651fa5c864b12f3ea6b1521cb

                                                      SHA1

                                                      570d48367b6b66ade9900a9f22d67d67a8fb2081

                                                      SHA256

                                                      22f1159db346d2cc8f4fa544796cc9d243a5737110a17d8e3755a2448404ce70

                                                      SHA512

                                                      e6d3109c5e2aef98a63f42eebe3b10feedb1a8c81d7823380553f84d2d6585f328c18f02e72c3e5c98ace7ffedfb6214a4ea6c87e85cefceada8e630f8df61ff

                                                    • C:\Users\Admin\AppData\Roaming\MICROS~1\{C2C77~1\cookie.ie\AP0OAKS1.txt.ie
                                                      MD5

                                                      295004231d1152ff1b16578225dc6ac8

                                                      SHA1

                                                      ea58a81957e4cb05d7a29f46b72b34d519c5e7f5

                                                      SHA256

                                                      fa7ef13e5d1275e6a7657f061427c92fceae04d094562abad8f819a543940733

                                                      SHA512

                                                      732b0f17767db514c43ec9e9142eb476d3b37ceaa06d827489c6ebc2be528315a9cfb534bf20d84cdf4a657ba4c621c2d75daf811a525856a280bf7c0d4e9e33

                                                    • C:\Users\Admin\AppData\Roaming\MICROS~1\{C2C77~1\cookie.ie\DWX8EZFU.txt.ie
                                                      MD5

                                                      b90ea5024b06b3b4ec2a6b5b8a79ddcb

                                                      SHA1

                                                      ac99025129d12e6b907fd80a411570d694479151

                                                      SHA256

                                                      61c7ec6b40d05ece9fd7960c5e4705e1a98311aea32d9868c77e1c7a2214d3ad

                                                      SHA512

                                                      76567774cf0b7b66099d19ad2ec95267d38ffc0cb058f3f58ffc85868c358d5f6616c7ca19454fd853fef812b563f7d586a1a3434a601cbf10e10786b34ab880

                                                    • C:\Users\Admin\AppData\Roaming\MICROS~1\{C2C77~1\sols\macromedia.com\support\flashplayer\sys\settings.sol
                                                      MD5

                                                      d5e535e4b017c0c5dda171adc1d399b3

                                                      SHA1

                                                      180937b58f9a60f38012f72d574925b4a5d97da4

                                                      SHA256

                                                      4b4f70069e2072c81219a465ffeaface0e912569c5efbdfd2e05155def3fe971

                                                      SHA512

                                                      99cf1b5a44eb9fc9357f70560f10ef11ed977733635b105f9222c728094f23b10b643fee73f7a2cea90b5709ff0b0bd24e91e3ea8986deaac439a36b8e7687a7

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DWX8EZFU.txt
                                                      MD5

                                                      b90ea5024b06b3b4ec2a6b5b8a79ddcb

                                                      SHA1

                                                      ac99025129d12e6b907fd80a411570d694479151

                                                      SHA256

                                                      61c7ec6b40d05ece9fd7960c5e4705e1a98311aea32d9868c77e1c7a2214d3ad

                                                      SHA512

                                                      76567774cf0b7b66099d19ad2ec95267d38ffc0cb058f3f58ffc85868c358d5f6616c7ca19454fd853fef812b563f7d586a1a3434a601cbf10e10786b34ab880

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\{C2C77CC6-3964-44C0-D316-7DB8B7AA016C}\setup.inf
                                                      MD5

                                                      9ea203e6a5db0eac5d5e8da60f7a7919

                                                      SHA1

                                                      7254665dfec2b3a82d53ae5d810a4e9520409fd2

                                                      SHA256

                                                      8b4a44ac2244bf00063ba21d6dab540c3ccb205ebf185c219237f230d5ffbeba

                                                      SHA512

                                                      691d131184c99818f0b50700e2aab5a592e887d5f16ba310816742640ec106d2769342d9336f671daa66dd8f7465b574809335f59e877cb7f0a0ac63ecb1d913

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\{C2C77CC6-3964-44C0-D316-7DB8B7AA016C}\setup.rpt
                                                      MD5

                                                      9c82e6376713fdb5a3946f2cd60b81ab

                                                      SHA1

                                                      63f943a54e0e398afcd3ec1c40dae958e2d2cfc8

                                                      SHA256

                                                      ae9868fa8abb4159f99b978ed83b47ca59eb7d392b9e711d17fbd2162704f1a8

                                                      SHA512

                                                      8b14fbbe3fd07d5de58e41956d2cf7a83d8ebdc4c4b993f04ae21b4990e9971dfbeb778fb1493e8bd2bcddc32023e932b449d71c3cdefe311dd592c9e1ab2ec1

                                                    • \??\c:\Users\Admin\AppData\Local\Temp\b2mptg01\CSC591C21F4ECC24EE9A21A6767EAA8B54.TMP
                                                      MD5

                                                      413ff34a6af3c810381dc9883b2b7f79

                                                      SHA1

                                                      c3631e2c69ad50d69bf4665a5221c253e4f02271

                                                      SHA256

                                                      39cf29c00735eb88e47309667df802f6645425b9df80512b14e854d26933db88

                                                      SHA512

                                                      dde892c1c67ea6c8874e9dd78eb05a14bef01469b72ee1a28696933f093051d69635135b1e1893a9ecf8b5d35dc3ce13805625fcdf299da344f863635d4491ba

                                                    • \??\c:\Users\Admin\AppData\Local\Temp\b2mptg01\b2mptg01.0.cs
                                                      MD5

                                                      c85ff7138c5e801a993b2414546da5e7

                                                      SHA1

                                                      04456d9ea3b3e2e064593777989d67c6c5416a51

                                                      SHA256

                                                      d358ed68c8be2077075e457aa91f769b733e223da75f25fb2a63ccf9fd83cb8a

                                                      SHA512

                                                      1a4286d9ca3680625ef5bcb4abc320cfeba6fd10cd1ae1912d6ac0b992406f7f81e7d357f986b93596f2286237ad5d5741f616db0abfdfb3b1f26b0420d2cca9

                                                    • \??\c:\Users\Admin\AppData\Local\Temp\b2mptg01\b2mptg01.cmdline
                                                      MD5

                                                      1b95cd1d651502df31c7250bb22d543e

                                                      SHA1

                                                      071fa4c25fa55367cdb39be2567e4463c1e66595

                                                      SHA256

                                                      ecd54fc8a5bb49b736eee7d3609c54b7acdb3dc8e26b8338e912cf3ce3dc5412

                                                      SHA512

                                                      c2b55707a2404486d5e3ff94b47ccf8b26c8d29d1341b52d24665aed308cab880046303f067444198bcf4de975dd8f9fe10585027678860d5d6852a796272aa9

                                                    • \??\c:\Users\Admin\AppData\Local\Temp\mhwodcsb\CSC30A71AC164AD49BBB8204E57CB4BB5B.TMP
                                                      MD5

                                                      ed9b9cb127b2c3ca0b408627afaefc78

                                                      SHA1

                                                      06f495dbf4b2843d472dc10c7576a925f67551b5

                                                      SHA256

                                                      1e50d255d7a5ed3ec3b5dbab2067c7fe24ef3f25fa59f88f83536dd9c45a0bb0

                                                      SHA512

                                                      e949fbdbfff05bb5c1bcf3b5cea94999ad714a6f21256cf989defb6a5e9a36fdf9c254f2809d260a5f2603222dcd60d0e01edc85da59f006ed749eabe401876d

                                                    • \??\c:\Users\Admin\AppData\Local\Temp\mhwodcsb\mhwodcsb.0.cs
                                                      MD5

                                                      f397df221ca9e90d73d446b1e481ba59

                                                      SHA1

                                                      363a4a9aa4d2fc304b94f374967efbb914bc0ef4

                                                      SHA256

                                                      0f08d4ac6af418e1f0bb928b9d4c2d78e51d709b512e533ac6f8492b79ecc435

                                                      SHA512

                                                      3ebb1163df4dfcc29a3fb56285598534487b44458afab01d83256eb59b2a051d117eb97ebc510e673720553dab8591585bf3d116da5224cdb4e91682eb4496d4

                                                    • \??\c:\Users\Admin\AppData\Local\Temp\mhwodcsb\mhwodcsb.cmdline
                                                      MD5

                                                      76fbb40dc1dcf3ed58d114bb2e834016

                                                      SHA1

                                                      aa982598f49654a941efac02a5c17f1c93af4c23

                                                      SHA256

                                                      678539272c3ba6100a6b75b702d08b9a97daceeb81203f09e2ba065481874a01

                                                      SHA512

                                                      d4f796ac879ed400ce2c5ba6b4963e3067198ae10010b0eab842966fe2a59901adb6aaa3588bd620c06bf2a6d9fc431c1dea07ce5b44ccd2b1a23a6d19d756dc

                                                    • memory/516-67-0x0000000000000000-mapping.dmp
                                                    • memory/536-90-0x0000000000000000-mapping.dmp
                                                    • memory/644-98-0x0000000000000000-mapping.dmp
                                                    • memory/724-84-0x0000000000000000-mapping.dmp
                                                    • memory/724-86-0x000007FFFFFDB000-mapping.dmp
                                                    • memory/724-135-0x0000000000000000-mapping.dmp
                                                    • memory/924-118-0x0000000000000000-mapping.dmp
                                                    • memory/968-92-0x0000000000000000-mapping.dmp
                                                    • memory/1036-59-0x0000000000000000-mapping.dmp
                                                    • memory/1104-79-0x0000000000000000-mapping.dmp
                                                    • memory/1104-83-0x000007FFFFFD7000-mapping.dmp
                                                    • memory/1104-85-0x0000000001C60000-0x0000000001CFB000-memory.dmp
                                                      Filesize

                                                      620KB

                                                    • memory/1152-131-0x0000000000000000-mapping.dmp
                                                    • memory/1156-99-0x0000000000000000-mapping.dmp
                                                    • memory/1172-123-0x0000000000000000-mapping.dmp
                                                    • memory/1192-143-0x0000000000000000-mapping.dmp
                                                    • memory/1200-55-0x0000000002260000-0x0000000002261000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/1200-54-0x000000001AC80000-0x000000001AC81000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/1200-52-0x000007FEF32F0000-0x000007FEF3CDC000-memory.dmp
                                                      Filesize

                                                      9.9MB

                                                    • memory/1200-53-0x0000000001D60000-0x0000000001D61000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/1200-74-0x00000000022B0000-0x00000000022B1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/1200-56-0x0000000002290000-0x0000000002291000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/1200-57-0x000000001B7B0000-0x000000001B7B1000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/1200-58-0x000000001B840000-0x000000001B841000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/1200-133-0x0000000000000000-mapping.dmp
                                                    • memory/1200-66-0x0000000001C40000-0x0000000001C41000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/1200-51-0x0000000000000000-mapping.dmp
                                                    • memory/1200-75-0x000000001C950000-0x000000001C9EB000-memory.dmp
                                                      Filesize

                                                      620KB

                                                    • memory/1260-141-0x0000000000000000-mapping.dmp
                                                    • memory/1268-80-0x0000000005EF0000-0x0000000005F8B000-memory.dmp
                                                      Filesize

                                                      620KB

                                                    • memory/1268-82-0x0000000005EF0000-0x0000000005F8B000-memory.dmp
                                                      Filesize

                                                      620KB

                                                    • memory/1344-116-0x0000000000000000-mapping.dmp
                                                    • memory/1396-126-0x0000000000000000-mapping.dmp
                                                    • memory/1396-87-0x0000000000000000-mapping.dmp
                                                    • memory/1420-146-0x0000000000000000-mapping.dmp
                                                    • memory/1484-3-0x000007FEF63D0000-0x000007FEF664A000-memory.dmp
                                                      Filesize

                                                      2.5MB

                                                    • memory/1564-136-0x0000000000000000-mapping.dmp
                                                    • memory/1640-97-0x0000000000000000-mapping.dmp
                                                    • memory/1640-140-0x0000000000000000-mapping.dmp
                                                    • memory/1648-9-0x0000000000000000-mapping.dmp
                                                    • memory/1688-128-0x0000000000000000-mapping.dmp
                                                    • memory/1728-91-0x0000000000000000-mapping.dmp
                                                    • memory/1736-121-0x0000000000000000-mapping.dmp
                                                    • memory/1744-2-0x0000000006030000-0x0000000006041000-memory.dmp
                                                      Filesize

                                                      68KB

                                                    • memory/1744-49-0x0000000006130000-0x0000000006140000-memory.dmp
                                                      Filesize

                                                      64KB

                                                    • memory/1752-138-0x0000000000000000-mapping.dmp
                                                    • memory/1756-62-0x0000000000000000-mapping.dmp
                                                    • memory/1780-120-0x0000000000000000-mapping.dmp
                                                    • memory/1780-130-0x0000000000000000-mapping.dmp
                                                    • memory/1792-70-0x0000000000000000-mapping.dmp
                                                    • memory/1816-4-0x0000000000000000-mapping.dmp
                                                    • memory/1816-152-0x00000000060E0000-0x0000000006103000-memory.dmp
                                                      Filesize

                                                      140KB

                                                    • memory/1860-89-0x0000000000000000-mapping.dmp
                                                    • memory/1908-100-0x0000000000000000-mapping.dmp
                                                    • memory/1908-125-0x0000000000000000-mapping.dmp
                                                    • memory/1916-88-0x0000000000000000-mapping.dmp