Analysis

  • max time kernel
    144s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/11/2022, 10:39

General

  • Target

    8f5c1de13d9fd0470c68ea327fd5f8dd7861357c8b39ca328ffb43b30a332995.exe

  • Size

    1.3MB

  • MD5

    15a84925fecfb370a3171ceec6818f4f

  • SHA1

    9a54025d11b237eba6d8a3fd25fffea4c127e198

  • SHA256

    8f5c1de13d9fd0470c68ea327fd5f8dd7861357c8b39ca328ffb43b30a332995

  • SHA512

    f05eb4cca2476cdc784c8790ba2b81da6c3e976ef5ecc21892d2eff6f221cb8e09475505de3edc331d69e530339a05d00ef8c4b495ab3cd628e2d9d7f5dc2d92

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 12 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 17 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 14 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f5c1de13d9fd0470c68ea327fd5f8dd7861357c8b39ca328ffb43b30a332995.exe
    "C:\Users\Admin\AppData\Local\Temp\8f5c1de13d9fd0470c68ea327fd5f8dd7861357c8b39ca328ffb43b30a332995.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4220
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4304
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4608
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3272
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\services.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1584
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\cmd.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1352
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jfcXHB472f.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1700
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2096
              • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe
                "C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe"
                6⤵
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:664
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NjKeWzk8OD.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1484
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    8⤵
                      PID:2616
                    • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe
                      "C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe"
                      8⤵
                      • Executes dropped EXE
                      • Modifies registry class
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:4144
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\4yEObGBIDe.bat"
                        9⤵
                        • Suspicious use of WriteProcessMemory
                        PID:5040
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          10⤵
                            PID:1256
                          • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe
                            "C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe"
                            10⤵
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of WriteProcessMemory
                            PID:3888
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RjWoOVK6wo.bat"
                              11⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4704
                              • C:\Windows\system32\w32tm.exe
                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                12⤵
                                  PID:4560
                                • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe
                                  "C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe"
                                  12⤵
                                  • Executes dropped EXE
                                  • Modifies registry class
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of WriteProcessMemory
                                  PID:2176
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uOEGMIRuqZ.bat"
                                    13⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:3416
                                    • C:\Windows\system32\w32tm.exe
                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      14⤵
                                        PID:4232
                                      • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe
                                        "C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe"
                                        14⤵
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of WriteProcessMemory
                                        PID:2768
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TmtjCtAJTq.bat"
                                          15⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:1512
                                          • C:\Windows\system32\w32tm.exe
                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                            16⤵
                                              PID:3920
                                            • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe
                                              "C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe"
                                              16⤵
                                              • Executes dropped EXE
                                              • Modifies registry class
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of WriteProcessMemory
                                              PID:5012
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\76lQa6YaxV.bat"
                                                17⤵
                                                • Suspicious use of WriteProcessMemory
                                                PID:4020
                                                • C:\Windows\system32\w32tm.exe
                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                  18⤵
                                                    PID:4988
                                                  • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe
                                                    "C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe"
                                                    18⤵
                                                    • Executes dropped EXE
                                                    • Modifies registry class
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2300
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1CKPPXbanu.bat"
                                                      19⤵
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:4056
                                                      • C:\Windows\system32\w32tm.exe
                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                        20⤵
                                                          PID:4792
                                                        • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe
                                                          "C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe"
                                                          20⤵
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:1344
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VbZulfStaN.bat"
                                                            21⤵
                                                              PID:3828
                                                              • C:\Windows\system32\w32tm.exe
                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                22⤵
                                                                  PID:1592
                                                                • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe
                                                                  "C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe"
                                                                  22⤵
                                                                  • Executes dropped EXE
                                                                  • Modifies registry class
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:5116
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gN51JOWfNX.bat"
                                                                    23⤵
                                                                      PID:720
                                                                      • C:\Windows\system32\w32tm.exe
                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                        24⤵
                                                                          PID:4180
                                                                        • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe
                                                                          "C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe"
                                                                          24⤵
                                                                          • Executes dropped EXE
                                                                          • Modifies registry class
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:2600
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\A1nTHBcTHH.bat"
                                                                            25⤵
                                                                              PID:4804
                                                                              • C:\Windows\system32\w32tm.exe
                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                26⤵
                                                                                  PID:4844
                                                                                • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe
                                                                                  "C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe"
                                                                                  26⤵
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:2576
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\pCY6B1XXru.bat"
                                                                                    27⤵
                                                                                      PID:240
                                                                                      • C:\Windows\system32\w32tm.exe
                                                                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                        28⤵
                                                                                          PID:620
                                                                                        • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe
                                                                                          "C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe"
                                                                                          28⤵
                                                                                          • Executes dropped EXE
                                                                                          • Modifies registry class
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:516
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mQe7zIwqSA.bat"
                                                                                            29⤵
                                                                                              PID:4784
                                                                                              • C:\Windows\system32\w32tm.exe
                                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                30⤵
                                                                                                  PID:4608
                                                                                                • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe
                                                                                                  "C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe"
                                                                                                  30⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:2940
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe'
                                                5⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:808
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\explorer.exe'
                                                5⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:884
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
                                                5⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1184
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\odt\explorer.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Creates scheduled task(s)
                                        PID:5116
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\odt\explorer.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Creates scheduled task(s)
                                        PID:4128
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Creates scheduled task(s)
                                        PID:444
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Creates scheduled task(s)
                                        PID:4176
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Creates scheduled task(s)
                                        PID:1856
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\cmd.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Creates scheduled task(s)
                                        PID:516
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\cmd.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Creates scheduled task(s)
                                        PID:4900
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\odt\services.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Creates scheduled task(s)
                                        PID:4936
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\odt\services.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Creates scheduled task(s)
                                        PID:4924
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\cmd.exe'" /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Creates scheduled task(s)
                                        PID:4152
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\odt\services.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Creates scheduled task(s)
                                        PID:4976
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\odt\explorer.exe'" /rl HIGHEST /f
                                        1⤵
                                        • Process spawned unexpected child process
                                        • Creates scheduled task(s)
                                        PID:3864

                                      Network

                                            MITRE ATT&CK Enterprise v6

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Program Files (x86)\Windows Media Player\Visualizations\services.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                              Filesize

                                              3KB

                                              MD5

                                              ad5cd538ca58cb28ede39c108acb5785

                                              SHA1

                                              1ae910026f3dbe90ed025e9e96ead2b5399be877

                                              SHA256

                                              c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033

                                              SHA512

                                              c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\services.exe.log

                                              Filesize

                                              1KB

                                              MD5

                                              d63ff49d7c92016feb39812e4db10419

                                              SHA1

                                              2307d5e35ca9864ffefc93acf8573ea995ba189b

                                              SHA256

                                              375076241775962f3edc08a8c72832a00920b427a4f3332528d91d21e909fa12

                                              SHA512

                                              00f8c8d0336d6575b956876183199624d6f4d2056f2c0aa633a6f17c516f22ee648062d9bc419254d84c459323e9424f0da8aed9dd4e16c2926e5ba30e797d8a

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              f48be18585c7baf54425ab0a36d45cab

                                              SHA1

                                              8c7bae02363b7abc78aa00f0d5b17c18cf0b9e48

                                              SHA256

                                              17de4ceb4fa26e2e132f32befe8e427fefc9037c42e18be06c435f7f405d16de

                                              SHA512

                                              96db0983ec6a08ec79225ff9e89fc1919358d37ae7f8177a11ee93611057b92ccb7249b9dcd16e5687d090fabaf281ccb681873a77fc7e5e0eb78db9739c07ef

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              f48be18585c7baf54425ab0a36d45cab

                                              SHA1

                                              8c7bae02363b7abc78aa00f0d5b17c18cf0b9e48

                                              SHA256

                                              17de4ceb4fa26e2e132f32befe8e427fefc9037c42e18be06c435f7f405d16de

                                              SHA512

                                              96db0983ec6a08ec79225ff9e89fc1919358d37ae7f8177a11ee93611057b92ccb7249b9dcd16e5687d090fabaf281ccb681873a77fc7e5e0eb78db9739c07ef

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              f48be18585c7baf54425ab0a36d45cab

                                              SHA1

                                              8c7bae02363b7abc78aa00f0d5b17c18cf0b9e48

                                              SHA256

                                              17de4ceb4fa26e2e132f32befe8e427fefc9037c42e18be06c435f7f405d16de

                                              SHA512

                                              96db0983ec6a08ec79225ff9e89fc1919358d37ae7f8177a11ee93611057b92ccb7249b9dcd16e5687d090fabaf281ccb681873a77fc7e5e0eb78db9739c07ef

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              ee60928339a4ced137c119eba3ca7aa6

                                              SHA1

                                              c005c4c04fc95da58e044715e01b62b018ef4460

                                              SHA256

                                              4b9b33b9027c348912e3346f8074a8cc1ec3fd40343275f4df3749dfe5425a5b

                                              SHA512

                                              431b941ba13408cb517d3b3cc58252a2db2193e1bb02fcafed3110102228380b6677c111725a63f9da2bee7ffd7b3d8db0aff073a479c102036b7a1560e25691

                                            • C:\Users\Admin\AppData\Local\Temp\1CKPPXbanu.bat

                                              Filesize

                                              236B

                                              MD5

                                              56fb15e86fb390a20011c6772fded74c

                                              SHA1

                                              5159e908d95751512cab00b6836a92c42e7fd8d7

                                              SHA256

                                              0fe33d3acd5f8612a64360997338eb64be306b52aa767495ed1756670ec4944c

                                              SHA512

                                              2c5499f6f361a00a0fa17f6020d5f859a80c17871872a8867e51e6627adae7f82fe7c34a56246bde161cd2642aee2584a8a64aeed52924dd33204425dd3aa4fc

                                            • C:\Users\Admin\AppData\Local\Temp\4yEObGBIDe.bat

                                              Filesize

                                              236B

                                              MD5

                                              d4c370d4f45c2cae6182f5b7d1f14665

                                              SHA1

                                              85bb10d51dd6cc683dee42f8e9074321024f2a1b

                                              SHA256

                                              40b7b51f646219dc78f911ff900b1d8ca16313fbe2d4759db96956b45fb5b5be

                                              SHA512

                                              d4ae7b998640135b7f8a2ab2497695b9441499aed3aa464849546aafd5b80764ea4e54f4737de527417139f8f207d945b7a29aff1a82badd38dcb726a7aa7605

                                            • C:\Users\Admin\AppData\Local\Temp\76lQa6YaxV.bat

                                              Filesize

                                              236B

                                              MD5

                                              97b467ad0ad42aadafbec20f74306885

                                              SHA1

                                              6e95f885ac91b99bc4507d7f77499484c134e1d5

                                              SHA256

                                              b1e960663e77a8943f5d6368917114185a9857ef464ce86ca9d68ac5d3c98c71

                                              SHA512

                                              fcceea1ccdcf0072830a758b27aeac3d547189338e8ee10fdcc5da1d2e05747e02bfc62d1c306ab2715eb63a6d93581657e71854d514f0c1ba8f07e3f5377224

                                            • C:\Users\Admin\AppData\Local\Temp\A1nTHBcTHH.bat

                                              Filesize

                                              236B

                                              MD5

                                              efc1feaf2c510c3e582944c12ef54b54

                                              SHA1

                                              3a1e298cb969767da2ab020f1d9788cabb4d861a

                                              SHA256

                                              68248e5d12dc3be289c0e1a6666e78f0222c265010db8aa40ec3743f7e34ba9d

                                              SHA512

                                              99e24b779db9125fef6bcd0662df5195732ae40dd5de81587d7fe755cc5b43b24f17e524c4f6fdf3fb5c70fbd72088ab96ae9c6058cf139b20529f4e34bb9370

                                            • C:\Users\Admin\AppData\Local\Temp\NjKeWzk8OD.bat

                                              Filesize

                                              236B

                                              MD5

                                              5a9ede7e5db66951759447dc8d375c4b

                                              SHA1

                                              28a81d580cd30330389446d1a16beab5ecda9a7f

                                              SHA256

                                              1582f659e70035ae772c11e49578e8196c97ff6a1083dc3483a2ef343c38a4b4

                                              SHA512

                                              60b4240920c2a5acac026b337248c6dfd690ea50367d8cb2e1c8996b55b4edd38d09147372e61588c012a5339dd9d0a82c8faf4c41a7972035d2ffd8d7099591

                                            • C:\Users\Admin\AppData\Local\Temp\RjWoOVK6wo.bat

                                              Filesize

                                              236B

                                              MD5

                                              ddc157e60ac04d65b2d8d12205493ea6

                                              SHA1

                                              ba9ac09fea1bab53397c6744f83a4a963be44c84

                                              SHA256

                                              c2e5fbcd3e5857d16efb23f643cc7beed5aacc5251dd4c9e5f6e589c858a4648

                                              SHA512

                                              770eea5ca5294c6972a2278525869e6f82abb2180b280b92aeec180a2562833e43b66a95ca68c6f9abaeaada244f2f349fd2e1e950e2d1fe7beff411310383f3

                                            • C:\Users\Admin\AppData\Local\Temp\TmtjCtAJTq.bat

                                              Filesize

                                              236B

                                              MD5

                                              2e8ec5ec9c8854b4326cb373dd99d68d

                                              SHA1

                                              af0f145ae34c6811f5d305ae565de95f728df378

                                              SHA256

                                              ee4d24f7e87d9267be1cf63a9a0c63e53e910afa6a15979cf6a51cb857106160

                                              SHA512

                                              3960f4e4520f7f1ab45c6c8a8f446f3f3159ce668df18b293a8e6ff06d68b28497395ea8fa0a8c3a89c53d4fda2ad22a89857b9c8aea018362373ed1dbfb06e9

                                            • C:\Users\Admin\AppData\Local\Temp\VbZulfStaN.bat

                                              Filesize

                                              236B

                                              MD5

                                              b56eea76a986b6c7682a226e5a532b54

                                              SHA1

                                              6c6044087f57492f9afc1bbaa22f564e7d151348

                                              SHA256

                                              6aafb8f3589a5d3d4dfa8549a12cb3577fb115c55fe054dd011504ca9ed7bec9

                                              SHA512

                                              4d533483a8f4d240e1beaca595b7feee3854e43b626202d30066bd9ed0679bba2928f71a33fd12d7a56a79293477eeb74badabd633800b4c9174495be7e5b9a4

                                            • C:\Users\Admin\AppData\Local\Temp\gN51JOWfNX.bat

                                              Filesize

                                              236B

                                              MD5

                                              881f79ee1bdd91db1130a678fa5d86c1

                                              SHA1

                                              708b2dd526ee30eee19283455ab16a409cba37ed

                                              SHA256

                                              4e7aea37396f7a0224f2cfaf5f539f23d5c0609b31c5e47a277c03f7e2c5bb18

                                              SHA512

                                              332e40ba0e41788f373723a0c476810b3eb41b466ef0daf947a442a81a1badd77f0f330ba63afdfb8fdf544fa27bfce0cd682ea1ca4b9095e88911d3a276df91

                                            • C:\Users\Admin\AppData\Local\Temp\jfcXHB472f.bat

                                              Filesize

                                              236B

                                              MD5

                                              f26a32375e91f32910ca68f1df36e49e

                                              SHA1

                                              3b06fe796af2882d004e52dc97a69382a8e0e3ab

                                              SHA256

                                              3bd7621ca41e937aa1121693311afc02d882729dc670665a5acb18e7d6365d4c

                                              SHA512

                                              d9b360a4a08732788f2d8d35001bc4b09194e7c7f030a4e89eb810472809560a16eb2070c1e837d701f61c2d4c10a5cc18a4f4c9649f2c95480d8f0372463eca

                                            • C:\Users\Admin\AppData\Local\Temp\mQe7zIwqSA.bat

                                              Filesize

                                              236B

                                              MD5

                                              c5825df41c5c9bb946f4f5af3cf41e4a

                                              SHA1

                                              f3334215e160082df066280bdac9201c58313b1d

                                              SHA256

                                              a7851393b1e1d87838c30999575a8f4b1b9b0ddd8e31bb0e77392c148b70176e

                                              SHA512

                                              de5ca6fa0c942f3ce001ddb645d6612ff336626ee97ed14d9dfd080c654bb9bf3d5a00b9c161c31cc73ab7ce3e1601ff8b70c655084b4b1c13855a76fcad80ae

                                            • C:\Users\Admin\AppData\Local\Temp\pCY6B1XXru.bat

                                              Filesize

                                              236B

                                              MD5

                                              fad23eb1a31e57931ac89800f13d61a0

                                              SHA1

                                              333aa4ea6bf8524de6dbcf97e2c8cb568069503c

                                              SHA256

                                              d84f6934a232bfb3b956dd5b129d640b8add1c5ff592c3ade3d39e95c71eae3f

                                              SHA512

                                              81f038c0fc747c453801da750f8ba7c87d3d6aa6048e02a7627c9ffe76ac5c5e27403ba535fb561d852fcd1223e5eb186e88eef9f1e24b61baa24bcf12089083

                                            • C:\Users\Admin\AppData\Local\Temp\uOEGMIRuqZ.bat

                                              Filesize

                                              236B

                                              MD5

                                              e1a47ecd4af58cc8f5c45bde4c715f78

                                              SHA1

                                              58746beca92fb541bff0aa69c4160e7c037aa7ca

                                              SHA256

                                              79c6c2eff89a26d652253a25f931086bc20785ffd38739c09c888ba4d0d11871

                                              SHA512

                                              fbaa5e1d1e7bd53a17c1506f300e8bf9d13e7fa3a1b3716816bade65ce4fb099f81ba773d47f172b20095b32cc317710fe372f3e985cf66c6b2130c9d869623d

                                            • C:\providercommon\1zu9dW.bat

                                              Filesize

                                              36B

                                              MD5

                                              6783c3ee07c7d151ceac57f1f9c8bed7

                                              SHA1

                                              17468f98f95bf504cc1f83c49e49a78526b3ea03

                                              SHA256

                                              8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                              SHA512

                                              c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                            • C:\providercommon\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\providercommon\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                              Filesize

                                              197B

                                              MD5

                                              8088241160261560a02c84025d107592

                                              SHA1

                                              083121f7027557570994c9fc211df61730455bb5

                                              SHA256

                                              2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                              SHA512

                                              20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                            • memory/664-469-0x0000000000590000-0x00000000005A2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/884-313-0x0000029EB9160000-0x0000029EB9182000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/1184-320-0x0000020DF2560000-0x0000020DF25D6000-memory.dmp

                                              Filesize

                                              472KB

                                            • memory/2300-505-0x0000000001300000-0x0000000001312000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/2768-493-0x0000000001140000-0x0000000001152000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/3272-286-0x0000000002AE0000-0x0000000002AEC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/3272-284-0x0000000002AF0000-0x0000000002AFC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/3272-283-0x0000000000FD0000-0x0000000000FE2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/3272-282-0x00000000009B0000-0x0000000000AC0000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/3272-285-0x0000000000FF0000-0x0000000000FFC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/3888-482-0x0000000000BD0000-0x0000000000BE2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/4144-476-0x0000000001740000-0x0000000001752000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/4220-143-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-119-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-160-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-162-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-158-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-159-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-157-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-156-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-155-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-154-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-152-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-153-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-151-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-150-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-149-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-163-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-164-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-148-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-142-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-165-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-172-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-146-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-147-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-167-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-171-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-169-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-118-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-145-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-117-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-170-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-144-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-174-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-141-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-128-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-168-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-139-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-166-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-116-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-140-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-161-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-121-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-138-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-122-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-124-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-137-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-126-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-125-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-136-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-179-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-178-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-135-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-173-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-134-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-133-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-177-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-132-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-176-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-127-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-131-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-129-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-130-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4220-175-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4304-182-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4304-181-0x0000000077DA0000-0x0000000077F2E000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/5012-499-0x00000000011F0000-0x0000000001202000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/5116-516-0x0000000000CA0000-0x0000000000CB2000-memory.dmp

                                              Filesize

                                              72KB