Analysis

  • max time kernel
    152s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2022, 15:33

General

  • Target

    file.exe

  • Size

    197KB

  • MD5

    56bd722c3625d2729ea30b67c44295a9

  • SHA1

    aa82531dde29dd1997b93a4880334155c72f4ddb

  • SHA256

    04a4ad0c958b2c55822b49185f1d0228259fa91ea77064be386268e91c2c4d8a

  • SHA512

    9be0d98db25a7eed4f85bbadad1c34aa63a90bf674b50a535609d8768b269407e2ad1c59f2090f4a977f5c93b7fc23a42afc2e88eaa58132726d71858be2f21d

  • SSDEEP

    3072:OXSrPInL9gPBm5yzpwdHHmsb4nm7EL0K/nIycvPpBf:WugnLCJZ9gnmj0G4vPHf

Malware Config

Extracted

Family

djvu

C2

http://winnlinne.com/lancer/get.php

Attributes
  • extension

    .tury

  • offline_id

    Uz66zEbmA32arcxwT81zZhkb23026oHz5iSp8qt1

  • payload_url

    http://rgyui.top/dl/build2.exe

    http://winnlinne.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-o7UXxOstmw Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0585Jhyjd

rsa_pubkey.plain

Extracted

Family

vidar

Version

55

Botnet

517

C2

https://t.me/truewallets

https://mas.to/@zara99

http://116.203.10.3:80

Attributes
  • profile_id

    517

Signatures

  • Detected Djvu ransomware 19 IoCs
  • Detects Smokeloader packer 3 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 24 IoCs
  • VMProtect packed file 6 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 54 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4720
  • C:\Users\Admin\AppData\Local\Temp\43C0.exe
    C:\Users\Admin\AppData\Local\Temp\43C0.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4532
    • C:\Users\Admin\AppData\Local\Temp\43C0.exe
      C:\Users\Admin\AppData\Local\Temp\43C0.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\46d9b56a-092b-41b3-b97a-2782774d9618" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:444
      • C:\Users\Admin\AppData\Local\Temp\43C0.exe
        "C:\Users\Admin\AppData\Local\Temp\43C0.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:3568
        • C:\Users\Admin\AppData\Local\Temp\43C0.exe
          "C:\Users\Admin\AppData\Local\Temp\43C0.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          PID:4556
          • C:\Users\Admin\AppData\Local\c18b6f24-e875-437e-8a93-06739d43ebd3\build2.exe
            "C:\Users\Admin\AppData\Local\c18b6f24-e875-437e-8a93-06739d43ebd3\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:2544
            • C:\Users\Admin\AppData\Local\c18b6f24-e875-437e-8a93-06739d43ebd3\build2.exe
              "C:\Users\Admin\AppData\Local\c18b6f24-e875-437e-8a93-06739d43ebd3\build2.exe"
              6⤵
              • Executes dropped EXE
              PID:3644
          • C:\Users\Admin\AppData\Local\c18b6f24-e875-437e-8a93-06739d43ebd3\build3.exe
            "C:\Users\Admin\AppData\Local\c18b6f24-e875-437e-8a93-06739d43ebd3\build3.exe"
            5⤵
            • Executes dropped EXE
            PID:3188
            • C:\Windows\SysWOW64\schtasks.exe
              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
              6⤵
              • Creates scheduled task(s)
              PID:3476
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\4789.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3092
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\4789.dll
      2⤵
      • Loads dropped DLL
      PID:5052
  • C:\Users\Admin\AppData\Local\Temp\48C3.exe
    C:\Users\Admin\AppData\Local\Temp\48C3.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4624
    • C:\Users\Admin\AppData\Local\Temp\48C3.exe
      C:\Users\Admin\AppData\Local\Temp\48C3.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4684
      • C:\Users\Admin\AppData\Local\Temp\48C3.exe
        "C:\Users\Admin\AppData\Local\Temp\48C3.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4380
        • C:\Users\Admin\AppData\Local\Temp\48C3.exe
          "C:\Users\Admin\AppData\Local\Temp\48C3.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          PID:912
          • C:\Users\Admin\AppData\Local\17471685-2841-4729-9514-cd69b311abfe\build2.exe
            "C:\Users\Admin\AppData\Local\17471685-2841-4729-9514-cd69b311abfe\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:1428
            • C:\Users\Admin\AppData\Local\17471685-2841-4729-9514-cd69b311abfe\build2.exe
              "C:\Users\Admin\AppData\Local\17471685-2841-4729-9514-cd69b311abfe\build2.exe"
              6⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Loads dropped DLL
              • Checks processor information in registry
              PID:3356
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" C/c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\17471685-2841-4729-9514-cd69b311abfe\build2.exe" & del C:\PrograData\*.dll & exit
                7⤵
                  PID:2700
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /im build2.exe /f
                    8⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2512
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 6
                    8⤵
                    • Delays execution with timeout.exe
                    PID:380
            • C:\Users\Admin\AppData\Local\17471685-2841-4729-9514-cd69b311abfe\build3.exe
              "C:\Users\Admin\AppData\Local\17471685-2841-4729-9514-cd69b311abfe\build3.exe"
              5⤵
              • Executes dropped EXE
              PID:3236
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                6⤵
                • Creates scheduled task(s)
                PID:4952
    • C:\Users\Admin\AppData\Local\Temp\4AC7.exe
      C:\Users\Admin\AppData\Local\Temp\4AC7.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:4356
    • C:\Users\Admin\AppData\Local\Temp\52F6.exe
      C:\Users\Admin\AppData\Local\Temp\52F6.exe
      1⤵
      • Executes dropped EXE
      PID:4756
    • C:\Users\Admin\AppData\Local\Temp\55C6.exe
      C:\Users\Admin\AppData\Local\Temp\55C6.exe
      1⤵
      • Executes dropped EXE
      PID:2440
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 340
        2⤵
        • Program crash
        PID:4512
    • C:\Users\Admin\AppData\Local\Temp\5CDB.exe
      C:\Users\Admin\AppData\Local\Temp\5CDB.exe
      1⤵
      • Executes dropped EXE
      PID:1996
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
      • Accesses Microsoft Outlook profiles
      • outlook_office_path
      • outlook_win_path
      PID:4368
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:2724
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2440 -ip 2440
        1⤵
          PID:5004
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          1⤵
          • Executes dropped EXE
          PID:1280
        • C:\Users\Admin\AppData\Local\Temp\DFE7.exe
          C:\Users\Admin\AppData\Local\Temp\DFE7.exe
          1⤵
          • Executes dropped EXE
          PID:2364
        • C:\Users\Admin\AppData\Local\Temp\FE1F.exe
          C:\Users\Admin\AppData\Local\Temp\FE1F.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2312
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1264
            2⤵
            • Program crash
            PID:4880
        • C:\Users\Admin\AppData\Local\Temp\738.exe
          C:\Users\Admin\AppData\Local\Temp\738.exe
          1⤵
          • Executes dropped EXE
          PID:1436
        • C:\Users\Admin\AppData\Local\Temp\AA4.exe
          C:\Users\Admin\AppData\Local\Temp\AA4.exe
          1⤵
          • Executes dropped EXE
          PID:1880
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:4208
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:1372
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:1608
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe
                1⤵
                  PID:2236
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:3312
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:4216
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:3948
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe
                        1⤵
                          PID:3304
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2312 -ip 2312
                          1⤵
                            PID:2516
                          • C:\Windows\SysWOW64\explorer.exe
                            C:\Windows\SysWOW64\explorer.exe
                            1⤵
                              PID:1200
                            • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                              C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                              1⤵
                              • Executes dropped EXE
                              PID:2544
                              • C:\Windows\SysWOW64\schtasks.exe
                                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                                2⤵
                                • Creates scheduled task(s)
                                PID:4832

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\ProgramData\mozglue.dll

                              Filesize

                              593KB

                              MD5

                              c8fd9be83bc728cc04beffafc2907fe9

                              SHA1

                              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                              SHA256

                              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                              SHA512

                              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                            • C:\ProgramData\nss3.dll

                              Filesize

                              2.0MB

                              MD5

                              1cc453cdf74f31e4d913ff9c10acdde2

                              SHA1

                              6e85eae544d6e965f15fa5c39700fa7202f3aafe

                              SHA256

                              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                              SHA512

                              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                            • C:\SystemID\PersonalID.txt

                              Filesize

                              42B

                              MD5

                              15a69b8e478da0a3c34463ce2a3c9727

                              SHA1

                              9ee632cb0e17b760f5655d67f21ad9dd9c124793

                              SHA256

                              00dc9381b42367952477eceac3373f4808fce89ee8ef08f89eb62fb68bafce46

                              SHA512

                              e6c87e615a7044cb7c9a4fac6f1db28520c4647c46a27bf8e30dcd10742f7d4f3360ead47cd67f531de976c71b91ecb45cf0ac5d1d472fa00b8eed643514feff

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                              Filesize

                              2KB

                              MD5

                              006c98bc42ac1d15f0ec70e3488783c5

                              SHA1

                              a8c8302826468c903b511e206d6d058e2c3acdaa

                              SHA256

                              e24883740fbed2781e4df4e5387cd95c3345ec9944edeeb36babd2c10135fa00

                              SHA512

                              e0caea17f99a18483e0195c5311942c195ef42532f1868bfb5c64b3f6cb72cc0fc58414176a9bfc66452e11d17c2058eafb483a41890f502ec76dc3a6807f2f4

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                              Filesize

                              1KB

                              MD5

                              97ab7ffd65186e85f453dc7c02637528

                              SHA1

                              f22312a6a44613be85c0370878456a965f869a40

                              SHA256

                              630df8e970cc3b1ad508db713dd8be52e0ac7a5826f3f264a266232f9a1c23ee

                              SHA512

                              37d90c98e72ad55b2cbb938541c81bac1aa9d2b8a7e19f0fbfaa365b49e7bef2d3199f03e46aa9fbf3055f3701d21860820c451065f7e425d39bf86ca606bfb0

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                              Filesize

                              488B

                              MD5

                              1fecaf2f241bbbb8742538226d41f7bc

                              SHA1

                              8a816d66547a493a53eaf7f369074be954215812

                              SHA256

                              f59cf8103dd6353c5eade08026b31195c0176feebc150c1a6bf32c90eb6628e3

                              SHA512

                              e077e55e7a3e39fdac7de6e10a308ed565fa8ddc0360927c837bd79e91d7c996d09c39cab91d72b857100c7d955a9b57043cf65a17efdcc46c9a6bd80cc450a3

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                              Filesize

                              482B

                              MD5

                              26ffb62fa823ed9866a39a835285100d

                              SHA1

                              c09644176ac030ab7b0939f59481eb28237669d6

                              SHA256

                              8532763d73c0ad8c1dc937fbc6a80a685bdd483ea8750eb443c1853606002506

                              SHA512

                              bfe3aacfe57605998a28f86565672cc134037eb3cd47ee1fb114d052e9837f366a9931785d4a96755f7af335c1299657e421ae162e35517c96347daddf124b54

                            • C:\Users\Admin\AppData\Local\17471685-2841-4729-9514-cd69b311abfe\build2.exe

                              Filesize

                              321KB

                              MD5

                              5fd8c38657bb9393bb4736c880675223

                              SHA1

                              f3a03b2e75cef22262f6677e3832b6ad9327905c

                              SHA256

                              2a5101345def285c8f52ad39f00261ba9e0375d3de73206d0b8c72ce3b6259c6

                              SHA512

                              43c82f6db716792a770a3573a9d20cb69a2421ccc2bb875e57f4270d92c9289ee684deda19e3232c50f4675aaf86de173f73376a00f927a8d9847f60b8b732fe

                            • C:\Users\Admin\AppData\Local\17471685-2841-4729-9514-cd69b311abfe\build2.exe

                              Filesize

                              321KB

                              MD5

                              5fd8c38657bb9393bb4736c880675223

                              SHA1

                              f3a03b2e75cef22262f6677e3832b6ad9327905c

                              SHA256

                              2a5101345def285c8f52ad39f00261ba9e0375d3de73206d0b8c72ce3b6259c6

                              SHA512

                              43c82f6db716792a770a3573a9d20cb69a2421ccc2bb875e57f4270d92c9289ee684deda19e3232c50f4675aaf86de173f73376a00f927a8d9847f60b8b732fe

                            • C:\Users\Admin\AppData\Local\17471685-2841-4729-9514-cd69b311abfe\build2.exe

                              Filesize

                              321KB

                              MD5

                              5fd8c38657bb9393bb4736c880675223

                              SHA1

                              f3a03b2e75cef22262f6677e3832b6ad9327905c

                              SHA256

                              2a5101345def285c8f52ad39f00261ba9e0375d3de73206d0b8c72ce3b6259c6

                              SHA512

                              43c82f6db716792a770a3573a9d20cb69a2421ccc2bb875e57f4270d92c9289ee684deda19e3232c50f4675aaf86de173f73376a00f927a8d9847f60b8b732fe

                            • C:\Users\Admin\AppData\Local\17471685-2841-4729-9514-cd69b311abfe\build3.exe

                              Filesize

                              9KB

                              MD5

                              9ead10c08e72ae41921191f8db39bc16

                              SHA1

                              abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                              SHA256

                              8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                              SHA512

                              aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                            • C:\Users\Admin\AppData\Local\17471685-2841-4729-9514-cd69b311abfe\build3.exe

                              Filesize

                              9KB

                              MD5

                              9ead10c08e72ae41921191f8db39bc16

                              SHA1

                              abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                              SHA256

                              8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                              SHA512

                              aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                            • C:\Users\Admin\AppData\Local\46d9b56a-092b-41b3-b97a-2782774d9618\43C0.exe

                              Filesize

                              736KB

                              MD5

                              36fc2440660c5f4509c3abcdde9a1c3a

                              SHA1

                              23b9d0fe11194e29394beedddfd462225af5118e

                              SHA256

                              78f55fd75a0e521099c5f29bc271195d0ac94fbd3a5332b022eae4f0f304df2d

                              SHA512

                              c77645c4fcc5c41129d6528d768919c0b470840417a49a0fb899e30740bae25ff5819fab37d765db1a5b86406343b561a8e03aa0033cf44a0afae711d3f4f025

                            • C:\Users\Admin\AppData\Local\Temp\43C0.exe

                              Filesize

                              736KB

                              MD5

                              36fc2440660c5f4509c3abcdde9a1c3a

                              SHA1

                              23b9d0fe11194e29394beedddfd462225af5118e

                              SHA256

                              78f55fd75a0e521099c5f29bc271195d0ac94fbd3a5332b022eae4f0f304df2d

                              SHA512

                              c77645c4fcc5c41129d6528d768919c0b470840417a49a0fb899e30740bae25ff5819fab37d765db1a5b86406343b561a8e03aa0033cf44a0afae711d3f4f025

                            • C:\Users\Admin\AppData\Local\Temp\43C0.exe

                              Filesize

                              736KB

                              MD5

                              36fc2440660c5f4509c3abcdde9a1c3a

                              SHA1

                              23b9d0fe11194e29394beedddfd462225af5118e

                              SHA256

                              78f55fd75a0e521099c5f29bc271195d0ac94fbd3a5332b022eae4f0f304df2d

                              SHA512

                              c77645c4fcc5c41129d6528d768919c0b470840417a49a0fb899e30740bae25ff5819fab37d765db1a5b86406343b561a8e03aa0033cf44a0afae711d3f4f025

                            • C:\Users\Admin\AppData\Local\Temp\43C0.exe

                              Filesize

                              736KB

                              MD5

                              36fc2440660c5f4509c3abcdde9a1c3a

                              SHA1

                              23b9d0fe11194e29394beedddfd462225af5118e

                              SHA256

                              78f55fd75a0e521099c5f29bc271195d0ac94fbd3a5332b022eae4f0f304df2d

                              SHA512

                              c77645c4fcc5c41129d6528d768919c0b470840417a49a0fb899e30740bae25ff5819fab37d765db1a5b86406343b561a8e03aa0033cf44a0afae711d3f4f025

                            • C:\Users\Admin\AppData\Local\Temp\43C0.exe

                              Filesize

                              736KB

                              MD5

                              36fc2440660c5f4509c3abcdde9a1c3a

                              SHA1

                              23b9d0fe11194e29394beedddfd462225af5118e

                              SHA256

                              78f55fd75a0e521099c5f29bc271195d0ac94fbd3a5332b022eae4f0f304df2d

                              SHA512

                              c77645c4fcc5c41129d6528d768919c0b470840417a49a0fb899e30740bae25ff5819fab37d765db1a5b86406343b561a8e03aa0033cf44a0afae711d3f4f025

                            • C:\Users\Admin\AppData\Local\Temp\43C0.exe

                              Filesize

                              736KB

                              MD5

                              36fc2440660c5f4509c3abcdde9a1c3a

                              SHA1

                              23b9d0fe11194e29394beedddfd462225af5118e

                              SHA256

                              78f55fd75a0e521099c5f29bc271195d0ac94fbd3a5332b022eae4f0f304df2d

                              SHA512

                              c77645c4fcc5c41129d6528d768919c0b470840417a49a0fb899e30740bae25ff5819fab37d765db1a5b86406343b561a8e03aa0033cf44a0afae711d3f4f025

                            • C:\Users\Admin\AppData\Local\Temp\4789.dll

                              Filesize

                              2.0MB

                              MD5

                              198309de59fae38094f89e9c3f819974

                              SHA1

                              925559874ad6edb9b98a21328c6322d8476e1618

                              SHA256

                              d784f4cb44db7002b485bb59fa81291993a34a81a9d31393682419c7ddd7a01f

                              SHA512

                              39e2d3bf17dbd3fa0817fe5779e7786c0edfdde492a2dd7e1e7ae68fa08d9d5d91c5441c2c54a154847f6d31192f25de5c332841d9b7bf2c2223b467f3840660

                            • C:\Users\Admin\AppData\Local\Temp\4789.dll

                              Filesize

                              2.0MB

                              MD5

                              198309de59fae38094f89e9c3f819974

                              SHA1

                              925559874ad6edb9b98a21328c6322d8476e1618

                              SHA256

                              d784f4cb44db7002b485bb59fa81291993a34a81a9d31393682419c7ddd7a01f

                              SHA512

                              39e2d3bf17dbd3fa0817fe5779e7786c0edfdde492a2dd7e1e7ae68fa08d9d5d91c5441c2c54a154847f6d31192f25de5c332841d9b7bf2c2223b467f3840660

                            • C:\Users\Admin\AppData\Local\Temp\48C3.exe

                              Filesize

                              720KB

                              MD5

                              742fda7bfe69e131aa3d3eefdf8c1331

                              SHA1

                              cf9ba02eb8d2f0ce7ed0de673d400cac1d6e58e5

                              SHA256

                              50b28d1991ce1176d2f27a7181a7c42a72fee62ea3b08815984d3c9ab13aafc3

                              SHA512

                              c68421172fc131d71c26086456502dd7db80e02487407ed686c12f86c9a3574fc620aca019bd17fe744fac911ffebbc92027868f00ef2fa7ce6db7ecb3cf967a

                            • C:\Users\Admin\AppData\Local\Temp\48C3.exe

                              Filesize

                              720KB

                              MD5

                              742fda7bfe69e131aa3d3eefdf8c1331

                              SHA1

                              cf9ba02eb8d2f0ce7ed0de673d400cac1d6e58e5

                              SHA256

                              50b28d1991ce1176d2f27a7181a7c42a72fee62ea3b08815984d3c9ab13aafc3

                              SHA512

                              c68421172fc131d71c26086456502dd7db80e02487407ed686c12f86c9a3574fc620aca019bd17fe744fac911ffebbc92027868f00ef2fa7ce6db7ecb3cf967a

                            • C:\Users\Admin\AppData\Local\Temp\48C3.exe

                              Filesize

                              720KB

                              MD5

                              742fda7bfe69e131aa3d3eefdf8c1331

                              SHA1

                              cf9ba02eb8d2f0ce7ed0de673d400cac1d6e58e5

                              SHA256

                              50b28d1991ce1176d2f27a7181a7c42a72fee62ea3b08815984d3c9ab13aafc3

                              SHA512

                              c68421172fc131d71c26086456502dd7db80e02487407ed686c12f86c9a3574fc620aca019bd17fe744fac911ffebbc92027868f00ef2fa7ce6db7ecb3cf967a

                            • C:\Users\Admin\AppData\Local\Temp\48C3.exe

                              Filesize

                              720KB

                              MD5

                              742fda7bfe69e131aa3d3eefdf8c1331

                              SHA1

                              cf9ba02eb8d2f0ce7ed0de673d400cac1d6e58e5

                              SHA256

                              50b28d1991ce1176d2f27a7181a7c42a72fee62ea3b08815984d3c9ab13aafc3

                              SHA512

                              c68421172fc131d71c26086456502dd7db80e02487407ed686c12f86c9a3574fc620aca019bd17fe744fac911ffebbc92027868f00ef2fa7ce6db7ecb3cf967a

                            • C:\Users\Admin\AppData\Local\Temp\48C3.exe

                              Filesize

                              720KB

                              MD5

                              742fda7bfe69e131aa3d3eefdf8c1331

                              SHA1

                              cf9ba02eb8d2f0ce7ed0de673d400cac1d6e58e5

                              SHA256

                              50b28d1991ce1176d2f27a7181a7c42a72fee62ea3b08815984d3c9ab13aafc3

                              SHA512

                              c68421172fc131d71c26086456502dd7db80e02487407ed686c12f86c9a3574fc620aca019bd17fe744fac911ffebbc92027868f00ef2fa7ce6db7ecb3cf967a

                            • C:\Users\Admin\AppData\Local\Temp\4AC7.exe

                              Filesize

                              196KB

                              MD5

                              2a39938d5a68fa1a4909d40b7a23803a

                              SHA1

                              7594d62c8c663dea2d48e744d18b27798ffb4f67

                              SHA256

                              43a6b87880cf0a2c8fc40909b379f8635352cddfaf77ec232587d1949144606c

                              SHA512

                              4f5740e7083792d3372892504a41495e211dbf66ae0dd7dc4d6799388e8e45fae98c248134e25a3b2b670c2dc3741f099088db5f657df6bc6ab16877797fb998

                            • C:\Users\Admin\AppData\Local\Temp\4AC7.exe

                              Filesize

                              196KB

                              MD5

                              2a39938d5a68fa1a4909d40b7a23803a

                              SHA1

                              7594d62c8c663dea2d48e744d18b27798ffb4f67

                              SHA256

                              43a6b87880cf0a2c8fc40909b379f8635352cddfaf77ec232587d1949144606c

                              SHA512

                              4f5740e7083792d3372892504a41495e211dbf66ae0dd7dc4d6799388e8e45fae98c248134e25a3b2b670c2dc3741f099088db5f657df6bc6ab16877797fb998

                            • C:\Users\Admin\AppData\Local\Temp\52F6.exe

                              Filesize

                              3.5MB

                              MD5

                              d30c815c9e13d428430f2a8b4018d3d5

                              SHA1

                              49bfdfa3b51befed67fe058d1a9e9cc7d1fea579

                              SHA256

                              2a1e2d1a6badfd7b0c914ce0554786fea79e32deaa0ff77d8dc703e8eedd2a9f

                              SHA512

                              d6d12e13524e676463c230a7d9b620523550cec37cff7e7ca560670fca86c68eb4e190e2c0c4301e436ae8dbd86038453b4d70140eff5a751e52a165c6d2a3c5

                            • C:\Users\Admin\AppData\Local\Temp\52F6.exe

                              Filesize

                              3.5MB

                              MD5

                              d30c815c9e13d428430f2a8b4018d3d5

                              SHA1

                              49bfdfa3b51befed67fe058d1a9e9cc7d1fea579

                              SHA256

                              2a1e2d1a6badfd7b0c914ce0554786fea79e32deaa0ff77d8dc703e8eedd2a9f

                              SHA512

                              d6d12e13524e676463c230a7d9b620523550cec37cff7e7ca560670fca86c68eb4e190e2c0c4301e436ae8dbd86038453b4d70140eff5a751e52a165c6d2a3c5

                            • C:\Users\Admin\AppData\Local\Temp\55C6.exe

                              Filesize

                              201KB

                              MD5

                              180fb955933afed9986bff8391bdd4f5

                              SHA1

                              4f9c6ad122f0b6efb60401841994f23141573f3b

                              SHA256

                              12948191e0abe4a79869025882671b83a43afd63b0f4720be1385b4a93e99068

                              SHA512

                              1d1cec8eca4a054630409ba6de09ad821d0232f502433e93d5bf40e9a12094999f79cd381f4d5af0977842ebc14d75e0b253bb7253ae8952ca477afaf1b91e4f

                            • C:\Users\Admin\AppData\Local\Temp\55C6.exe

                              Filesize

                              201KB

                              MD5

                              180fb955933afed9986bff8391bdd4f5

                              SHA1

                              4f9c6ad122f0b6efb60401841994f23141573f3b

                              SHA256

                              12948191e0abe4a79869025882671b83a43afd63b0f4720be1385b4a93e99068

                              SHA512

                              1d1cec8eca4a054630409ba6de09ad821d0232f502433e93d5bf40e9a12094999f79cd381f4d5af0977842ebc14d75e0b253bb7253ae8952ca477afaf1b91e4f

                            • C:\Users\Admin\AppData\Local\Temp\5CDB.exe

                              Filesize

                              3.5MB

                              MD5

                              d30c815c9e13d428430f2a8b4018d3d5

                              SHA1

                              49bfdfa3b51befed67fe058d1a9e9cc7d1fea579

                              SHA256

                              2a1e2d1a6badfd7b0c914ce0554786fea79e32deaa0ff77d8dc703e8eedd2a9f

                              SHA512

                              d6d12e13524e676463c230a7d9b620523550cec37cff7e7ca560670fca86c68eb4e190e2c0c4301e436ae8dbd86038453b4d70140eff5a751e52a165c6d2a3c5

                            • C:\Users\Admin\AppData\Local\Temp\5CDB.exe

                              Filesize

                              3.5MB

                              MD5

                              d30c815c9e13d428430f2a8b4018d3d5

                              SHA1

                              49bfdfa3b51befed67fe058d1a9e9cc7d1fea579

                              SHA256

                              2a1e2d1a6badfd7b0c914ce0554786fea79e32deaa0ff77d8dc703e8eedd2a9f

                              SHA512

                              d6d12e13524e676463c230a7d9b620523550cec37cff7e7ca560670fca86c68eb4e190e2c0c4301e436ae8dbd86038453b4d70140eff5a751e52a165c6d2a3c5

                            • C:\Users\Admin\AppData\Local\Temp\738.exe

                              Filesize

                              346KB

                              MD5

                              2a996eab739bdff2b446ec590301ba4f

                              SHA1

                              40e916274cd983424ca230b513a25f31ca2a21e2

                              SHA256

                              a017835a2b171fd10b549d4dec78d22a8a6a298af5f75ac28d5b388766f54477

                              SHA512

                              b6886b7ecccc50958c6bf13d5839962a7cfc30d23e79c01cc733c7b027bd42f8a858b83d75dd2a3be18933eb4ad36089516d68055285d937702078e0d7c29372

                            • C:\Users\Admin\AppData\Local\Temp\738.exe

                              Filesize

                              346KB

                              MD5

                              2a996eab739bdff2b446ec590301ba4f

                              SHA1

                              40e916274cd983424ca230b513a25f31ca2a21e2

                              SHA256

                              a017835a2b171fd10b549d4dec78d22a8a6a298af5f75ac28d5b388766f54477

                              SHA512

                              b6886b7ecccc50958c6bf13d5839962a7cfc30d23e79c01cc733c7b027bd42f8a858b83d75dd2a3be18933eb4ad36089516d68055285d937702078e0d7c29372

                            • C:\Users\Admin\AppData\Local\Temp\AA4.exe

                              Filesize

                              346KB

                              MD5

                              da7d3bc9ea20c5cdd2301db2a6caeb72

                              SHA1

                              57c3f3fa4230a9103e16ad57c9832de6a5fb2b21

                              SHA256

                              fb04e689d5b8438631c37b51df63be198f1b09cf2d1395aea2895e893af1228c

                              SHA512

                              f4d6b6fefd4082eb5231217bc2fd5990d294d458c47c09569dd9e2455d020a37c7740efdead14f12cf45e1483a78b88364adb673b745cc327d7dcb721ce51794

                            • C:\Users\Admin\AppData\Local\Temp\AA4.exe

                              Filesize

                              346KB

                              MD5

                              da7d3bc9ea20c5cdd2301db2a6caeb72

                              SHA1

                              57c3f3fa4230a9103e16ad57c9832de6a5fb2b21

                              SHA256

                              fb04e689d5b8438631c37b51df63be198f1b09cf2d1395aea2895e893af1228c

                              SHA512

                              f4d6b6fefd4082eb5231217bc2fd5990d294d458c47c09569dd9e2455d020a37c7740efdead14f12cf45e1483a78b88364adb673b745cc327d7dcb721ce51794

                            • C:\Users\Admin\AppData\Local\Temp\DFE7.exe

                              Filesize

                              346KB

                              MD5

                              f00b27057a85844b7d3508767f35389f

                              SHA1

                              31b674995dbb029d8201d7f8559389af65e9979d

                              SHA256

                              06e2eb494a269c0182ba57440c0c4ab1de77ccd548fa14bd164962f24cda0d1d

                              SHA512

                              65968521106b7aca9f2cb3ab7566669038e4f768a70451d80b17ed2c140c830fce4725b644e92b4039cb8ed24d0f8294ce2fee244b082d06fbfd78ba61a7b046

                            • C:\Users\Admin\AppData\Local\Temp\DFE7.exe

                              Filesize

                              346KB

                              MD5

                              f00b27057a85844b7d3508767f35389f

                              SHA1

                              31b674995dbb029d8201d7f8559389af65e9979d

                              SHA256

                              06e2eb494a269c0182ba57440c0c4ab1de77ccd548fa14bd164962f24cda0d1d

                              SHA512

                              65968521106b7aca9f2cb3ab7566669038e4f768a70451d80b17ed2c140c830fce4725b644e92b4039cb8ed24d0f8294ce2fee244b082d06fbfd78ba61a7b046

                            • C:\Users\Admin\AppData\Local\Temp\FE1F.exe

                              Filesize

                              368KB

                              MD5

                              0d5b6d3c2dd0e9eb170ea1e1e06fb73d

                              SHA1

                              b4cd233e78c4b65fea910aefb33cd9cfdc07bfb4

                              SHA256

                              e0dc0990501e5fd3d56e2b77d99e6dd7256b576c63e011dbd273195ca380abc6

                              SHA512

                              65eb0ba45efe71fd0081f84988658176359926e1cbbd4333372cdcae4fffbdebda7f8a9065d12331476104e67406301e32496b880d51a19a3841ffe68b61ffe2

                            • C:\Users\Admin\AppData\Local\Temp\FE1F.exe

                              Filesize

                              368KB

                              MD5

                              0d5b6d3c2dd0e9eb170ea1e1e06fb73d

                              SHA1

                              b4cd233e78c4b65fea910aefb33cd9cfdc07bfb4

                              SHA256

                              e0dc0990501e5fd3d56e2b77d99e6dd7256b576c63e011dbd273195ca380abc6

                              SHA512

                              65eb0ba45efe71fd0081f84988658176359926e1cbbd4333372cdcae4fffbdebda7f8a9065d12331476104e67406301e32496b880d51a19a3841ffe68b61ffe2

                            • C:\Users\Admin\AppData\Local\bowsakkdestx.txt

                              Filesize

                              563B

                              MD5

                              3c66ee468dfa0688e6d22ca20d761140

                              SHA1

                              965c713cd69439ee5662125f0390a2324a7859bf

                              SHA256

                              4b230d2eaf9e5441f56db135faca2c761001787249d2358133e4f368061a1ea3

                              SHA512

                              4b29902d881bf20305322cc6a7bffb312187be86f4efa658a9d3c455e84f9f8b0d07f6f2bb6dac42ac050dc6f8d876e2b9df0ef4d5d1bb7e9be1223d652e04c6

                            • C:\Users\Admin\AppData\Local\c18b6f24-e875-437e-8a93-06739d43ebd3\build2.exe

                              Filesize

                              321KB

                              MD5

                              5fd8c38657bb9393bb4736c880675223

                              SHA1

                              f3a03b2e75cef22262f6677e3832b6ad9327905c

                              SHA256

                              2a5101345def285c8f52ad39f00261ba9e0375d3de73206d0b8c72ce3b6259c6

                              SHA512

                              43c82f6db716792a770a3573a9d20cb69a2421ccc2bb875e57f4270d92c9289ee684deda19e3232c50f4675aaf86de173f73376a00f927a8d9847f60b8b732fe

                            • C:\Users\Admin\AppData\Local\c18b6f24-e875-437e-8a93-06739d43ebd3\build2.exe

                              Filesize

                              321KB

                              MD5

                              5fd8c38657bb9393bb4736c880675223

                              SHA1

                              f3a03b2e75cef22262f6677e3832b6ad9327905c

                              SHA256

                              2a5101345def285c8f52ad39f00261ba9e0375d3de73206d0b8c72ce3b6259c6

                              SHA512

                              43c82f6db716792a770a3573a9d20cb69a2421ccc2bb875e57f4270d92c9289ee684deda19e3232c50f4675aaf86de173f73376a00f927a8d9847f60b8b732fe

                            • C:\Users\Admin\AppData\Local\c18b6f24-e875-437e-8a93-06739d43ebd3\build2.exe

                              Filesize

                              321KB

                              MD5

                              5fd8c38657bb9393bb4736c880675223

                              SHA1

                              f3a03b2e75cef22262f6677e3832b6ad9327905c

                              SHA256

                              2a5101345def285c8f52ad39f00261ba9e0375d3de73206d0b8c72ce3b6259c6

                              SHA512

                              43c82f6db716792a770a3573a9d20cb69a2421ccc2bb875e57f4270d92c9289ee684deda19e3232c50f4675aaf86de173f73376a00f927a8d9847f60b8b732fe

                            • C:\Users\Admin\AppData\Local\c18b6f24-e875-437e-8a93-06739d43ebd3\build3.exe

                              Filesize

                              9KB

                              MD5

                              9ead10c08e72ae41921191f8db39bc16

                              SHA1

                              abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                              SHA256

                              8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                              SHA512

                              aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                            • C:\Users\Admin\AppData\Local\c18b6f24-e875-437e-8a93-06739d43ebd3\build3.exe

                              Filesize

                              9KB

                              MD5

                              9ead10c08e72ae41921191f8db39bc16

                              SHA1

                              abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                              SHA256

                              8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                              SHA512

                              aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

                              Filesize

                              9KB

                              MD5

                              9ead10c08e72ae41921191f8db39bc16

                              SHA1

                              abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                              SHA256

                              8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                              SHA512

                              aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

                              Filesize

                              9KB

                              MD5

                              9ead10c08e72ae41921191f8db39bc16

                              SHA1

                              abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                              SHA256

                              8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                              SHA512

                              aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

                              Filesize

                              9KB

                              MD5

                              9ead10c08e72ae41921191f8db39bc16

                              SHA1

                              abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                              SHA256

                              8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                              SHA512

                              aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                            • memory/912-289-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/912-213-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/912-211-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/912-222-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/1372-317-0x0000000000CD0000-0x0000000000CD9000-memory.dmp

                              Filesize

                              36KB

                            • memory/1372-318-0x0000000000CC0000-0x0000000000CCF000-memory.dmp

                              Filesize

                              60KB

                            • memory/1428-241-0x0000000000850000-0x000000000089F000-memory.dmp

                              Filesize

                              316KB

                            • memory/1428-240-0x00000000008DD000-0x0000000000909000-memory.dmp

                              Filesize

                              176KB

                            • memory/1608-322-0x0000000000400000-0x0000000000405000-memory.dmp

                              Filesize

                              20KB

                            • memory/1608-323-0x00000000001F0000-0x00000000001F9000-memory.dmp

                              Filesize

                              36KB

                            • memory/1996-173-0x0000000140000000-0x000000014060E000-memory.dmp

                              Filesize

                              6.1MB

                            • memory/2236-326-0x0000000000160000-0x000000000016C000-memory.dmp

                              Filesize

                              48KB

                            • memory/2236-325-0x0000000000170000-0x0000000000176000-memory.dmp

                              Filesize

                              24KB

                            • memory/2312-304-0x0000000005540000-0x0000000005B58000-memory.dmp

                              Filesize

                              6.1MB

                            • memory/2312-300-0x0000000004F90000-0x0000000005534000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/2312-321-0x00000000075E0000-0x0000000007B0C000-memory.dmp

                              Filesize

                              5.2MB

                            • memory/2312-319-0x0000000007410000-0x00000000075D2000-memory.dmp

                              Filesize

                              1.8MB

                            • memory/2312-316-0x0000000005E80000-0x0000000005EE6000-memory.dmp

                              Filesize

                              408KB

                            • memory/2312-315-0x0000000005DE0000-0x0000000005E72000-memory.dmp

                              Filesize

                              584KB

                            • memory/2312-310-0x0000000004F00000-0x0000000004F3C000-memory.dmp

                              Filesize

                              240KB

                            • memory/2312-297-0x00000000007B3000-0x00000000007E9000-memory.dmp

                              Filesize

                              216KB

                            • memory/2312-331-0x0000000006780000-0x00000000067D0000-memory.dmp

                              Filesize

                              320KB

                            • memory/2312-298-0x0000000002240000-0x0000000002299000-memory.dmp

                              Filesize

                              356KB

                            • memory/2312-306-0x0000000004DF0000-0x0000000004EFA000-memory.dmp

                              Filesize

                              1.0MB

                            • memory/2312-305-0x0000000002A70000-0x0000000002A82000-memory.dmp

                              Filesize

                              72KB

                            • memory/2312-299-0x0000000000400000-0x00000000005B9000-memory.dmp

                              Filesize

                              1.7MB

                            • memory/2440-201-0x0000000000540000-0x0000000000549000-memory.dmp

                              Filesize

                              36KB

                            • memory/2440-202-0x0000000000400000-0x0000000000438000-memory.dmp

                              Filesize

                              224KB

                            • memory/2440-200-0x0000000000739000-0x000000000074A000-memory.dmp

                              Filesize

                              68KB

                            • memory/2544-253-0x000000000073D000-0x0000000000769000-memory.dmp

                              Filesize

                              176KB

                            • memory/2724-178-0x0000000001090000-0x0000000001097000-memory.dmp

                              Filesize

                              28KB

                            • memory/2724-179-0x0000000001080000-0x000000000108C000-memory.dmp

                              Filesize

                              48KB

                            • memory/3312-328-0x0000000000FD0000-0x0000000000FF2000-memory.dmp

                              Filesize

                              136KB

                            • memory/3312-329-0x0000000000FA0000-0x0000000000FC7000-memory.dmp

                              Filesize

                              156KB

                            • memory/3356-239-0x0000000000400000-0x0000000000463000-memory.dmp

                              Filesize

                              396KB

                            • memory/3356-286-0x0000000000400000-0x0000000000463000-memory.dmp

                              Filesize

                              396KB

                            • memory/3356-246-0x0000000000400000-0x0000000000463000-memory.dmp

                              Filesize

                              396KB

                            • memory/3356-236-0x0000000000400000-0x0000000000463000-memory.dmp

                              Filesize

                              396KB

                            • memory/3356-264-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                              Filesize

                              972KB

                            • memory/3568-227-0x0000000000794000-0x0000000000826000-memory.dmp

                              Filesize

                              584KB

                            • memory/3644-263-0x0000000000400000-0x0000000000463000-memory.dmp

                              Filesize

                              396KB

                            • memory/3644-287-0x0000000000400000-0x0000000000463000-memory.dmp

                              Filesize

                              396KB

                            • memory/4208-313-0x0000000000FD0000-0x0000000000FDB000-memory.dmp

                              Filesize

                              44KB

                            • memory/4208-312-0x0000000000FE0000-0x0000000000FE7000-memory.dmp

                              Filesize

                              28KB

                            • memory/4356-192-0x0000000000470000-0x0000000000479000-memory.dmp

                              Filesize

                              36KB

                            • memory/4356-191-0x0000000000519000-0x000000000052A000-memory.dmp

                              Filesize

                              68KB

                            • memory/4356-206-0x0000000000400000-0x0000000000436000-memory.dmp

                              Filesize

                              216KB

                            • memory/4356-193-0x0000000000400000-0x0000000000436000-memory.dmp

                              Filesize

                              216KB

                            • memory/4368-184-0x0000000000310000-0x000000000037B000-memory.dmp

                              Filesize

                              428KB

                            • memory/4368-174-0x0000000000380000-0x00000000003F5000-memory.dmp

                              Filesize

                              468KB

                            • memory/4368-176-0x0000000000310000-0x000000000037B000-memory.dmp

                              Filesize

                              428KB

                            • memory/4380-212-0x000000000203B000-0x00000000020CC000-memory.dmp

                              Filesize

                              580KB

                            • memory/4532-142-0x0000000002320000-0x000000000243B000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/4532-141-0x00000000008FE000-0x0000000000990000-memory.dmp

                              Filesize

                              584KB

                            • memory/4556-234-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4556-290-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4556-228-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4556-226-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4624-189-0x0000000000659000-0x00000000006EA000-memory.dmp

                              Filesize

                              580KB

                            • memory/4684-190-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4684-204-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4684-194-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4684-188-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4720-136-0x0000000000400000-0x0000000000436000-memory.dmp

                              Filesize

                              216KB

                            • memory/4720-132-0x0000000000649000-0x000000000065A000-memory.dmp

                              Filesize

                              68KB

                            • memory/4720-135-0x0000000000649000-0x000000000065A000-memory.dmp

                              Filesize

                              68KB

                            • memory/4720-134-0x0000000000400000-0x0000000000436000-memory.dmp

                              Filesize

                              216KB

                            • memory/4720-133-0x00000000005D0000-0x00000000005D9000-memory.dmp

                              Filesize

                              36KB

                            • memory/4756-164-0x0000000140000000-0x000000014060E000-memory.dmp

                              Filesize

                              6.1MB

                            • memory/5052-215-0x0000000003890000-0x000000000393D000-memory.dmp

                              Filesize

                              692KB

                            • memory/5052-207-0x00000000037B0000-0x0000000003872000-memory.dmp

                              Filesize

                              776KB

                            • memory/5052-221-0x0000000003680000-0x0000000003794000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/5052-182-0x0000000003680000-0x0000000003794000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/5052-181-0x0000000003440000-0x0000000003554000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/5096-219-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/5096-199-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/5096-150-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/5096-154-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/5096-155-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/5096-157-0x0000000000400000-0x0000000000537000-memory.dmp

                              Filesize

                              1.2MB