Analysis

  • max time kernel
    51s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-03-2023 11:45

General

  • Target

    f901eda45e1a3539bd15524ea8c3881e9cdc68e5ebeaef79515689d776202215.exe

  • Size

    657KB

  • MD5

    e0ec2979fb278ef9a75addf2154e6a96

  • SHA1

    42ffd17f13aa448b26e32fa0344e1f1386e3fdd7

  • SHA256

    f901eda45e1a3539bd15524ea8c3881e9cdc68e5ebeaef79515689d776202215

  • SHA512

    6f98c474b2f12ae2c0dd69b8e8996e6961613a83c6971d849164f6357e0d5c385b027e14e92cfbd7b03dcd6be86f8dd00bfecf12307cb5df5a52bcbc7ea87dbe

  • SSDEEP

    12288:gMrCy90zjWhOiEM0fbK+K0txDp20rr9itil1/VLKG/ueK0IBsD4a:SyejkOXM+bKb0txDU0nstiz/4GGepIiD

Malware Config

Extracted

Family

redline

Botnet

lint

C2

193.233.20.28:4125

Attributes
  • auth_value

    0e95262fb78243c67430f3148303e5b7

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Extracted

Family

redline

Botnet

@REDLINEVIPCHAT Cloud (TG: @FATHEROFCARDERS)

C2

151.80.89.234:19388

Attributes
  • auth_value

    56af49c3278d982f9a41ef2abb7c4d09

Extracted

Family

redline

Botnet

MatyWon2

C2

85.31.54.216:43728

Attributes
  • auth_value

    abc9e9d7ec3024110589ea03bcfaaa89

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    9ee0ef01cd0f0468c997745b63f39799e510412a4bb4e6ff8efcf6f8ac926172

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects PseudoManuscrypt payload 21 IoCs
  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • PseudoManuscrypt

    PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 20 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 44 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f901eda45e1a3539bd15524ea8c3881e9cdc68e5ebeaef79515689d776202215.exe
    "C:\Users\Admin\AppData\Local\Temp\f901eda45e1a3539bd15524ea8c3881e9cdc68e5ebeaef79515689d776202215.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will1104.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will1104.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will3794.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will3794.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ns7162XZ.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ns7162XZ.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2636
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py41vP22.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py41vP22.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3136
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs0526YM.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs0526YM.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry77Gf92.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry77Gf92.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
        "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4900
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4544
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:488
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "legenda.exe" /P "Admin:N"
              5⤵
                PID:2768
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "legenda.exe" /P "Admin:R" /E
                5⤵
                  PID:3856
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4892
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\f22b669919" /P "Admin:N"
                    5⤵
                      PID:4708
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\f22b669919" /P "Admin:R" /E
                      5⤵
                        PID:4712
                    • C:\Users\Admin\AppData\Local\Temp\1000026001\serv.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000026001\serv.exe"
                      4⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      PID:5044
                      • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
                        "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
                        5⤵
                          PID:4264
                      • C:\Users\Admin\AppData\Local\Temp\1000027001\MatyWon.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000027001\MatyWon.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of WriteProcessMemory
                        PID:4388
                        • C:\Users\Admin\AppData\Local\Temp\1000027001\MatyWon.exe
                          C:\Users\Admin\AppData\Local\Temp\1000027001\MatyWon.exe
                          5⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5004
                      • C:\Users\Admin\AppData\Local\Temp\1000036001\2-1_2023-03-14_23-04.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000036001\2-1_2023-03-14_23-04.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:964
                      • C:\Users\Admin\AppData\Local\Temp\1000041001\10MIL.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000041001\10MIL.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4964
                      • C:\Users\Admin\AppData\Local\Temp\1000042001\MatyWon.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000042001\MatyWon.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious use of WriteProcessMemory
                        PID:1368
                        • C:\Users\Admin\AppData\Local\Temp\1000042001\MatyWon.exe
                          C:\Users\Admin\AppData\Local\Temp\1000042001\MatyWon.exe
                          5⤵
                          • Executes dropped EXE
                          PID:3248
                      • C:\Users\Admin\AppData\Local\Temp\1000044001\Setupdark.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000044001\Setupdark.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:1524
                      • C:\Users\Admin\AppData\Local\Temp\1000045001\MatyWon.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000045001\MatyWon.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:1128
                        • C:\Users\Admin\AppData\Local\Temp\1000045001\MatyWon.exe
                          C:\Users\Admin\AppData\Local\Temp\1000045001\MatyWon.exe
                          5⤵
                          • Executes dropped EXE
                          PID:4228
                      • C:\Users\Admin\AppData\Local\Temp\1000047001\lish.exe
                        "C:\Users\Admin\AppData\Local\Temp\1000047001\lish.exe"
                        4⤵
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:2696
                        • C:\Users\Admin\AppData\Local\Temp\1000047001\lish.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000047001\lish.exe" -h
                          5⤵
                          • Executes dropped EXE
                          • Modifies registry class
                          • Suspicious use of SetWindowsHookEx
                          PID:4000
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                        4⤵
                          PID:332
                  • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                    C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                    1⤵
                    • Executes dropped EXE
                    PID:5100
                  • C:\Windows\system32\rundll32.exe
                    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open
                    1⤵
                    • Process spawned unexpected child process
                    PID:3064
                    • C:\Windows\SysWOW64\rundll32.exe
                      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open
                      2⤵
                        PID:2888
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k WspService
                      1⤵
                        PID:4328
                      • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                        C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe
                        1⤵
                          PID:3976

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MatyWon.exe.log

                          Filesize

                          1KB

                          MD5

                          8268d0ebb3b023f56d9a27f3933f124f

                          SHA1

                          def43e831ca0fcbc1df8a1e11a41fe3ea1734f3b

                          SHA256

                          2fdfee92c5ce81220a0b66cf0ec1411c923d48ae89232406c237e1bc5204392d

                          SHA512

                          c61c2f8df84e4bbcb6f871befd4dde44188cf106c4af91a56b33a45692b83d1c52a953477f14f4239726b66ecab66842e910c2996631137355a4aba4ea793c97

                        • C:\Users\Admin\AppData\Local\Temp\1000026001\serv.exe

                          Filesize

                          245KB

                          MD5

                          354b3a49c2eb26b415dad675be798021

                          SHA1

                          ab564aa0f4b8c1bb4840e5d53cf22bda139a8417

                          SHA256

                          c680866af40f12d71ea30dbc0ba4d02132b64cff08305df0f0827aed7fe99dd1

                          SHA512

                          0e7d8fd3dbfddae84f794630f71cd5e08ca82d08047ac04fdd754521e5ea42a326967da61b3c85762fcead5eeaa9c73ba60f073611379dd788ce6909652602c4

                        • C:\Users\Admin\AppData\Local\Temp\1000026001\serv.exe

                          Filesize

                          245KB

                          MD5

                          354b3a49c2eb26b415dad675be798021

                          SHA1

                          ab564aa0f4b8c1bb4840e5d53cf22bda139a8417

                          SHA256

                          c680866af40f12d71ea30dbc0ba4d02132b64cff08305df0f0827aed7fe99dd1

                          SHA512

                          0e7d8fd3dbfddae84f794630f71cd5e08ca82d08047ac04fdd754521e5ea42a326967da61b3c85762fcead5eeaa9c73ba60f073611379dd788ce6909652602c4

                        • C:\Users\Admin\AppData\Local\Temp\1000026001\serv.exe

                          Filesize

                          245KB

                          MD5

                          354b3a49c2eb26b415dad675be798021

                          SHA1

                          ab564aa0f4b8c1bb4840e5d53cf22bda139a8417

                          SHA256

                          c680866af40f12d71ea30dbc0ba4d02132b64cff08305df0f0827aed7fe99dd1

                          SHA512

                          0e7d8fd3dbfddae84f794630f71cd5e08ca82d08047ac04fdd754521e5ea42a326967da61b3c85762fcead5eeaa9c73ba60f073611379dd788ce6909652602c4

                        • C:\Users\Admin\AppData\Local\Temp\1000027001\MatyWon.exe

                          Filesize

                          896KB

                          MD5

                          e01eed093c11df9172d1a70484e8f973

                          SHA1

                          6a9b4f44a5d2cdab4770811543963e66f09d97ec

                          SHA256

                          a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f409c5f210fbd3f861bb

                          SHA512

                          6a6a327210f5d35a307c1b9b66bf6e5b65b7cb2303e9126a5457a1be1ac708281cca0a4aea6d4b55e503e930a24213218271e261f80f5df4162be351317c8022

                        • C:\Users\Admin\AppData\Local\Temp\1000027001\MatyWon.exe

                          Filesize

                          896KB

                          MD5

                          e01eed093c11df9172d1a70484e8f973

                          SHA1

                          6a9b4f44a5d2cdab4770811543963e66f09d97ec

                          SHA256

                          a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f409c5f210fbd3f861bb

                          SHA512

                          6a6a327210f5d35a307c1b9b66bf6e5b65b7cb2303e9126a5457a1be1ac708281cca0a4aea6d4b55e503e930a24213218271e261f80f5df4162be351317c8022

                        • C:\Users\Admin\AppData\Local\Temp\1000027001\MatyWon.exe

                          Filesize

                          896KB

                          MD5

                          e01eed093c11df9172d1a70484e8f973

                          SHA1

                          6a9b4f44a5d2cdab4770811543963e66f09d97ec

                          SHA256

                          a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f409c5f210fbd3f861bb

                          SHA512

                          6a6a327210f5d35a307c1b9b66bf6e5b65b7cb2303e9126a5457a1be1ac708281cca0a4aea6d4b55e503e930a24213218271e261f80f5df4162be351317c8022

                        • C:\Users\Admin\AppData\Local\Temp\1000027001\MatyWon.exe

                          Filesize

                          896KB

                          MD5

                          e01eed093c11df9172d1a70484e8f973

                          SHA1

                          6a9b4f44a5d2cdab4770811543963e66f09d97ec

                          SHA256

                          a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f409c5f210fbd3f861bb

                          SHA512

                          6a6a327210f5d35a307c1b9b66bf6e5b65b7cb2303e9126a5457a1be1ac708281cca0a4aea6d4b55e503e930a24213218271e261f80f5df4162be351317c8022

                        • C:\Users\Admin\AppData\Local\Temp\1000036001\2-1_2023-03-14_23-04.exe

                          Filesize

                          185KB

                          MD5

                          097d8371eea941a8f7191509d8dc1b69

                          SHA1

                          677c63e800af71b7c2ddad83590cacf06769688f

                          SHA256

                          e7d9c0d2dd8fb7ea26d12bb4ebeff5987ed55ea0fe1ecf1d586e4c57b95c487a

                          SHA512

                          559e412691ce0c6cbeef6012ebf439a72558627e071376685b24780a5604ef206cf71e35a0f45979916452712eab1004a1da34b19d34120a6a63a3c740530a82

                        • C:\Users\Admin\AppData\Local\Temp\1000036001\2-1_2023-03-14_23-04.exe

                          Filesize

                          185KB

                          MD5

                          097d8371eea941a8f7191509d8dc1b69

                          SHA1

                          677c63e800af71b7c2ddad83590cacf06769688f

                          SHA256

                          e7d9c0d2dd8fb7ea26d12bb4ebeff5987ed55ea0fe1ecf1d586e4c57b95c487a

                          SHA512

                          559e412691ce0c6cbeef6012ebf439a72558627e071376685b24780a5604ef206cf71e35a0f45979916452712eab1004a1da34b19d34120a6a63a3c740530a82

                        • C:\Users\Admin\AppData\Local\Temp\1000036001\2-1_2023-03-14_23-04.exe

                          Filesize

                          185KB

                          MD5

                          097d8371eea941a8f7191509d8dc1b69

                          SHA1

                          677c63e800af71b7c2ddad83590cacf06769688f

                          SHA256

                          e7d9c0d2dd8fb7ea26d12bb4ebeff5987ed55ea0fe1ecf1d586e4c57b95c487a

                          SHA512

                          559e412691ce0c6cbeef6012ebf439a72558627e071376685b24780a5604ef206cf71e35a0f45979916452712eab1004a1da34b19d34120a6a63a3c740530a82

                        • C:\Users\Admin\AppData\Local\Temp\1000041001\10MIL.exe

                          Filesize

                          175KB

                          MD5

                          ff7f91fa0ee41b37bb8196d9bb44070c

                          SHA1

                          b332b64d585e605dddc0c6d88a47323d8c3fc4d1

                          SHA256

                          04a206dfda741eb98efd4b092b0c679c0706d213e411b406dbb98769084c836e

                          SHA512

                          58346361209cf47feb27c7f4ee8d44fd81da584202ec7563f79691739a2fc3b2ab84d5bbfb1da10507eb4b92263dd55ceeb3f988bffdaf794347103546aebc35

                        • C:\Users\Admin\AppData\Local\Temp\1000041001\10MIL.exe

                          Filesize

                          175KB

                          MD5

                          ff7f91fa0ee41b37bb8196d9bb44070c

                          SHA1

                          b332b64d585e605dddc0c6d88a47323d8c3fc4d1

                          SHA256

                          04a206dfda741eb98efd4b092b0c679c0706d213e411b406dbb98769084c836e

                          SHA512

                          58346361209cf47feb27c7f4ee8d44fd81da584202ec7563f79691739a2fc3b2ab84d5bbfb1da10507eb4b92263dd55ceeb3f988bffdaf794347103546aebc35

                        • C:\Users\Admin\AppData\Local\Temp\1000041001\10MIL.exe

                          Filesize

                          175KB

                          MD5

                          ff7f91fa0ee41b37bb8196d9bb44070c

                          SHA1

                          b332b64d585e605dddc0c6d88a47323d8c3fc4d1

                          SHA256

                          04a206dfda741eb98efd4b092b0c679c0706d213e411b406dbb98769084c836e

                          SHA512

                          58346361209cf47feb27c7f4ee8d44fd81da584202ec7563f79691739a2fc3b2ab84d5bbfb1da10507eb4b92263dd55ceeb3f988bffdaf794347103546aebc35

                        • C:\Users\Admin\AppData\Local\Temp\1000042001\MatyWon.exe

                          Filesize

                          896KB

                          MD5

                          e01eed093c11df9172d1a70484e8f973

                          SHA1

                          6a9b4f44a5d2cdab4770811543963e66f09d97ec

                          SHA256

                          a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f409c5f210fbd3f861bb

                          SHA512

                          6a6a327210f5d35a307c1b9b66bf6e5b65b7cb2303e9126a5457a1be1ac708281cca0a4aea6d4b55e503e930a24213218271e261f80f5df4162be351317c8022

                        • C:\Users\Admin\AppData\Local\Temp\1000042001\MatyWon.exe

                          Filesize

                          896KB

                          MD5

                          e01eed093c11df9172d1a70484e8f973

                          SHA1

                          6a9b4f44a5d2cdab4770811543963e66f09d97ec

                          SHA256

                          a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f409c5f210fbd3f861bb

                          SHA512

                          6a6a327210f5d35a307c1b9b66bf6e5b65b7cb2303e9126a5457a1be1ac708281cca0a4aea6d4b55e503e930a24213218271e261f80f5df4162be351317c8022

                        • C:\Users\Admin\AppData\Local\Temp\1000042001\MatyWon.exe

                          Filesize

                          896KB

                          MD5

                          e01eed093c11df9172d1a70484e8f973

                          SHA1

                          6a9b4f44a5d2cdab4770811543963e66f09d97ec

                          SHA256

                          a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f409c5f210fbd3f861bb

                          SHA512

                          6a6a327210f5d35a307c1b9b66bf6e5b65b7cb2303e9126a5457a1be1ac708281cca0a4aea6d4b55e503e930a24213218271e261f80f5df4162be351317c8022

                        • C:\Users\Admin\AppData\Local\Temp\1000044001\Setupdark.exe

                          Filesize

                          3.7MB

                          MD5

                          d4fc8415802d26f5902a925dafa09f95

                          SHA1

                          76a6da00893bf5fa29e9b9a6e69e83e1ded5856c

                          SHA256

                          b5c72a18578c6cc7007b6c7738fa9f72b57ecaf26be44964af3947f7f2b5422f

                          SHA512

                          741da8d09f76f645557c668cde3d05155e0497bae6a431fa81f85b8ace7ab16be35ecebf3a56f6a019dbafe72cd8ed916dc4ae3615e35c615d1c841fc84420c9

                        • C:\Users\Admin\AppData\Local\Temp\1000044001\Setupdark.exe

                          Filesize

                          3.7MB

                          MD5

                          d4fc8415802d26f5902a925dafa09f95

                          SHA1

                          76a6da00893bf5fa29e9b9a6e69e83e1ded5856c

                          SHA256

                          b5c72a18578c6cc7007b6c7738fa9f72b57ecaf26be44964af3947f7f2b5422f

                          SHA512

                          741da8d09f76f645557c668cde3d05155e0497bae6a431fa81f85b8ace7ab16be35ecebf3a56f6a019dbafe72cd8ed916dc4ae3615e35c615d1c841fc84420c9

                        • C:\Users\Admin\AppData\Local\Temp\1000044001\Setupdark.exe

                          Filesize

                          3.7MB

                          MD5

                          d4fc8415802d26f5902a925dafa09f95

                          SHA1

                          76a6da00893bf5fa29e9b9a6e69e83e1ded5856c

                          SHA256

                          b5c72a18578c6cc7007b6c7738fa9f72b57ecaf26be44964af3947f7f2b5422f

                          SHA512

                          741da8d09f76f645557c668cde3d05155e0497bae6a431fa81f85b8ace7ab16be35ecebf3a56f6a019dbafe72cd8ed916dc4ae3615e35c615d1c841fc84420c9

                        • C:\Users\Admin\AppData\Local\Temp\1000045001\MatyWon.exe

                          Filesize

                          896KB

                          MD5

                          e01eed093c11df9172d1a70484e8f973

                          SHA1

                          6a9b4f44a5d2cdab4770811543963e66f09d97ec

                          SHA256

                          a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f409c5f210fbd3f861bb

                          SHA512

                          6a6a327210f5d35a307c1b9b66bf6e5b65b7cb2303e9126a5457a1be1ac708281cca0a4aea6d4b55e503e930a24213218271e261f80f5df4162be351317c8022

                        • C:\Users\Admin\AppData\Local\Temp\1000045001\MatyWon.exe

                          Filesize

                          896KB

                          MD5

                          e01eed093c11df9172d1a70484e8f973

                          SHA1

                          6a9b4f44a5d2cdab4770811543963e66f09d97ec

                          SHA256

                          a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f409c5f210fbd3f861bb

                          SHA512

                          6a6a327210f5d35a307c1b9b66bf6e5b65b7cb2303e9126a5457a1be1ac708281cca0a4aea6d4b55e503e930a24213218271e261f80f5df4162be351317c8022

                        • C:\Users\Admin\AppData\Local\Temp\1000045001\MatyWon.exe

                          Filesize

                          896KB

                          MD5

                          e01eed093c11df9172d1a70484e8f973

                          SHA1

                          6a9b4f44a5d2cdab4770811543963e66f09d97ec

                          SHA256

                          a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f409c5f210fbd3f861bb

                          SHA512

                          6a6a327210f5d35a307c1b9b66bf6e5b65b7cb2303e9126a5457a1be1ac708281cca0a4aea6d4b55e503e930a24213218271e261f80f5df4162be351317c8022

                        • C:\Users\Admin\AppData\Local\Temp\1000047001\lish.exe

                          Filesize

                          328KB

                          MD5

                          0b39012e51e6d52ddc49dd9676ba9920

                          SHA1

                          7e329120d82c58a5f2ccae98eb78d749f1095ff4

                          SHA256

                          6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10

                          SHA512

                          8d13528c02f727d6c15257050657f702622fdbc7836f0b01eda8f48edbe2aa2bb4f8dceb3652f9adead9774f3387a6bba20f95b988dd9fee642ddba5bd457a0c

                        • C:\Users\Admin\AppData\Local\Temp\1000047001\lish.exe

                          Filesize

                          328KB

                          MD5

                          0b39012e51e6d52ddc49dd9676ba9920

                          SHA1

                          7e329120d82c58a5f2ccae98eb78d749f1095ff4

                          SHA256

                          6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10

                          SHA512

                          8d13528c02f727d6c15257050657f702622fdbc7836f0b01eda8f48edbe2aa2bb4f8dceb3652f9adead9774f3387a6bba20f95b988dd9fee642ddba5bd457a0c

                        • C:\Users\Admin\AppData\Local\Temp\1000047001\lish.exe

                          Filesize

                          328KB

                          MD5

                          0b39012e51e6d52ddc49dd9676ba9920

                          SHA1

                          7e329120d82c58a5f2ccae98eb78d749f1095ff4

                          SHA256

                          6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10

                          SHA512

                          8d13528c02f727d6c15257050657f702622fdbc7836f0b01eda8f48edbe2aa2bb4f8dceb3652f9adead9774f3387a6bba20f95b988dd9fee642ddba5bd457a0c

                        • C:\Users\Admin\AppData\Local\Temp\1000047001\lish.exe

                          Filesize

                          328KB

                          MD5

                          0b39012e51e6d52ddc49dd9676ba9920

                          SHA1

                          7e329120d82c58a5f2ccae98eb78d749f1095ff4

                          SHA256

                          6aea187ca91ea68222b4e650e2b4baa46ba11252f74763a2d2edec2924a98f10

                          SHA512

                          8d13528c02f727d6c15257050657f702622fdbc7836f0b01eda8f48edbe2aa2bb4f8dceb3652f9adead9774f3387a6bba20f95b988dd9fee642ddba5bd457a0c

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry77Gf92.exe

                          Filesize

                          235KB

                          MD5

                          5086db99de54fca268169a1c6cf26122

                          SHA1

                          003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                          SHA256

                          42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                          SHA512

                          90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ry77Gf92.exe

                          Filesize

                          235KB

                          MD5

                          5086db99de54fca268169a1c6cf26122

                          SHA1

                          003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                          SHA256

                          42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                          SHA512

                          90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will1104.exe

                          Filesize

                          469KB

                          MD5

                          4f050b0f35f4af621a755d8e3e5a08e3

                          SHA1

                          7cb8cb5ba3351ba94c215409ceef164faa270c9a

                          SHA256

                          f9a95f85ee7dd3f8cf40d785cf3e19ae3d415170c10f4cd1d3ee89b02a45d447

                          SHA512

                          c45f3cbfa34c7e1a8baa5d5a00f3c98e190ae74c54bd2be9c9fe20890c7e38efbe352332360bf1f1fc3e5a42d1696c9c25ab8d9b3585fd2ab8f1d1abf23b04c7

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will1104.exe

                          Filesize

                          469KB

                          MD5

                          4f050b0f35f4af621a755d8e3e5a08e3

                          SHA1

                          7cb8cb5ba3351ba94c215409ceef164faa270c9a

                          SHA256

                          f9a95f85ee7dd3f8cf40d785cf3e19ae3d415170c10f4cd1d3ee89b02a45d447

                          SHA512

                          c45f3cbfa34c7e1a8baa5d5a00f3c98e190ae74c54bd2be9c9fe20890c7e38efbe352332360bf1f1fc3e5a42d1696c9c25ab8d9b3585fd2ab8f1d1abf23b04c7

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs0526YM.exe

                          Filesize

                          175KB

                          MD5

                          0ecc8ab62b7278cc6650517251f1543c

                          SHA1

                          b4273cda193a20d48e83241275ffc34ddad412f2

                          SHA256

                          b0f1238e54ac8e3534af7ecb4f834bea3223120fedb1eab80f7a1bf00fb5b97a

                          SHA512

                          c79d266c82b766ca39377fd02b3bc307fce4b59f53936e97c162200de3f8b3f72f6beda2aef2ab9ecd9be669b625c6ed0aaefa157cca7ac11d78b1939f660092

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qs0526YM.exe

                          Filesize

                          175KB

                          MD5

                          0ecc8ab62b7278cc6650517251f1543c

                          SHA1

                          b4273cda193a20d48e83241275ffc34ddad412f2

                          SHA256

                          b0f1238e54ac8e3534af7ecb4f834bea3223120fedb1eab80f7a1bf00fb5b97a

                          SHA512

                          c79d266c82b766ca39377fd02b3bc307fce4b59f53936e97c162200de3f8b3f72f6beda2aef2ab9ecd9be669b625c6ed0aaefa157cca7ac11d78b1939f660092

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will3794.exe

                          Filesize

                          324KB

                          MD5

                          c093d6484347efa327ac390d4631edd8

                          SHA1

                          74979dccb74054d1d622219fb8be2283540cdbe1

                          SHA256

                          55c3b4b46ce5e5bd1049cccbbbcbdddbe26a47130209e7045d39d6faa5f767f2

                          SHA512

                          78fd6c794e189e3d3ff6c73af40cdaa177ac1beb920d44c0c39364fc0e2072982d651a51c7d0dfc60bf1dd17466d52bb74736e46500b8898c84cbda33baa694a

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\will3794.exe

                          Filesize

                          324KB

                          MD5

                          c093d6484347efa327ac390d4631edd8

                          SHA1

                          74979dccb74054d1d622219fb8be2283540cdbe1

                          SHA256

                          55c3b4b46ce5e5bd1049cccbbbcbdddbe26a47130209e7045d39d6faa5f767f2

                          SHA512

                          78fd6c794e189e3d3ff6c73af40cdaa177ac1beb920d44c0c39364fc0e2072982d651a51c7d0dfc60bf1dd17466d52bb74736e46500b8898c84cbda33baa694a

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ns7162XZ.exe

                          Filesize

                          11KB

                          MD5

                          7e93bacbbc33e6652e147e7fe07572a0

                          SHA1

                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                          SHA256

                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                          SHA512

                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ns7162XZ.exe

                          Filesize

                          11KB

                          MD5

                          7e93bacbbc33e6652e147e7fe07572a0

                          SHA1

                          421a7167da01c8da4dc4d5234ca3dd84e319e762

                          SHA256

                          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                          SHA512

                          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py41vP22.exe

                          Filesize

                          226KB

                          MD5

                          472844701dea3a845a1031e820c9c4a1

                          SHA1

                          9428f16e0b2e5b38c7c9ba28c539274d3b3a8b4f

                          SHA256

                          9931bb2532c430289a37829911729eb57e162bda3f79bc712798804790fb3a53

                          SHA512

                          7186bf58650e44a82e34b35151f8668fd8429e768d4c94c9efe5811b96e6055eb77d5d61e0c401810325f7e2975d6b681d4a53d5592864feda31c3312efa7810

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\py41vP22.exe

                          Filesize

                          226KB

                          MD5

                          472844701dea3a845a1031e820c9c4a1

                          SHA1

                          9428f16e0b2e5b38c7c9ba28c539274d3b3a8b4f

                          SHA256

                          9931bb2532c430289a37829911729eb57e162bda3f79bc712798804790fb3a53

                          SHA512

                          7186bf58650e44a82e34b35151f8668fd8429e768d4c94c9efe5811b96e6055eb77d5d61e0c401810325f7e2975d6b681d4a53d5592864feda31c3312efa7810

                        • C:\Users\Admin\AppData\Local\Temp\db.dat

                          Filesize

                          557KB

                          MD5

                          b15c9612f747a2c7d6c429275c853b23

                          SHA1

                          46b5013dcc6677feabafb3c35d8aec6e79e1e6d3

                          SHA256

                          07b7dbc6e80247cee12695bc386079435ec90d0228f799ff884330b9f4e3c2d5

                          SHA512

                          2f70c8c18434e7a7e1475acda04ba2d3e13fd20c73ee14ff28eda50394898333e8c7067bea69cca28cff1226cdf050db55df2bcd629fb82b9f0535a505d07305

                        • C:\Users\Admin\AppData\Local\Temp\db.dll

                          Filesize

                          52KB

                          MD5

                          1b20e998d058e813dfc515867d31124f

                          SHA1

                          c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f

                          SHA256

                          24a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00

                          SHA512

                          79849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6

                        • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                          Filesize

                          235KB

                          MD5

                          5086db99de54fca268169a1c6cf26122

                          SHA1

                          003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                          SHA256

                          42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                          SHA512

                          90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                        • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                          Filesize

                          235KB

                          MD5

                          5086db99de54fca268169a1c6cf26122

                          SHA1

                          003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                          SHA256

                          42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                          SHA512

                          90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                        • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                          Filesize

                          235KB

                          MD5

                          5086db99de54fca268169a1c6cf26122

                          SHA1

                          003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                          SHA256

                          42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                          SHA512

                          90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                        • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                          Filesize

                          235KB

                          MD5

                          5086db99de54fca268169a1c6cf26122

                          SHA1

                          003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                          SHA256

                          42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                          SHA512

                          90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                        • C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe

                          Filesize

                          235KB

                          MD5

                          5086db99de54fca268169a1c6cf26122

                          SHA1

                          003f768ffcc99bda5cda1fb966fda8625a8fdc3e

                          SHA256

                          42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

                          SHA512

                          90531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          16cf28ebb6d37dbaba93f18320c6086e

                          SHA1

                          eae7d4b7a9636329065877aabe8d4f721a26ab25

                          SHA256

                          c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                          SHA512

                          f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          16cf28ebb6d37dbaba93f18320c6086e

                          SHA1

                          eae7d4b7a9636329065877aabe8d4f721a26ab25

                          SHA256

                          c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                          SHA512

                          f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                        • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                          Filesize

                          223B

                          MD5

                          94cbeec5d4343918fd0e48760e40539c

                          SHA1

                          a049266c5c1131f692f306c8710d7e72586ae79d

                          SHA256

                          48eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279

                          SHA512

                          4e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0

                        • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

                          Filesize

                          669.7MB

                          MD5

                          10de45c15567e68ff00a531320940fcc

                          SHA1

                          898c62422916db3f3b4161a6356120d23733bb29

                          SHA256

                          248cd9d833f2a490307ef63f10211fc34e23dc3537c654f75209b95ce1d84b54

                          SHA512

                          9f59e3200a9aaabe20a83c1fe6a4e577f0f62a469af4685e7489c628506f2b6f07a72d05d91badae16576ce81a6229cf32cbc5ee8c558a63622ae6f4d29f87bc

                        • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

                          Filesize

                          669.8MB

                          MD5

                          79e814ceb699f0d1bcde5b6ecb7673ea

                          SHA1

                          c0b80f1b49c30eb6e6dbc651d4919935835139de

                          SHA256

                          041c24d4d4b98384adb8ab0067283f8a53ce23f9eebb1b65a02229f6b368eb15

                          SHA512

                          aa3e5d0acfb13201c5042fa049c567c56b53150b15a4a535b26300b1b7088a3a6bc4721c39bc954146d84bbafdde20c016dae9c427e79549ab6ae84c7f5bf483

                        • \Users\Admin\AppData\Local\Temp\db.dll

                          Filesize

                          52KB

                          MD5

                          1b20e998d058e813dfc515867d31124f

                          SHA1

                          c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f

                          SHA256

                          24a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00

                          SHA512

                          79849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6

                        • \Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                          Filesize

                          89KB

                          MD5

                          16cf28ebb6d37dbaba93f18320c6086e

                          SHA1

                          eae7d4b7a9636329065877aabe8d4f721a26ab25

                          SHA256

                          c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106

                          SHA512

                          f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2

                        • memory/952-421-0x0000022FE82B0000-0x0000022FE8322000-memory.dmp

                          Filesize

                          456KB

                        • memory/964-348-0x0000000000400000-0x00000000004AD000-memory.dmp

                          Filesize

                          692KB

                        • memory/964-293-0x0000000000580000-0x000000000059D000-memory.dmp

                          Filesize

                          116KB

                        • memory/992-396-0x00000256DF9D0000-0x00000256DFA42000-memory.dmp

                          Filesize

                          456KB

                        • memory/992-369-0x00000256DF9D0000-0x00000256DFA42000-memory.dmp

                          Filesize

                          456KB

                        • memory/1084-420-0x0000020F4ED30000-0x0000020F4EDA2000-memory.dmp

                          Filesize

                          456KB

                        • memory/1084-399-0x0000020F4ED30000-0x0000020F4EDA2000-memory.dmp

                          Filesize

                          456KB

                        • memory/1128-326-0x0000000004F00000-0x0000000004F10000-memory.dmp

                          Filesize

                          64KB

                        • memory/1180-461-0x000002C271F60000-0x000002C271FD2000-memory.dmp

                          Filesize

                          456KB

                        • memory/1284-422-0x000001BA16900000-0x000001BA16972000-memory.dmp

                          Filesize

                          456KB

                        • memory/1340-463-0x000001D3816A0000-0x000001D381712000-memory.dmp

                          Filesize

                          456KB

                        • memory/1368-292-0x00000000048C0000-0x00000000048D0000-memory.dmp

                          Filesize

                          64KB

                        • memory/1524-459-0x0000000140000000-0x0000000140042000-memory.dmp

                          Filesize

                          264KB

                        • memory/1524-471-0x0000000140000000-0x0000000140042000-memory.dmp

                          Filesize

                          264KB

                        • memory/1524-311-0x0000000140000000-0x0000000140042000-memory.dmp

                          Filesize

                          264KB

                        • memory/1800-460-0x000001A69F560000-0x000001A69F5D2000-memory.dmp

                          Filesize

                          456KB

                        • memory/2268-379-0x0000015C717D0000-0x0000015C71842000-memory.dmp

                          Filesize

                          456KB

                        • memory/2268-398-0x0000015C717D0000-0x0000015C71842000-memory.dmp

                          Filesize

                          456KB

                        • memory/2312-400-0x0000017F1B440000-0x0000017F1B4B2000-memory.dmp

                          Filesize

                          456KB

                        • memory/2312-390-0x0000017F1B440000-0x0000017F1B4B2000-memory.dmp

                          Filesize

                          456KB

                        • memory/2484-370-0x0000023B6D970000-0x0000023B6D9E2000-memory.dmp

                          Filesize

                          456KB

                        • memory/2484-360-0x0000023B6CE90000-0x0000023B6CEDD000-memory.dmp

                          Filesize

                          308KB

                        • memory/2484-358-0x0000023B6D970000-0x0000023B6D9E2000-memory.dmp

                          Filesize

                          456KB

                        • memory/2484-355-0x0000023B6CE90000-0x0000023B6CEDD000-memory.dmp

                          Filesize

                          308KB

                        • memory/2560-464-0x00000265A7E00000-0x00000265A7E72000-memory.dmp

                          Filesize

                          456KB

                        • memory/2584-465-0x000002D96B350000-0x000002D96B3C2000-memory.dmp

                          Filesize

                          456KB

                        • memory/2636-142-0x0000000000250000-0x000000000025A000-memory.dmp

                          Filesize

                          40KB

                        • memory/2888-368-0x0000000004D10000-0x0000000004D6E000-memory.dmp

                          Filesize

                          376KB

                        • memory/2888-366-0x0000000004E80000-0x0000000004F86000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/2888-457-0x0000000004D10000-0x0000000004D6E000-memory.dmp

                          Filesize

                          376KB

                        • memory/3136-162-0x0000000004A30000-0x0000000004A40000-memory.dmp

                          Filesize

                          64KB

                        • memory/3136-180-0x00000000049E0000-0x00000000049F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3136-148-0x0000000002250000-0x000000000226A000-memory.dmp

                          Filesize

                          104KB

                        • memory/3136-149-0x0000000004A40000-0x0000000004F3E000-memory.dmp

                          Filesize

                          5.0MB

                        • memory/3136-166-0x00000000049E0000-0x00000000049F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3136-182-0x00000000049E0000-0x00000000049F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3136-150-0x00000000049E0000-0x00000000049F8000-memory.dmp

                          Filesize

                          96KB

                        • memory/3136-151-0x00000000049E0000-0x00000000049F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3136-152-0x00000000049E0000-0x00000000049F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3136-168-0x00000000049E0000-0x00000000049F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3136-170-0x00000000049E0000-0x00000000049F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3136-172-0x00000000049E0000-0x00000000049F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3136-174-0x00000000049E0000-0x00000000049F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3136-176-0x00000000049E0000-0x00000000049F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3136-178-0x00000000049E0000-0x00000000049F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3136-159-0x0000000004A30000-0x0000000004A40000-memory.dmp

                          Filesize

                          64KB

                        • memory/3136-161-0x00000000049E0000-0x00000000049F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3136-164-0x00000000049E0000-0x00000000049F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3136-183-0x0000000000400000-0x00000000004B8000-memory.dmp

                          Filesize

                          736KB

                        • memory/3136-184-0x0000000004A30000-0x0000000004A40000-memory.dmp

                          Filesize

                          64KB

                        • memory/3136-154-0x00000000049E0000-0x00000000049F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3136-156-0x00000000049E0000-0x00000000049F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/3136-157-0x00000000001D0000-0x00000000001FD000-memory.dmp

                          Filesize

                          180KB

                        • memory/3136-188-0x0000000000400000-0x00000000004B8000-memory.dmp

                          Filesize

                          736KB

                        • memory/3136-185-0x0000000004A30000-0x0000000004A40000-memory.dmp

                          Filesize

                          64KB

                        • memory/3136-160-0x0000000004A30000-0x0000000004A40000-memory.dmp

                          Filesize

                          64KB

                        • memory/3136-186-0x0000000004A30000-0x0000000004A40000-memory.dmp

                          Filesize

                          64KB

                        • memory/3248-345-0x0000000005640000-0x0000000005650000-memory.dmp

                          Filesize

                          64KB

                        • memory/3248-474-0x0000000005640000-0x0000000005650000-memory.dmp

                          Filesize

                          64KB

                        • memory/4228-347-0x0000000005110000-0x0000000005120000-memory.dmp

                          Filesize

                          64KB

                        • memory/4228-475-0x0000000005110000-0x0000000005120000-memory.dmp

                          Filesize

                          64KB

                        • memory/4328-477-0x000002827DC40000-0x000002827DCB2000-memory.dmp

                          Filesize

                          456KB

                        • memory/4328-367-0x000002827DC40000-0x000002827DCB2000-memory.dmp

                          Filesize

                          456KB

                        • memory/4328-490-0x0000028200200000-0x000002820021B000-memory.dmp

                          Filesize

                          108KB

                        • memory/4328-376-0x000002827DC40000-0x000002827DCB2000-memory.dmp

                          Filesize

                          456KB

                        • memory/4328-395-0x000002827DC40000-0x000002827DCB2000-memory.dmp

                          Filesize

                          456KB

                        • memory/4328-491-0x0000028200600000-0x000002820070B000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/4328-492-0x0000028200230000-0x0000028200250000-memory.dmp

                          Filesize

                          128KB

                        • memory/4328-493-0x0000028200320000-0x000002820033B000-memory.dmp

                          Filesize

                          108KB

                        • memory/4328-508-0x0000028200600000-0x000002820070B000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/4388-244-0x0000000000EB0000-0x0000000000F96000-memory.dmp

                          Filesize

                          920KB

                        • memory/4388-245-0x0000000005910000-0x0000000005C60000-memory.dmp

                          Filesize

                          3.3MB

                        • memory/4656-197-0x00000000056E0000-0x000000000571E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4656-201-0x0000000006E70000-0x0000000006EE6000-memory.dmp

                          Filesize

                          472KB

                        • memory/4656-206-0x0000000005970000-0x0000000005980000-memory.dmp

                          Filesize

                          64KB

                        • memory/4656-204-0x0000000007810000-0x0000000007D3C000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/4656-203-0x0000000007110000-0x00000000072D2000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/4656-202-0x0000000006EF0000-0x0000000006F40000-memory.dmp

                          Filesize

                          320KB

                        • memory/4656-200-0x0000000005AD0000-0x0000000005B36000-memory.dmp

                          Filesize

                          408KB

                        • memory/4656-192-0x0000000000E20000-0x0000000000E52000-memory.dmp

                          Filesize

                          200KB

                        • memory/4656-193-0x0000000005BE0000-0x00000000061E6000-memory.dmp

                          Filesize

                          6.0MB

                        • memory/4656-194-0x0000000005750000-0x000000000585A000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/4656-195-0x0000000005680000-0x0000000005692000-memory.dmp

                          Filesize

                          72KB

                        • memory/4656-196-0x0000000005970000-0x0000000005980000-memory.dmp

                          Filesize

                          64KB

                        • memory/4656-199-0x0000000005A30000-0x0000000005AC2000-memory.dmp

                          Filesize

                          584KB

                        • memory/4656-198-0x0000000005860000-0x00000000058AB000-memory.dmp

                          Filesize

                          300KB

                        • memory/4964-273-0x0000000000010000-0x0000000000042000-memory.dmp

                          Filesize

                          200KB

                        • memory/4964-288-0x0000000004880000-0x0000000004890000-memory.dmp

                          Filesize

                          64KB

                        • memory/4964-275-0x0000000006F10000-0x0000000006F5B000-memory.dmp

                          Filesize

                          300KB

                        • memory/5004-458-0x00000000056C0000-0x00000000056D0000-memory.dmp

                          Filesize

                          64KB

                        • memory/5004-294-0x0000000000400000-0x0000000000432000-memory.dmp

                          Filesize

                          200KB

                        • memory/5004-310-0x00000000056C0000-0x00000000056D0000-memory.dmp

                          Filesize

                          64KB

                        • memory/5044-389-0x0000000000400000-0x00000000004BD000-memory.dmp

                          Filesize

                          756KB

                        • memory/5044-344-0x0000000000400000-0x00000000004BD000-memory.dmp

                          Filesize

                          756KB

                        • memory/5044-246-0x0000000000590000-0x00000000005CE000-memory.dmp

                          Filesize

                          248KB