Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    25-08-2021 05:46

General

  • Target

    56538d4161a6b6e0e57759f73f81a76db0b7bf9f923791f56e719793ae10ece9.exe

  • Size

    6.0MB

  • MD5

    0c0e36b959067fd86e0af98f3717d0f4

  • SHA1

    d8d9b5b6c391ca2121c588ff27db25723a12a120

  • SHA256

    56538d4161a6b6e0e57759f73f81a76db0b7bf9f923791f56e719793ae10ece9

  • SHA512

    d9265cefe3de237940f1b7a7b53f11d5cbac57ccae89516f21560fd12cd1c87fbe145321e788032a683fc65e5b5273310258210243fa2d0643a1f0de86fc1e62

Malware Config

Extracted

Family

redline

Botnet

3

C2

deyrolorme.xyz:80

xariebelal.xyz:80

anihelardd.xyz:80

Extracted

Family

redline

Botnet

allsup

C2

188.124.36.242:25802

Extracted

Family

metasploit

Version

windows/single_exec

Extracted

Family

vidar

Version

40.1

Botnet

916

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    916

Extracted

Family

redline

Botnet

sonia

C2

94.103.82.22:49018

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba Payload 3 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 19 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 18 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 18 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
    1⤵
      PID:1916
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s WpnService
      1⤵
        PID:2556
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2548
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s Browser
        1⤵
          PID:2536
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
          1⤵
            PID:2316
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2300
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s SENS
            1⤵
              PID:1404
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s Themes
              1⤵
              • Modifies registry class
              PID:1236
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s UserManager
              1⤵
                PID:1192
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
                1⤵
                  PID:1064
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k netsvcs -s Schedule
                  1⤵
                    PID:824
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
                    1⤵
                      PID:984
                    • C:\Users\Admin\AppData\Local\Temp\56538d4161a6b6e0e57759f73f81a76db0b7bf9f923791f56e719793ae10ece9.exe
                      "C:\Users\Admin\AppData\Local\Temp\56538d4161a6b6e0e57759f73f81a76db0b7bf9f923791f56e719793ae10ece9.exe"
                      1⤵
                      • Drops file in Program Files directory
                      • Suspicious use of WriteProcessMemory
                      PID:3980
                      • C:\Program Files (x86)\Versium Research\Versium Research\VersiumResearch32bit.exe
                        "C:\Program Files (x86)\Versium Research\Versium Research\VersiumResearch32bit.exe"
                        2⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Modifies system certificate store
                        PID:2372
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 760
                          3⤵
                          • Program crash
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4748
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 812
                          3⤵
                          • Program crash
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3628
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 792
                          3⤵
                          • Program crash
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2184
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 832
                          3⤵
                          • Program crash
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3148
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 956
                          3⤵
                          • Program crash
                          PID:4508
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 984
                          3⤵
                          • Program crash
                          PID:4736
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 1104
                          3⤵
                          • Program crash
                          PID:2120
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 1416
                          3⤵
                          • Program crash
                          PID:4944
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 1392
                          3⤵
                          • Program crash
                          PID:4016
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 1644
                          3⤵
                          • Program crash
                          PID:5096
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 1448
                          3⤵
                          • Program crash
                          PID:4048
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 1456
                          3⤵
                          • Program crash
                          PID:4992
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 1388
                          3⤵
                          • Program crash
                          PID:2152
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 1632
                          3⤵
                          • Program crash
                          PID:4596
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 1596
                          3⤵
                          • Program crash
                          PID:4492
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 1652
                          3⤵
                          • Suspicious use of NtCreateProcessExOtherParentProcess
                          • Program crash
                          PID:4600
                      • C:\Program Files (x86)\Versium Research\Versium Research\VersiumResearch.exe
                        "C:\Program Files (x86)\Versium Research\Versium Research\VersiumResearch.exe"
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2608
                        • C:\Users\Admin\AppData\Roaming\8376182.exe
                          "C:\Users\Admin\AppData\Roaming\8376182.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3976
                          • C:\Windows\system32\WerFault.exe
                            C:\Windows\system32\WerFault.exe -u -p 3976 -s 2124
                            4⤵
                            • Program crash
                            PID:2196
                        • C:\Users\Admin\AppData\Roaming\7652125.exe
                          "C:\Users\Admin\AppData\Roaming\7652125.exe"
                          3⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Suspicious use of WriteProcessMemory
                          PID:2684
                          • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                            "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
                            4⤵
                            • Executes dropped EXE
                            PID:2604
                        • C:\Users\Admin\AppData\Roaming\5366590.exe
                          "C:\Users\Admin\AppData\Roaming\5366590.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3376
                        • C:\Users\Admin\AppData\Roaming\3944891.exe
                          "C:\Users\Admin\AppData\Roaming\3944891.exe"
                          3⤵
                          • Executes dropped EXE
                          PID:2744
                        • C:\Users\Admin\AppData\Roaming\5227437.exe
                          "C:\Users\Admin\AppData\Roaming\5227437.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1364
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 2176
                            4⤵
                            • Program crash
                            PID:4880
                      • C:\Program Files (x86)\Versium Research\Versium Research\Bot_Checker.exe
                        "C:\Program Files (x86)\Versium Research\Versium Research\Bot_Checker.exe"
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of WriteProcessMemory
                        PID:2592
                        • C:\Program Files (x86)\Versium Research\Versium Research\Bot_Checker.exe
                          "C:\Program Files (x86)\Versium Research\Versium Research\Bot_Checker.exe" -q
                          3⤵
                          • Executes dropped EXE
                          PID:1224
                      • C:\Program Files (x86)\Versium Research\Versium Research\LivelyScreenRecS1.9.exe
                        "C:\Program Files (x86)\Versium Research\Versium Research\LivelyScreenRecS1.9.exe"
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4008
                        • C:\Users\Admin\AppData\Local\Temp\tmp5CFA_tmp.exe
                          "C:\Users\Admin\AppData\Local\Temp\tmp5CFA_tmp.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of WriteProcessMemory
                          PID:1316
                          • C:\Windows\SysWOW64\dllhost.exe
                            "C:\Windows\System32\dllhost.exe"
                            4⤵
                              PID:4240
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c cmd < Eravate.wks
                              4⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4292
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd
                                5⤵
                                • Suspicious use of WriteProcessMemory
                                PID:4364
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr /V /R "^ULDdlRJfZsbrDapCbeEYycZEgRIWBtYuQhzBPWvHncPJJvLmMbGEuHBnMZeapMOUzsjfZIMBGWAJGfVSyolrbxqpLUPQTrnLHUdspcArKyXpiRSvrlhqBKbYsrEtT$" Una.wks
                                  6⤵
                                    PID:4404
                                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                                    Esplorarne.exe.com i
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:4988
                                    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                                      C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i
                                      7⤵
                                      • Executes dropped EXE
                                      • Drops startup file
                                      • Suspicious use of SetThreadContext
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:2712
                                      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
                                        C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
                                        8⤵
                                        • Executes dropped EXE
                                        PID:1412
                                  • C:\Windows\SysWOW64\PING.EXE
                                    ping RJMQBVDN -n 30
                                    6⤵
                                    • Runs ping.exe
                                    PID:5028
                          • C:\Program Files (x86)\Versium Research\Versium Research\028d53f5224f9cc8c60bd953504f1efa.exe
                            "C:\Program Files (x86)\Versium Research\Versium Research\028d53f5224f9cc8c60bd953504f1efa.exe"
                            2⤵
                            • Executes dropped EXE
                            PID:3600
                            • C:\Program Files (x86)\Versium Research\Versium Research\028d53f5224f9cc8c60bd953504f1efa.exe
                              "C:\Program Files (x86)\Versium Research\Versium Research\028d53f5224f9cc8c60bd953504f1efa.exe"
                              3⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Modifies system certificate store
                              PID:4436
                          • C:\Program Files (x86)\Versium Research\Versium Research\Versium.exe
                            "C:\Program Files (x86)\Versium Research\Versium Research\Versium.exe"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:3844
                        • \??\c:\windows\system32\svchost.exe
                          c:\windows\system32\svchost.exe -k netsvcs -s BITS
                          1⤵
                          • Suspicious use of SetThreadContext
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3672
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k SystemNetworkService
                            2⤵
                            • Drops file in System32 directory
                            • Checks processor information in registry
                            • Modifies data under HKEY_USERS
                            • Modifies registry class
                            PID:4444
                        • C:\Users\Admin\AppData\Local\Temp\is-3R7EP.tmp\Versium.tmp
                          "C:\Users\Admin\AppData\Local\Temp\is-3R7EP.tmp\Versium.tmp" /SL5="$10202,506086,422400,C:\Program Files (x86)\Versium Research\Versium Research\Versium.exe"
                          1⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:1848
                        • C:\Windows\system32\rundll32.exe
                          rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                          1⤵
                          • Process spawned unexpected child process
                          • Suspicious use of WriteProcessMemory
                          PID:4252
                          • C:\Windows\SysWOW64\rundll32.exe
                            rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                            2⤵
                            • Loads dropped DLL
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:4276
                        • \??\c:\windows\system32\svchost.exe
                          c:\windows\system32\svchost.exe -k netsvcs -s seclogon
                          1⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          PID:2064

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Program Files (x86)\Versium Research\Versium Research\028d53f5224f9cc8c60bd953504f1efa.exe
                          MD5

                          c6bede6ffb3c3547b9cfb0bfceab60e2

                          SHA1

                          ba4adeed0a5cdeaf4551f523513b970322ec0ca8

                          SHA256

                          f81e693c05b61cdeb92e0aff349d7de391f1b49747a337033b1e40527e22f0c0

                          SHA512

                          7e422fd96b84ed8296425b016f7358b27c49958a06a61f62649091ad28a11340f0d6391d25f6aa992a3127e9072b4d64f10383c4bbddf5fe89265227aa30084e

                        • C:\Program Files (x86)\Versium Research\Versium Research\028d53f5224f9cc8c60bd953504f1efa.exe
                          MD5

                          c6bede6ffb3c3547b9cfb0bfceab60e2

                          SHA1

                          ba4adeed0a5cdeaf4551f523513b970322ec0ca8

                          SHA256

                          f81e693c05b61cdeb92e0aff349d7de391f1b49747a337033b1e40527e22f0c0

                          SHA512

                          7e422fd96b84ed8296425b016f7358b27c49958a06a61f62649091ad28a11340f0d6391d25f6aa992a3127e9072b4d64f10383c4bbddf5fe89265227aa30084e

                        • C:\Program Files (x86)\Versium Research\Versium Research\028d53f5224f9cc8c60bd953504f1efa.exe
                          MD5

                          c6bede6ffb3c3547b9cfb0bfceab60e2

                          SHA1

                          ba4adeed0a5cdeaf4551f523513b970322ec0ca8

                          SHA256

                          f81e693c05b61cdeb92e0aff349d7de391f1b49747a337033b1e40527e22f0c0

                          SHA512

                          7e422fd96b84ed8296425b016f7358b27c49958a06a61f62649091ad28a11340f0d6391d25f6aa992a3127e9072b4d64f10383c4bbddf5fe89265227aa30084e

                        • C:\Program Files (x86)\Versium Research\Versium Research\Bot_Checker.exe
                          MD5

                          75f901865ffcd4a73dc62ae8b9003ad9

                          SHA1

                          24fabded456a9cddad6c36474aaad8c86992e6dd

                          SHA256

                          1de3979df22f75aedb2c78706434104b3389c4776ab603d5c7d87b0f40368e89

                          SHA512

                          f9acd3ff6d571ea6379c15bfc3ee7cdf6eb5a3823deef9b6b895d70df3535e9973cd4a31fb88dc311a2a4b0308b75fe3eeda5a0655262e3f0afa62b27dc4d26c

                        • C:\Program Files (x86)\Versium Research\Versium Research\Bot_Checker.exe
                          MD5

                          75f901865ffcd4a73dc62ae8b9003ad9

                          SHA1

                          24fabded456a9cddad6c36474aaad8c86992e6dd

                          SHA256

                          1de3979df22f75aedb2c78706434104b3389c4776ab603d5c7d87b0f40368e89

                          SHA512

                          f9acd3ff6d571ea6379c15bfc3ee7cdf6eb5a3823deef9b6b895d70df3535e9973cd4a31fb88dc311a2a4b0308b75fe3eeda5a0655262e3f0afa62b27dc4d26c

                        • C:\Program Files (x86)\Versium Research\Versium Research\Bot_Checker.exe
                          MD5

                          75f901865ffcd4a73dc62ae8b9003ad9

                          SHA1

                          24fabded456a9cddad6c36474aaad8c86992e6dd

                          SHA256

                          1de3979df22f75aedb2c78706434104b3389c4776ab603d5c7d87b0f40368e89

                          SHA512

                          f9acd3ff6d571ea6379c15bfc3ee7cdf6eb5a3823deef9b6b895d70df3535e9973cd4a31fb88dc311a2a4b0308b75fe3eeda5a0655262e3f0afa62b27dc4d26c

                        • C:\Program Files (x86)\Versium Research\Versium Research\LivelyScreenRecS1.9.exe
                          MD5

                          7deb5748d60dd5ee15d411d553dbaed4

                          SHA1

                          21f5d22e9dc3e090e87c3c825c3615d5d6932ac1

                          SHA256

                          f0d7ffe237549994c5751933d545c8e7e5789259495e711be439f1c1411c5f08

                          SHA512

                          73b38f63d8752b8b79a99f5548fdc0fb74605caaba551e624a29d5b246e64396c9ec1dd07ecf2da5abb2ebb8529998a2d6cdf1bacbbce51349652d856e81e981

                        • C:\Program Files (x86)\Versium Research\Versium Research\LivelyScreenRecS1.9.exe
                          MD5

                          7deb5748d60dd5ee15d411d553dbaed4

                          SHA1

                          21f5d22e9dc3e090e87c3c825c3615d5d6932ac1

                          SHA256

                          f0d7ffe237549994c5751933d545c8e7e5789259495e711be439f1c1411c5f08

                          SHA512

                          73b38f63d8752b8b79a99f5548fdc0fb74605caaba551e624a29d5b246e64396c9ec1dd07ecf2da5abb2ebb8529998a2d6cdf1bacbbce51349652d856e81e981

                        • C:\Program Files (x86)\Versium Research\Versium Research\Versium.exe
                          MD5

                          b9dfe6981322ddf7c787a3410f466617

                          SHA1

                          c55460c23d2f1a354ddfde6e1f54ebf9afb77e05

                          SHA256

                          66aad19666f36fba375f605b57200454b842c97290b6597a9331da44ffe1e5a0

                          SHA512

                          c5f3b71763aef45a05de9d875b261e33205ff5b8998ddda4d789d3a71c8f9de07866e29f492f06754a094553b56757ac4e671d2ff8145c226d8c170cee23af4b

                        • C:\Program Files (x86)\Versium Research\Versium Research\Versium.exe
                          MD5

                          b9dfe6981322ddf7c787a3410f466617

                          SHA1

                          c55460c23d2f1a354ddfde6e1f54ebf9afb77e05

                          SHA256

                          66aad19666f36fba375f605b57200454b842c97290b6597a9331da44ffe1e5a0

                          SHA512

                          c5f3b71763aef45a05de9d875b261e33205ff5b8998ddda4d789d3a71c8f9de07866e29f492f06754a094553b56757ac4e671d2ff8145c226d8c170cee23af4b

                        • C:\Program Files (x86)\Versium Research\Versium Research\VersiumResearch.exe
                          MD5

                          7d5fcdcba8c94cb9e69f3682fb79bfb6

                          SHA1

                          9dfb96ecc4aed70497592e14e3eb7d05b2f2ed29

                          SHA256

                          e1f48f8a51b4d8f665f04f2201d67f1ebba80fffd765b00e832d3f683a5a30d7

                          SHA512

                          b379282451e598d432bc3f73d586441660cacbc61dbc7bf5c3241e035d3c40305b42968035cbd55d82f87b30ecfe41cf302e79408a3a46c078ce7cec51e3fa50

                        • C:\Program Files (x86)\Versium Research\Versium Research\VersiumResearch32bit.exe
                          MD5

                          6d214751879d25d83a6be49eceb10b6e

                          SHA1

                          d44b2908b2132d911692c16c5b7b5be499d77350

                          SHA256

                          5b7c221291b9c0deafdb5e0f3fdfb160ea24d78ed970b145d669f96a2d9ec862

                          SHA512

                          e59e569cefebaffd202b1e3a50c6c41d05055e962914020e0173ed4657b27b2a396f44368ed0536c46b86af2fba07604002aa9bdd77ae65a821e1e3379e7729e

                        • C:\Program Files (x86)\Versium Research\Versium Research\VersiumResearch32bit.exe
                          MD5

                          6d214751879d25d83a6be49eceb10b6e

                          SHA1

                          d44b2908b2132d911692c16c5b7b5be499d77350

                          SHA256

                          5b7c221291b9c0deafdb5e0f3fdfb160ea24d78ed970b145d669f96a2d9ec862

                          SHA512

                          e59e569cefebaffd202b1e3a50c6c41d05055e962914020e0173ed4657b27b2a396f44368ed0536c46b86af2fba07604002aa9bdd77ae65a821e1e3379e7729e

                        • C:\Program Files (x86)\Versium Research\Versium Research\Versiumresearch.exe
                          MD5

                          7d5fcdcba8c94cb9e69f3682fb79bfb6

                          SHA1

                          9dfb96ecc4aed70497592e14e3eb7d05b2f2ed29

                          SHA256

                          e1f48f8a51b4d8f665f04f2201d67f1ebba80fffd765b00e832d3f683a5a30d7

                          SHA512

                          b379282451e598d432bc3f73d586441660cacbc61dbc7bf5c3241e035d3c40305b42968035cbd55d82f87b30ecfe41cf302e79408a3a46c078ce7cec51e3fa50

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Eravate.wks
                          MD5

                          e6eeff86e14e165abc53220be74481ee

                          SHA1

                          8a6f6ff7f5e10902b47042825f850b89c4ba4585

                          SHA256

                          ed1d463d2b50045b83e37711e8fa3324160927a13934a469030688f39c08a134

                          SHA512

                          1611047ffcc72ead94dcd36a064cb83e5bc8bee3a8b98f3bbf94bfb2ed69efe3f4187d1a91a2d6099aeeedad651c77dcebc2a7ae199cd3e955e7cd4b7cebc958

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                          MD5

                          c56b5f0201a3b3de53e561fe76912bfd

                          SHA1

                          2a4062e10a5de813f5688221dbeb3f3ff33eb417

                          SHA256

                          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                          SHA512

                          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                          MD5

                          c56b5f0201a3b3de53e561fe76912bfd

                          SHA1

                          2a4062e10a5de813f5688221dbeb3f3ff33eb417

                          SHA256

                          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                          SHA512

                          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                          MD5

                          c56b5f0201a3b3de53e561fe76912bfd

                          SHA1

                          2a4062e10a5de813f5688221dbeb3f3ff33eb417

                          SHA256

                          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                          SHA512

                          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
                          MD5

                          b58b926c3574d28d5b7fdd2ca3ec30d5

                          SHA1

                          d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                          SHA256

                          6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                          SHA512

                          b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
                          MD5

                          b58b926c3574d28d5b7fdd2ca3ec30d5

                          SHA1

                          d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                          SHA256

                          6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                          SHA512

                          b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sollevano.wks
                          MD5

                          db2507ae8728257f5b1928bc3825ac45

                          SHA1

                          3777c8ba62f0ffdce23b8c6ead7a98d6596a5771

                          SHA256

                          38bdf0c226ebc752be321416c65880f77add5edae1467d6fbd9cefcc485eb03c

                          SHA512

                          9e989da5671632a50e2c3ea742d27061d08a06b38419efce57e12fd137f561a13071be5b2b1582474ac508087e0e3452578c3c44ac678a1b57af5077b952c59c

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Una.wks
                          MD5

                          e922aa2f9a6478457ebc5ce7a7ea5e93

                          SHA1

                          d332b2f2f8cf54fd146c3024b97bf6cb07363145

                          SHA256

                          145861b5f58f1e8a167652da59c83cea0be33399030d743fdfafaac68e5e7dc1

                          SHA512

                          a2d3ba5d5616d3ec015ef674c597375a108a15646a725713e2add2fe5de455d8a74c4a4567da08d3389fbc0c8f389e3adc04710a0cd0a7d87ebc8c43b4bc80b9

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Via.wks
                          MD5

                          87002c71384bedb6a37dd8d9a35c779f

                          SHA1

                          779e37e9f36a8c567ff5508775188355c79580da

                          SHA256

                          e7eb6d10a5faae824eda8b16066df2988747d736400c9e5e7b503215f567bd66

                          SHA512

                          2c74ae133989a0943da5399054ca0af40c0956aac103e1057c1b52f402cd3ceb82b7667e826c13efe6fcd2e95266a161641460242d46e31696f902e66a6a688a

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\i
                          MD5

                          db2507ae8728257f5b1928bc3825ac45

                          SHA1

                          3777c8ba62f0ffdce23b8c6ead7a98d6596a5771

                          SHA256

                          38bdf0c226ebc752be321416c65880f77add5edae1467d6fbd9cefcc485eb03c

                          SHA512

                          9e989da5671632a50e2c3ea742d27061d08a06b38419efce57e12fd137f561a13071be5b2b1582474ac508087e0e3452578c3c44ac678a1b57af5077b952c59c

                        • C:\Users\Admin\AppData\Local\Temp\is-3R7EP.tmp\Versium.tmp
                          MD5

                          3320570dca205a29b4f16ad1247e96b1

                          SHA1

                          26c8ac18a76b3bbcff223d1aed56674265053b00

                          SHA256

                          c7120017847441da757ec5e7426e45ccd6fe2f8f02d385f23d794fd06cad40b4

                          SHA512

                          13485dd43673f4fd94b97fda0cca43ab51cf49c301289858a0c9e1147f8586ddcd231687d6cb56c4d17e5afd293b73aa8682a57cb34c544f5841aa943df07162

                        • C:\Users\Admin\AppData\Local\Temp\sqlite.dat
                          MD5

                          3bd3d2e6e90e58ebd3e01f3c8979c5b3

                          SHA1

                          b6dba622f48c64bcc58b1d659a768649be6254b3

                          SHA256

                          5537f65f66ba722ecd774882e18f4063496eedfc3ec079aa244b06dd1249477a

                          SHA512

                          9991b0f1c1397706da9ebcdda217b1cd06f317e9511f79a57058bd912d63260332e8a839eeaf26aa142b12f2609671c5a80059fddcf07b0592b45e5b014751d1

                        • C:\Users\Admin\AppData\Local\Temp\sqlite.dll
                          MD5

                          0523529d748d05f95f79cd0f1eb1a7d5

                          SHA1

                          aa1c131df28cfbe7b9f9d00b1b7c3d7ecd180cdc

                          SHA256

                          f3c3df5ab554f66f9e1db49a510101166f6c285d2bca13a5d2b6dfba273dbc50

                          SHA512

                          38efd52ad014d599799f1ffc79512e56a31305441d7b353f3e4a758bc9a0d7492a22883ee83d01f596ce5ad3a8f5175591f93f01cb726f45c4928148bcaa1d04

                        • C:\Users\Admin\AppData\Local\Temp\tmp5CFA_tmp.exe
                          MD5

                          5bfda514826e4aad6f860d4a855f6ebb

                          SHA1

                          46c9fb3c70fa458f5af1b6238fbb92492dea91b5

                          SHA256

                          d38fb3d87631e08a1988115b93b84edd25b2c0353f59397af88440fef5844048

                          SHA512

                          7e82c546be3c40155948cd7f39e79900dd45a3dce55d8cf35556d4ad7653744fcff7523395ee11d36af755e3ba60e72600113b17b842e5c527fdbdad52977368

                        • C:\Users\Admin\AppData\Local\Temp\tmp5CFA_tmp.exe
                          MD5

                          5bfda514826e4aad6f860d4a855f6ebb

                          SHA1

                          46c9fb3c70fa458f5af1b6238fbb92492dea91b5

                          SHA256

                          d38fb3d87631e08a1988115b93b84edd25b2c0353f59397af88440fef5844048

                          SHA512

                          7e82c546be3c40155948cd7f39e79900dd45a3dce55d8cf35556d4ad7653744fcff7523395ee11d36af755e3ba60e72600113b17b842e5c527fdbdad52977368

                        • C:\Users\Admin\AppData\Roaming\3944891.exe
                          MD5

                          10e2a03ead3a7dafa5e57685afeb6ed0

                          SHA1

                          fd9f2f024641e4257a2bc0a2b90da0c6ca50f97e

                          SHA256

                          4b9ca28f47898fa1b78d3b57de9a0f1bf91840f9cc46f7473de976facc1ea355

                          SHA512

                          9da2248e139daf58b79ad8a796e37d0f41287ea383e19b652ae5e42ef433e7521c6034fe7e03c183d8feaa3540db9ad6f965b273a871d425ca257dc0704185a1

                        • C:\Users\Admin\AppData\Roaming\3944891.exe
                          MD5

                          10e2a03ead3a7dafa5e57685afeb6ed0

                          SHA1

                          fd9f2f024641e4257a2bc0a2b90da0c6ca50f97e

                          SHA256

                          4b9ca28f47898fa1b78d3b57de9a0f1bf91840f9cc46f7473de976facc1ea355

                          SHA512

                          9da2248e139daf58b79ad8a796e37d0f41287ea383e19b652ae5e42ef433e7521c6034fe7e03c183d8feaa3540db9ad6f965b273a871d425ca257dc0704185a1

                        • C:\Users\Admin\AppData\Roaming\5227437.exe
                          MD5

                          7758440f5f314ea55143cfb56dabf434

                          SHA1

                          82fe15c964ce358b37115ffb5148d976965c6ef5

                          SHA256

                          1206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b

                          SHA512

                          17b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf

                        • C:\Users\Admin\AppData\Roaming\5227437.exe
                          MD5

                          7758440f5f314ea55143cfb56dabf434

                          SHA1

                          82fe15c964ce358b37115ffb5148d976965c6ef5

                          SHA256

                          1206f705128ee12694a8fb0b16fc1c1de4703089ea138ba0b2ba80f5c0f7c46b

                          SHA512

                          17b3e7790952d38311c9d5380f627eced775f38755b2374f6b81e088811706fec14c0d56e01b1aaac2d7030278161c8eb3d0ff6651d14f9e31bbefc9329620bf

                        • C:\Users\Admin\AppData\Roaming\5366590.exe
                          MD5

                          883fe31989c8dfc8f2e22a94ae2d369a

                          SHA1

                          2933d6fafbebe84c12c0e226bf182e708d3bd32e

                          SHA256

                          7781a758350e3fba94c86661171371a7fd19f0801bf4cc82c5c94169fed3b9b4

                          SHA512

                          c9d4ee4ba7e34c4641b25837295a8d7ea6c04f5d25facd9948bb19698e75a833e16f530d6be59fe6cb9d2c5771a1e7e10266adbb121ce1822e1048530e67e313

                        • C:\Users\Admin\AppData\Roaming\5366590.exe
                          MD5

                          883fe31989c8dfc8f2e22a94ae2d369a

                          SHA1

                          2933d6fafbebe84c12c0e226bf182e708d3bd32e

                          SHA256

                          7781a758350e3fba94c86661171371a7fd19f0801bf4cc82c5c94169fed3b9b4

                          SHA512

                          c9d4ee4ba7e34c4641b25837295a8d7ea6c04f5d25facd9948bb19698e75a833e16f530d6be59fe6cb9d2c5771a1e7e10266adbb121ce1822e1048530e67e313

                        • C:\Users\Admin\AppData\Roaming\7652125.exe
                          MD5

                          3598180fddc06dbd304b76627143b01d

                          SHA1

                          1d39b0dd8425359ed94e606cb04f9c5e49ed1899

                          SHA256

                          44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

                          SHA512

                          8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

                        • C:\Users\Admin\AppData\Roaming\7652125.exe
                          MD5

                          3598180fddc06dbd304b76627143b01d

                          SHA1

                          1d39b0dd8425359ed94e606cb04f9c5e49ed1899

                          SHA256

                          44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

                          SHA512

                          8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

                        • C:\Users\Admin\AppData\Roaming\8376182.exe
                          MD5

                          8aaf1a745c972133c85117cd58410ea6

                          SHA1

                          8e494a38f1bcc7a79565fab2c64342b5000bcc94

                          SHA256

                          bf40ed52ad4e9ebbedc5aa94335f0d46274f3aa0f308b1dc8c0acfdfea686d8d

                          SHA512

                          d3ebd3fbe5fa107d3be28e19ce5fb74ca4bc1b21e44d28860bc0ef8932c0041dd05c7b317c8c43be5dc191b26d28b1fcdcf8914878e103c4e105bf5b822f3c8e

                        • C:\Users\Admin\AppData\Roaming\8376182.exe
                          MD5

                          8aaf1a745c972133c85117cd58410ea6

                          SHA1

                          8e494a38f1bcc7a79565fab2c64342b5000bcc94

                          SHA256

                          bf40ed52ad4e9ebbedc5aa94335f0d46274f3aa0f308b1dc8c0acfdfea686d8d

                          SHA512

                          d3ebd3fbe5fa107d3be28e19ce5fb74ca4bc1b21e44d28860bc0ef8932c0041dd05c7b317c8c43be5dc191b26d28b1fcdcf8914878e103c4e105bf5b822f3c8e

                        • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                          MD5

                          3598180fddc06dbd304b76627143b01d

                          SHA1

                          1d39b0dd8425359ed94e606cb04f9c5e49ed1899

                          SHA256

                          44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

                          SHA512

                          8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

                        • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                          MD5

                          3598180fddc06dbd304b76627143b01d

                          SHA1

                          1d39b0dd8425359ed94e606cb04f9c5e49ed1899

                          SHA256

                          44a280749c51af08ff5c1aebcda01c36935f7ecb66d15f57e53c022ce0426bda

                          SHA512

                          8f77e49e2868dc9655dd5af20645799fb42940ca50f9dd0371bba9128286348ab3cbf09467f21b60d2596a0af6c755a43b92a26037b8dfae2e957602ff46ec9d

                        • \ProgramData\mozglue.dll
                          MD5

                          8f73c08a9660691143661bf7332c3c27

                          SHA1

                          37fa65dd737c50fda710fdbde89e51374d0c204a

                          SHA256

                          3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                          SHA512

                          0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                        • \ProgramData\nss3.dll
                          MD5

                          bfac4e3c5908856ba17d41edcd455a51

                          SHA1

                          8eec7e888767aa9e4cca8ff246eb2aacb9170428

                          SHA256

                          e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                          SHA512

                          2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                        • \Users\Admin\AppData\Local\Temp\is-F4D9Q.tmp\idp.dll
                          MD5

                          8f995688085bced38ba7795f60a5e1d3

                          SHA1

                          5b1ad67a149c05c50d6e388527af5c8a0af4343a

                          SHA256

                          203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006

                          SHA512

                          043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35

                        • \Users\Admin\AppData\Local\Temp\sqlite.dll
                          MD5

                          0523529d748d05f95f79cd0f1eb1a7d5

                          SHA1

                          aa1c131df28cfbe7b9f9d00b1b7c3d7ecd180cdc

                          SHA256

                          f3c3df5ab554f66f9e1db49a510101166f6c285d2bca13a5d2b6dfba273dbc50

                          SHA512

                          38efd52ad014d599799f1ffc79512e56a31305441d7b353f3e4a758bc9a0d7492a22883ee83d01f596ce5ad3a8f5175591f93f01cb726f45c4928148bcaa1d04

                        • memory/824-354-0x000001ACA4EC0000-0x000001ACA4F34000-memory.dmp
                          Filesize

                          464KB

                        • memory/824-261-0x000001ACA4E40000-0x000001ACA4EB4000-memory.dmp
                          Filesize

                          464KB

                        • memory/984-346-0x000001C6CD9F0000-0x000001C6CDA64000-memory.dmp
                          Filesize

                          464KB

                        • memory/984-238-0x000001C6CD900000-0x000001C6CD974000-memory.dmp
                          Filesize

                          464KB

                        • memory/1064-259-0x0000026D4F9B0000-0x0000026D4FA24000-memory.dmp
                          Filesize

                          464KB

                        • memory/1064-352-0x0000026D4FA30000-0x0000026D4FAA4000-memory.dmp
                          Filesize

                          464KB

                        • memory/1192-349-0x000002156EE20000-0x000002156EE94000-memory.dmp
                          Filesize

                          464KB

                        • memory/1192-276-0x000002156EDA0000-0x000002156EE14000-memory.dmp
                          Filesize

                          464KB

                        • memory/1224-149-0x0000000000000000-mapping.dmp
                        • memory/1236-264-0x0000019979240000-0x00000199792B4000-memory.dmp
                          Filesize

                          464KB

                        • memory/1236-360-0x0000019979330000-0x00000199793A4000-memory.dmp
                          Filesize

                          464KB

                        • memory/1316-210-0x0000000000000000-mapping.dmp
                        • memory/1364-168-0x0000000000000000-mapping.dmp
                        • memory/1364-186-0x00000000051B0000-0x00000000051B1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1364-180-0x0000000001100000-0x0000000001101000-memory.dmp
                          Filesize

                          4KB

                        • memory/1364-289-0x0000000008AB0000-0x0000000008AB1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1364-215-0x00000000082E0000-0x00000000082E1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1364-176-0x0000000000870000-0x0000000000871000-memory.dmp
                          Filesize

                          4KB

                        • memory/1404-263-0x00000261A62A0000-0x00000261A6314000-memory.dmp
                          Filesize

                          464KB

                        • memory/1404-358-0x00000261A6320000-0x00000261A6394000-memory.dmp
                          Filesize

                          464KB

                        • memory/1412-311-0x00000000001C0000-0x00000000001DE000-memory.dmp
                          Filesize

                          120KB

                        • memory/1412-321-0x0000000004880000-0x0000000004E86000-memory.dmp
                          Filesize

                          6.0MB

                        • memory/1848-136-0x0000000000000000-mapping.dmp
                        • memory/1848-148-0x00000000001E0000-0x00000000001E1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1916-359-0x000001F260F40000-0x000001F260FB4000-memory.dmp
                          Filesize

                          464KB

                        • memory/1916-265-0x000001F260A40000-0x000001F260AB4000-memory.dmp
                          Filesize

                          464KB

                        • memory/2064-357-0x000001BB24540000-0x000001BB245B4000-memory.dmp
                          Filesize

                          464KB

                        • memory/2300-258-0x000002127BCC0000-0x000002127BD34000-memory.dmp
                          Filesize

                          464KB

                        • memory/2300-351-0x000002127C840000-0x000002127C8B4000-memory.dmp
                          Filesize

                          464KB

                        • memory/2316-244-0x0000018276600000-0x0000018276674000-memory.dmp
                          Filesize

                          464KB

                        • memory/2316-348-0x0000018276680000-0x00000182766F4000-memory.dmp
                          Filesize

                          464KB

                        • memory/2372-216-0x0000000002FB0000-0x000000000304D000-memory.dmp
                          Filesize

                          628KB

                        • memory/2372-114-0x0000000000000000-mapping.dmp
                        • memory/2372-217-0x0000000000400000-0x0000000002D12000-memory.dmp
                          Filesize

                          41.1MB

                        • memory/2536-245-0x000001EA0B040000-0x000001EA0B0B4000-memory.dmp
                          Filesize

                          464KB

                        • memory/2536-345-0x000001EA0B0C0000-0x000001EA0B134000-memory.dmp
                          Filesize

                          464KB

                        • memory/2548-277-0x000002689CE00000-0x000002689CE74000-memory.dmp
                          Filesize

                          464KB

                        • memory/2548-353-0x000002689D540000-0x000002689D5B4000-memory.dmp
                          Filesize

                          464KB

                        • memory/2556-278-0x00000244DEB70000-0x00000244DEBE4000-memory.dmp
                          Filesize

                          464KB

                        • memory/2556-356-0x00000244DEF30000-0x00000244DEFA4000-memory.dmp
                          Filesize

                          464KB

                        • memory/2592-118-0x0000000000000000-mapping.dmp
                        • memory/2604-184-0x0000000000000000-mapping.dmp
                        • memory/2604-208-0x0000000007DC0000-0x0000000007DC1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2604-207-0x00000000059A0000-0x00000000059A1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2608-141-0x0000000002A40000-0x0000000002A42000-memory.dmp
                          Filesize

                          8KB

                        • memory/2608-117-0x0000000000000000-mapping.dmp
                        • memory/2608-142-0x0000000000D30000-0x0000000000D4E000-memory.dmp
                          Filesize

                          120KB

                        • memory/2608-124-0x00000000008C0000-0x00000000008C1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2608-135-0x0000000000D20000-0x0000000000D21000-memory.dmp
                          Filesize

                          4KB

                        • memory/2608-145-0x0000000000D60000-0x0000000000D61000-memory.dmp
                          Filesize

                          4KB

                        • memory/2684-174-0x00000000078D0000-0x00000000078D1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2684-164-0x00000000006B0000-0x00000000006B1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2684-157-0x0000000000000000-mapping.dmp
                        • memory/2684-171-0x00000000028C0000-0x00000000028C6000-memory.dmp
                          Filesize

                          24KB

                        • memory/2684-178-0x0000000007470000-0x0000000007471000-memory.dmp
                          Filesize

                          4KB

                        • memory/2712-310-0x00000000026D0000-0x00000000026D1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2712-279-0x0000000000000000-mapping.dmp
                        • memory/2744-193-0x0000000005680000-0x00000000056B4000-memory.dmp
                          Filesize

                          208KB

                        • memory/2744-183-0x0000000000F60000-0x0000000000F61000-memory.dmp
                          Filesize

                          4KB

                        • memory/2744-291-0x0000000009700000-0x0000000009701000-memory.dmp
                          Filesize

                          4KB

                        • memory/2744-205-0x0000000005670000-0x0000000005671000-memory.dmp
                          Filesize

                          4KB

                        • memory/2744-295-0x0000000009AB0000-0x0000000009AB1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2744-201-0x0000000007E50000-0x0000000007E51000-memory.dmp
                          Filesize

                          4KB

                        • memory/2744-166-0x0000000000000000-mapping.dmp
                        • memory/2744-305-0x000000000A620000-0x000000000A621000-memory.dmp
                          Filesize

                          4KB

                        • memory/3376-287-0x0000000009200000-0x0000000009201000-memory.dmp
                          Filesize

                          4KB

                        • memory/3376-285-0x0000000008B00000-0x0000000008B01000-memory.dmp
                          Filesize

                          4KB

                        • memory/3376-161-0x0000000000000000-mapping.dmp
                        • memory/3376-181-0x0000000000680000-0x0000000000681000-memory.dmp
                          Filesize

                          4KB

                        • memory/3376-189-0x0000000004D60000-0x0000000004D92000-memory.dmp
                          Filesize

                          200KB

                        • memory/3376-192-0x0000000007A00000-0x0000000007A01000-memory.dmp
                          Filesize

                          4KB

                        • memory/3376-194-0x0000000007450000-0x0000000007451000-memory.dmp
                          Filesize

                          4KB

                        • memory/3376-195-0x00000000074B0000-0x00000000074B1000-memory.dmp
                          Filesize

                          4KB

                        • memory/3376-202-0x00000000074F0000-0x00000000074F1000-memory.dmp
                          Filesize

                          4KB

                        • memory/3376-206-0x0000000005060000-0x0000000005061000-memory.dmp
                          Filesize

                          4KB

                        • memory/3600-214-0x0000000000400000-0x00000000027DD000-memory.dmp
                          Filesize

                          35.9MB

                        • memory/3600-125-0x0000000000000000-mapping.dmp
                        • memory/3600-203-0x0000000003210000-0x0000000003B36000-memory.dmp
                          Filesize

                          9.1MB

                        • memory/3672-243-0x000001B9E7080000-0x000001B9E70F4000-memory.dmp
                          Filesize

                          464KB

                        • memory/3672-241-0x000001B9E6FC0000-0x000001B9E700D000-memory.dmp
                          Filesize

                          308KB

                        • memory/3844-139-0x0000000000400000-0x000000000046D000-memory.dmp
                          Filesize

                          436KB

                        • memory/3844-122-0x0000000000000000-mapping.dmp
                        • memory/3976-158-0x0000000000020000-0x0000000000021000-memory.dmp
                          Filesize

                          4KB

                        • memory/3976-152-0x0000000000000000-mapping.dmp
                        • memory/3976-169-0x0000000001F50000-0x0000000001F9B000-memory.dmp
                          Filesize

                          300KB

                        • memory/3976-170-0x000000001ACA0000-0x000000001ACA2000-memory.dmp
                          Filesize

                          8KB

                        • memory/4008-151-0x0000017C2DB62000-0x0000017C2DB64000-memory.dmp
                          Filesize

                          8KB

                        • memory/4008-129-0x0000000000000000-mapping.dmp
                        • memory/4008-153-0x0000017C2DB65000-0x0000017C2DB67000-memory.dmp
                          Filesize

                          8KB

                        • memory/4008-154-0x0000017C2DB64000-0x0000017C2DB65000-memory.dmp
                          Filesize

                          4KB

                        • memory/4008-147-0x0000017C2DB60000-0x0000017C2DB62000-memory.dmp
                          Filesize

                          8KB

                        • memory/4008-143-0x0000017C13850000-0x0000017C1385B000-memory.dmp
                          Filesize

                          44KB

                        • memory/4008-146-0x0000017C313A0000-0x0000017C3141E000-memory.dmp
                          Filesize

                          504KB

                        • memory/4008-138-0x0000017C133D0000-0x0000017C133D1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4240-218-0x0000000000000000-mapping.dmp
                        • memory/4276-220-0x0000000000000000-mapping.dmp
                        • memory/4276-237-0x000000000435C000-0x000000000445D000-memory.dmp
                          Filesize

                          1.0MB

                        • memory/4276-239-0x0000000004280000-0x00000000042DF000-memory.dmp
                          Filesize

                          380KB

                        • memory/4292-221-0x0000000000000000-mapping.dmp
                        • memory/4364-225-0x0000000000000000-mapping.dmp
                        • memory/4404-226-0x0000000000000000-mapping.dmp
                        • memory/4436-304-0x0000000000400000-0x00000000027DD000-memory.dmp
                          Filesize

                          35.9MB

                        • memory/4436-300-0x0000000000000000-mapping.dmp
                        • memory/4444-230-0x00007FF64FFA4060-mapping.dmp
                        • memory/4444-309-0x0000022C68500000-0x0000022C68606000-memory.dmp
                          Filesize

                          1.0MB

                        • memory/4444-308-0x0000022C67620000-0x0000022C6763B000-memory.dmp
                          Filesize

                          108KB

                        • memory/4444-247-0x0000022C65E00000-0x0000022C65E74000-memory.dmp
                          Filesize

                          464KB

                        • memory/4988-271-0x0000000000000000-mapping.dmp
                        • memory/5028-274-0x0000000000000000-mapping.dmp