Analysis

  • max time kernel
    33s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2023 04:17

General

  • Target

    5dc2948548833ba98a885c0f3de8b41633195d130e721c66ecf3113a8d839454.exe

  • Size

    223KB

  • MD5

    d1c70bef226d28bad069de1fee925c2b

  • SHA1

    883f96a266c1a6b49a7a8809b22b6bde9178c976

  • SHA256

    5dc2948548833ba98a885c0f3de8b41633195d130e721c66ecf3113a8d839454

  • SHA512

    3f0c721fe5d71c3ec4b8745d40dae93a472144cdf2c27c987b1a5b14a9676a0ca469e7e7a012f5b46c211c3980cba3f2cf9cf5a35be0c9825f568895768c3591

  • SSDEEP

    3072:HQjdEwJKHdF0ZowocItyRjLV0srjzhDSP6dhhW4f4uh/InYyEY:wSvQZWvGzxjhhW4f3Zk

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://potunulit.org/

http://hutnilior.net/

http://bulimu55t.net/

http://soryytlic4.net/

http://novanosa5org.org/

http://nuljjjnuli.org/

http://tolilolihul.net/

http://somatoka51hub.net/

http://hujukui3.net/

http://bukubuka1.net/

http://golilopaster.org/

http://newzelannd66.org/

http://otriluyttn.org/

http://aapu.at/tmp/

http://poudineh.com/tmp/

http://firsttrusteedrx.ru/tmp/

http://kingpirate.ru/tmp/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://zexeq.com/test2/get.php

http://zexeq.com/lancer/get.php

Attributes
  • extension

    .jywd

  • offline_id

    MEMHlobHgXqvmTWaMsLcwGZhDOd00bblO1yevst1

  • payload_url

    http://uaery.top/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-fkW8qLaCVQ Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0675JOsie

rsa_pubkey.plain

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

amadey

Version

3.65

C2

77.73.134.27/8bmdh3Slb2/index.php

Extracted

Family

vidar

Version

3.2

Botnet

5df88deb5dde677ba658b77ad5f60248

C2

https://steamcommunity.com/profiles/76561199489580435

https://t.me/tabootalks

Attributes
  • profile_id_v2

    5df88deb5dde677ba658b77ad5f60248

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36 OPR/91.0.4516.79

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detected Djvu ransomware 36 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 8 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5dc2948548833ba98a885c0f3de8b41633195d130e721c66ecf3113a8d839454.exe
    "C:\Users\Admin\AppData\Local\Temp\5dc2948548833ba98a885c0f3de8b41633195d130e721c66ecf3113a8d839454.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4156
  • C:\Users\Admin\AppData\Local\Temp\F61D.exe
    C:\Users\Admin\AppData\Local\Temp\F61D.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Users\Admin\AppData\Local\Temp\F61D.exe
      C:\Users\Admin\AppData\Local\Temp\F61D.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\5e8b1536-29f2-45e2-abd9-09f328a1b5d4" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:2700
      • C:\Users\Admin\AppData\Local\Temp\F61D.exe
        "C:\Users\Admin\AppData\Local\Temp\F61D.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1608
        • C:\Users\Admin\AppData\Local\Temp\F61D.exe
          "C:\Users\Admin\AppData\Local\Temp\F61D.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          PID:3404
          • C:\Users\Admin\AppData\Local\cd652715-aaab-441c-8bf9-852f69a9b9c5\build2.exe
            "C:\Users\Admin\AppData\Local\cd652715-aaab-441c-8bf9-852f69a9b9c5\build2.exe"
            5⤵
              PID:4932
              • C:\Users\Admin\AppData\Local\cd652715-aaab-441c-8bf9-852f69a9b9c5\build2.exe
                "C:\Users\Admin\AppData\Local\cd652715-aaab-441c-8bf9-852f69a9b9c5\build2.exe"
                6⤵
                  PID:2344
              • C:\Users\Admin\AppData\Local\cd652715-aaab-441c-8bf9-852f69a9b9c5\build3.exe
                "C:\Users\Admin\AppData\Local\cd652715-aaab-441c-8bf9-852f69a9b9c5\build3.exe"
                5⤵
                  PID:716
                  • C:\Windows\SysWOW64\schtasks.exe
                    /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                    6⤵
                    • Creates scheduled task(s)
                    PID:2156
        • C:\Users\Admin\AppData\Local\Temp\919.exe
          C:\Users\Admin\AppData\Local\Temp\919.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4532
          • C:\Users\Admin\AppData\Local\Temp\919.exe
            C:\Users\Admin\AppData\Local\Temp\919.exe
            2⤵
            • Executes dropped EXE
            PID:3024
            • C:\Users\Admin\AppData\Local\Temp\919.exe
              "C:\Users\Admin\AppData\Local\Temp\919.exe" --Admin IsNotAutoStart IsNotTask
              3⤵
                PID:4224
                • C:\Users\Admin\AppData\Local\Temp\919.exe
                  "C:\Users\Admin\AppData\Local\Temp\919.exe" --Admin IsNotAutoStart IsNotTask
                  4⤵
                    PID:2076
            • C:\Users\Admin\AppData\Local\Temp\AFE.exe
              C:\Users\Admin\AppData\Local\Temp\AFE.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2108
              • C:\Users\Admin\AppData\Local\Temp\AFE.exe
                C:\Users\Admin\AppData\Local\Temp\AFE.exe
                2⤵
                • Executes dropped EXE
                PID:4764
                • C:\Users\Admin\AppData\Local\Temp\AFE.exe
                  "C:\Users\Admin\AppData\Local\Temp\AFE.exe" --Admin IsNotAutoStart IsNotTask
                  3⤵
                    PID:4440
                    • C:\Users\Admin\AppData\Local\Temp\AFE.exe
                      "C:\Users\Admin\AppData\Local\Temp\AFE.exe" --Admin IsNotAutoStart IsNotTask
                      4⤵
                        PID:4876
                • C:\Users\Admin\AppData\Local\Temp\110B.exe
                  C:\Users\Admin\AppData\Local\Temp\110B.exe
                  1⤵
                  • Executes dropped EXE
                  PID:1428
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 340
                    2⤵
                    • Program crash
                    PID:3168
                • C:\Users\Admin\AppData\Local\Temp\F07.exe
                  C:\Users\Admin\AppData\Local\Temp\F07.exe
                  1⤵
                  • Executes dropped EXE
                  PID:3272
                • C:\Users\Admin\AppData\Local\Temp\2E77.exe
                  C:\Users\Admin\AppData\Local\Temp\2E77.exe
                  1⤵
                    PID:220
                    • C:\Users\Admin\AppData\Local\Temp\ss31.exe
                      "C:\Users\Admin\AppData\Local\Temp\ss31.exe"
                      2⤵
                        PID:4988
                      • C:\Users\Admin\AppData\Local\Temp\XandETC.exe
                        "C:\Users\Admin\AppData\Local\Temp\XandETC.exe"
                        2⤵
                          PID:1960
                        • C:\Users\Admin\AppData\Local\Temp\Player3.exe
                          "C:\Users\Admin\AppData\Local\Temp\Player3.exe"
                          2⤵
                            PID:2176
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1428 -ip 1428
                          1⤵
                            PID:3148
                          • C:\Users\Admin\AppData\Local\Temp\34E1.exe
                            C:\Users\Admin\AppData\Local\Temp\34E1.exe
                            1⤵
                              PID:1692
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 1496
                                2⤵
                                • Program crash
                                PID:1492
                              • C:\Users\Admin\AppData\Local\Temp\Player3.exe
                                "C:\Users\Admin\AppData\Local\Temp\Player3.exe"
                                2⤵
                                  PID:3772
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1692 -ip 1692
                                1⤵
                                  PID:4444
                                • C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe
                                  "C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe"
                                  1⤵
                                    PID:3348

                                  Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\SystemID\PersonalID.txt

                                    Filesize

                                    42B

                                    MD5

                                    7e3e9fcc42d297e9f68ca04b13a9fb44

                                    SHA1

                                    f263e27f040e44de2370f38499296e6dd25d84ff

                                    SHA256

                                    dbf4a18b623d921cef08c6a0959cc2a0d7df484ab0f208553363f901e5f6eed1

                                    SHA512

                                    8dd3e934d8e8acc72ac97f2d87bbda44da0cc78b48e358024840c8bf9fa3d6363b1ccbcd35f21a74a6f2474c681dc01d7c34e4d863212b1f52b5196273aa2cb5

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                    Filesize

                                    2KB

                                    MD5

                                    e5b1cc0ae5af6a8277d75cff4af2c5e8

                                    SHA1

                                    4768fff3d4bbe02f89683b4a0e7b15b24b54eb9f

                                    SHA256

                                    d950c0d748aae641d71b11cd1c519b289917c23bee1a2b6bc5c496fd8e5d4655

                                    SHA512

                                    57a4737deeefac0124d73b52525993fecbbebd21a556ece87f8e79e845e07f037abb5e49f7458e8a010935c6691f18fbb913d77ecfb2ba902067788c483ec3d7

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                    Filesize

                                    1KB

                                    MD5

                                    3adac03b181d7980568dda0da0efc9de

                                    SHA1

                                    a283c4c9bd26a65b8240d21708e57f5946778341

                                    SHA256

                                    24c4973ced938b77d9670ac79eb76cd52411b17ab59ec78ba14c1b433f342933

                                    SHA512

                                    6fbd2a32fc18606628ea56311764cd879a1196405dddd4d269ad6163b2ffdcf916786f1c0328f27ec089be5cb9b4ecb3542363f4dfb3df1c1b91a0e038b67241

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                    Filesize

                                    488B

                                    MD5

                                    9d9ef4c06d5ff0d36f233679ddd1dc1c

                                    SHA1

                                    33fbff8b6dbbc2d971722300307ae278529b90d3

                                    SHA256

                                    36f9f6cdac003ac3b3ffbbdbc802dd529ac11bc44c3588cf0fafbe669f5b6a07

                                    SHA512

                                    704d6399dc760a991334072dc36c211c6a2e9b20a9f67b5ebeee8cbc39dba4eb63a70603f8f496f19305ef24b1b325fb9a58689d98a85b45dfe55fd43f90456d

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                    Filesize

                                    482B

                                    MD5

                                    c6e7da6c6d95fbdc7d87c83d23b41b2e

                                    SHA1

                                    8ccb2ae5f1cf1014db477843b5682e1dcf18d57c

                                    SHA256

                                    b860681e1d67035122f168c8dab5595a45659e4f344d06472827433b4724bd0b

                                    SHA512

                                    86a7e1c29c4c2909f4124b96b6f1e48f722088d999ddd0fffbb4ed0898911cf470812dbcc5596bd3651903ef589b431a520cfcb51cd4cb9b1a471931fcf1c960

                                  • C:\Users\Admin\AppData\Local\5e8b1536-29f2-45e2-abd9-09f328a1b5d4\F61D.exe

                                    Filesize

                                    732KB

                                    MD5

                                    090a387a0f45804c9487b8821c53c023

                                    SHA1

                                    1d10fa390efcf9eb6c54fba2fa18569ad469863b

                                    SHA256

                                    ace948dd93c203ac3f90df58ec7117aa419e67bb7575307baebb97708b8fe617

                                    SHA512

                                    e672bb879e1e9ad771eea82a804b3937fa07b508a09489c958db8aaccddbac52942b62b4bb2697c808c86c7752aba64bd008ef82671d23b1ce71e974c7b6f952

                                  • C:\Users\Admin\AppData\Local\Temp\110B.exe

                                    Filesize

                                    296KB

                                    MD5

                                    3467fc3bbea89d56440835e8e7ef8bbf

                                    SHA1

                                    b92bf60b89e29d282997defd48938cd6293f5f88

                                    SHA256

                                    54b2414e3d0c23491dbf423060fe96e33dad34681f7b55b12be152a0419c306e

                                    SHA512

                                    282951eb7c2e437e586f7c4ef1abd5131eeb4fc80a2477a2c7da97592a751c806a24776a2c992320ceea22bcf89b24b033a43b3712e72e8212fe13fea1284808

                                  • C:\Users\Admin\AppData\Local\Temp\110B.exe

                                    Filesize

                                    296KB

                                    MD5

                                    3467fc3bbea89d56440835e8e7ef8bbf

                                    SHA1

                                    b92bf60b89e29d282997defd48938cd6293f5f88

                                    SHA256

                                    54b2414e3d0c23491dbf423060fe96e33dad34681f7b55b12be152a0419c306e

                                    SHA512

                                    282951eb7c2e437e586f7c4ef1abd5131eeb4fc80a2477a2c7da97592a751c806a24776a2c992320ceea22bcf89b24b033a43b3712e72e8212fe13fea1284808

                                  • C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe

                                    Filesize

                                    244KB

                                    MD5

                                    43a3e1c9723e124a9b495cd474a05dcb

                                    SHA1

                                    d293f427eaa8efc18bb8929a9f54fb61e03bdd89

                                    SHA256

                                    619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab

                                    SHA512

                                    6717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7

                                  • C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe

                                    Filesize

                                    244KB

                                    MD5

                                    43a3e1c9723e124a9b495cd474a05dcb

                                    SHA1

                                    d293f427eaa8efc18bb8929a9f54fb61e03bdd89

                                    SHA256

                                    619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab

                                    SHA512

                                    6717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7

                                  • C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe

                                    Filesize

                                    244KB

                                    MD5

                                    43a3e1c9723e124a9b495cd474a05dcb

                                    SHA1

                                    d293f427eaa8efc18bb8929a9f54fb61e03bdd89

                                    SHA256

                                    619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab

                                    SHA512

                                    6717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7

                                  • C:\Users\Admin\AppData\Local\Temp\2E77.exe

                                    Filesize

                                    4.4MB

                                    MD5

                                    326665e5f77114ea09307e4cd002b82f

                                    SHA1

                                    ae7a70a90eb1e89e91aa8a6cad113c73ee5b826d

                                    SHA256

                                    4244acb6f883e56baebf36785ce5b2c1affc38b46472cd2795df3405d98d2ac0

                                    SHA512

                                    c941b7486fb9dcc6c5a50fc653f8d090654610749e8061af5a4089ea6daf8a3cf807ac866d071c384e437a02b7baf20b6b6958b3a4796b2f63431589fd7f2b37

                                  • C:\Users\Admin\AppData\Local\Temp\2E77.exe

                                    Filesize

                                    4.4MB

                                    MD5

                                    326665e5f77114ea09307e4cd002b82f

                                    SHA1

                                    ae7a70a90eb1e89e91aa8a6cad113c73ee5b826d

                                    SHA256

                                    4244acb6f883e56baebf36785ce5b2c1affc38b46472cd2795df3405d98d2ac0

                                    SHA512

                                    c941b7486fb9dcc6c5a50fc653f8d090654610749e8061af5a4089ea6daf8a3cf807ac866d071c384e437a02b7baf20b6b6958b3a4796b2f63431589fd7f2b37

                                  • C:\Users\Admin\AppData\Local\Temp\34E1.exe

                                    Filesize

                                    4.4MB

                                    MD5

                                    326665e5f77114ea09307e4cd002b82f

                                    SHA1

                                    ae7a70a90eb1e89e91aa8a6cad113c73ee5b826d

                                    SHA256

                                    4244acb6f883e56baebf36785ce5b2c1affc38b46472cd2795df3405d98d2ac0

                                    SHA512

                                    c941b7486fb9dcc6c5a50fc653f8d090654610749e8061af5a4089ea6daf8a3cf807ac866d071c384e437a02b7baf20b6b6958b3a4796b2f63431589fd7f2b37

                                  • C:\Users\Admin\AppData\Local\Temp\34E1.exe

                                    Filesize

                                    4.4MB

                                    MD5

                                    326665e5f77114ea09307e4cd002b82f

                                    SHA1

                                    ae7a70a90eb1e89e91aa8a6cad113c73ee5b826d

                                    SHA256

                                    4244acb6f883e56baebf36785ce5b2c1affc38b46472cd2795df3405d98d2ac0

                                    SHA512

                                    c941b7486fb9dcc6c5a50fc653f8d090654610749e8061af5a4089ea6daf8a3cf807ac866d071c384e437a02b7baf20b6b6958b3a4796b2f63431589fd7f2b37

                                  • C:\Users\Admin\AppData\Local\Temp\919.exe

                                    Filesize

                                    732KB

                                    MD5

                                    090a387a0f45804c9487b8821c53c023

                                    SHA1

                                    1d10fa390efcf9eb6c54fba2fa18569ad469863b

                                    SHA256

                                    ace948dd93c203ac3f90df58ec7117aa419e67bb7575307baebb97708b8fe617

                                    SHA512

                                    e672bb879e1e9ad771eea82a804b3937fa07b508a09489c958db8aaccddbac52942b62b4bb2697c808c86c7752aba64bd008ef82671d23b1ce71e974c7b6f952

                                  • C:\Users\Admin\AppData\Local\Temp\919.exe

                                    Filesize

                                    732KB

                                    MD5

                                    090a387a0f45804c9487b8821c53c023

                                    SHA1

                                    1d10fa390efcf9eb6c54fba2fa18569ad469863b

                                    SHA256

                                    ace948dd93c203ac3f90df58ec7117aa419e67bb7575307baebb97708b8fe617

                                    SHA512

                                    e672bb879e1e9ad771eea82a804b3937fa07b508a09489c958db8aaccddbac52942b62b4bb2697c808c86c7752aba64bd008ef82671d23b1ce71e974c7b6f952

                                  • C:\Users\Admin\AppData\Local\Temp\919.exe

                                    Filesize

                                    732KB

                                    MD5

                                    090a387a0f45804c9487b8821c53c023

                                    SHA1

                                    1d10fa390efcf9eb6c54fba2fa18569ad469863b

                                    SHA256

                                    ace948dd93c203ac3f90df58ec7117aa419e67bb7575307baebb97708b8fe617

                                    SHA512

                                    e672bb879e1e9ad771eea82a804b3937fa07b508a09489c958db8aaccddbac52942b62b4bb2697c808c86c7752aba64bd008ef82671d23b1ce71e974c7b6f952

                                  • C:\Users\Admin\AppData\Local\Temp\919.exe

                                    Filesize

                                    732KB

                                    MD5

                                    090a387a0f45804c9487b8821c53c023

                                    SHA1

                                    1d10fa390efcf9eb6c54fba2fa18569ad469863b

                                    SHA256

                                    ace948dd93c203ac3f90df58ec7117aa419e67bb7575307baebb97708b8fe617

                                    SHA512

                                    e672bb879e1e9ad771eea82a804b3937fa07b508a09489c958db8aaccddbac52942b62b4bb2697c808c86c7752aba64bd008ef82671d23b1ce71e974c7b6f952

                                  • C:\Users\Admin\AppData\Local\Temp\919.exe

                                    Filesize

                                    732KB

                                    MD5

                                    090a387a0f45804c9487b8821c53c023

                                    SHA1

                                    1d10fa390efcf9eb6c54fba2fa18569ad469863b

                                    SHA256

                                    ace948dd93c203ac3f90df58ec7117aa419e67bb7575307baebb97708b8fe617

                                    SHA512

                                    e672bb879e1e9ad771eea82a804b3937fa07b508a09489c958db8aaccddbac52942b62b4bb2697c808c86c7752aba64bd008ef82671d23b1ce71e974c7b6f952

                                  • C:\Users\Admin\AppData\Local\Temp\919.exe

                                    Filesize

                                    732KB

                                    MD5

                                    090a387a0f45804c9487b8821c53c023

                                    SHA1

                                    1d10fa390efcf9eb6c54fba2fa18569ad469863b

                                    SHA256

                                    ace948dd93c203ac3f90df58ec7117aa419e67bb7575307baebb97708b8fe617

                                    SHA512

                                    e672bb879e1e9ad771eea82a804b3937fa07b508a09489c958db8aaccddbac52942b62b4bb2697c808c86c7752aba64bd008ef82671d23b1ce71e974c7b6f952

                                  • C:\Users\Admin\AppData\Local\Temp\AFE.exe

                                    Filesize

                                    778KB

                                    MD5

                                    db02da0bd4f485a875b3f2e3f18b6db9

                                    SHA1

                                    4e165f04718f6d206d506116c8317dfef6c8c4a9

                                    SHA256

                                    7f590012a0dd2499a66ac765c75b567493219733943b52bddddcd486d19a47da

                                    SHA512

                                    83dbe97f4eed593fd25f14fc02a88df2257129a507fc8b73b9f412d03a834404c2ecc5001326b22dd4a114145240a51afe7605a1896e17b66303d344cf295899

                                  • C:\Users\Admin\AppData\Local\Temp\AFE.exe

                                    Filesize

                                    778KB

                                    MD5

                                    db02da0bd4f485a875b3f2e3f18b6db9

                                    SHA1

                                    4e165f04718f6d206d506116c8317dfef6c8c4a9

                                    SHA256

                                    7f590012a0dd2499a66ac765c75b567493219733943b52bddddcd486d19a47da

                                    SHA512

                                    83dbe97f4eed593fd25f14fc02a88df2257129a507fc8b73b9f412d03a834404c2ecc5001326b22dd4a114145240a51afe7605a1896e17b66303d344cf295899

                                  • C:\Users\Admin\AppData\Local\Temp\AFE.exe

                                    Filesize

                                    778KB

                                    MD5

                                    db02da0bd4f485a875b3f2e3f18b6db9

                                    SHA1

                                    4e165f04718f6d206d506116c8317dfef6c8c4a9

                                    SHA256

                                    7f590012a0dd2499a66ac765c75b567493219733943b52bddddcd486d19a47da

                                    SHA512

                                    83dbe97f4eed593fd25f14fc02a88df2257129a507fc8b73b9f412d03a834404c2ecc5001326b22dd4a114145240a51afe7605a1896e17b66303d344cf295899

                                  • C:\Users\Admin\AppData\Local\Temp\AFE.exe

                                    Filesize

                                    778KB

                                    MD5

                                    db02da0bd4f485a875b3f2e3f18b6db9

                                    SHA1

                                    4e165f04718f6d206d506116c8317dfef6c8c4a9

                                    SHA256

                                    7f590012a0dd2499a66ac765c75b567493219733943b52bddddcd486d19a47da

                                    SHA512

                                    83dbe97f4eed593fd25f14fc02a88df2257129a507fc8b73b9f412d03a834404c2ecc5001326b22dd4a114145240a51afe7605a1896e17b66303d344cf295899

                                  • C:\Users\Admin\AppData\Local\Temp\AFE.exe

                                    Filesize

                                    778KB

                                    MD5

                                    db02da0bd4f485a875b3f2e3f18b6db9

                                    SHA1

                                    4e165f04718f6d206d506116c8317dfef6c8c4a9

                                    SHA256

                                    7f590012a0dd2499a66ac765c75b567493219733943b52bddddcd486d19a47da

                                    SHA512

                                    83dbe97f4eed593fd25f14fc02a88df2257129a507fc8b73b9f412d03a834404c2ecc5001326b22dd4a114145240a51afe7605a1896e17b66303d344cf295899

                                  • C:\Users\Admin\AppData\Local\Temp\F07.exe

                                    Filesize

                                    223KB

                                    MD5

                                    756e6f02ed86a420d2446940cc3609b0

                                    SHA1

                                    6ef4a5bbee2155fa2bd0a6448d925b60469caa7f

                                    SHA256

                                    7546b63a4bf979b556f69f162af20ad0fe3ee55662365511842436a9701af98e

                                    SHA512

                                    ab8d3b2706d85c60d079dcf74a276888970493cdfb630cf65f6c0e78b240287b2af0ff68842000cc4bdeb5c7658c34f0e6281e2c069122b1efebe6a1b6d64ee3

                                  • C:\Users\Admin\AppData\Local\Temp\F07.exe

                                    Filesize

                                    223KB

                                    MD5

                                    756e6f02ed86a420d2446940cc3609b0

                                    SHA1

                                    6ef4a5bbee2155fa2bd0a6448d925b60469caa7f

                                    SHA256

                                    7546b63a4bf979b556f69f162af20ad0fe3ee55662365511842436a9701af98e

                                    SHA512

                                    ab8d3b2706d85c60d079dcf74a276888970493cdfb630cf65f6c0e78b240287b2af0ff68842000cc4bdeb5c7658c34f0e6281e2c069122b1efebe6a1b6d64ee3

                                  • C:\Users\Admin\AppData\Local\Temp\F61D.exe

                                    Filesize

                                    732KB

                                    MD5

                                    090a387a0f45804c9487b8821c53c023

                                    SHA1

                                    1d10fa390efcf9eb6c54fba2fa18569ad469863b

                                    SHA256

                                    ace948dd93c203ac3f90df58ec7117aa419e67bb7575307baebb97708b8fe617

                                    SHA512

                                    e672bb879e1e9ad771eea82a804b3937fa07b508a09489c958db8aaccddbac52942b62b4bb2697c808c86c7752aba64bd008ef82671d23b1ce71e974c7b6f952

                                  • C:\Users\Admin\AppData\Local\Temp\F61D.exe

                                    Filesize

                                    732KB

                                    MD5

                                    090a387a0f45804c9487b8821c53c023

                                    SHA1

                                    1d10fa390efcf9eb6c54fba2fa18569ad469863b

                                    SHA256

                                    ace948dd93c203ac3f90df58ec7117aa419e67bb7575307baebb97708b8fe617

                                    SHA512

                                    e672bb879e1e9ad771eea82a804b3937fa07b508a09489c958db8aaccddbac52942b62b4bb2697c808c86c7752aba64bd008ef82671d23b1ce71e974c7b6f952

                                  • C:\Users\Admin\AppData\Local\Temp\F61D.exe

                                    Filesize

                                    732KB

                                    MD5

                                    090a387a0f45804c9487b8821c53c023

                                    SHA1

                                    1d10fa390efcf9eb6c54fba2fa18569ad469863b

                                    SHA256

                                    ace948dd93c203ac3f90df58ec7117aa419e67bb7575307baebb97708b8fe617

                                    SHA512

                                    e672bb879e1e9ad771eea82a804b3937fa07b508a09489c958db8aaccddbac52942b62b4bb2697c808c86c7752aba64bd008ef82671d23b1ce71e974c7b6f952

                                  • C:\Users\Admin\AppData\Local\Temp\F61D.exe

                                    Filesize

                                    732KB

                                    MD5

                                    090a387a0f45804c9487b8821c53c023

                                    SHA1

                                    1d10fa390efcf9eb6c54fba2fa18569ad469863b

                                    SHA256

                                    ace948dd93c203ac3f90df58ec7117aa419e67bb7575307baebb97708b8fe617

                                    SHA512

                                    e672bb879e1e9ad771eea82a804b3937fa07b508a09489c958db8aaccddbac52942b62b4bb2697c808c86c7752aba64bd008ef82671d23b1ce71e974c7b6f952

                                  • C:\Users\Admin\AppData\Local\Temp\F61D.exe

                                    Filesize

                                    732KB

                                    MD5

                                    090a387a0f45804c9487b8821c53c023

                                    SHA1

                                    1d10fa390efcf9eb6c54fba2fa18569ad469863b

                                    SHA256

                                    ace948dd93c203ac3f90df58ec7117aa419e67bb7575307baebb97708b8fe617

                                    SHA512

                                    e672bb879e1e9ad771eea82a804b3937fa07b508a09489c958db8aaccddbac52942b62b4bb2697c808c86c7752aba64bd008ef82671d23b1ce71e974c7b6f952

                                  • C:\Users\Admin\AppData\Local\Temp\Player3.exe

                                    Filesize

                                    244KB

                                    MD5

                                    43a3e1c9723e124a9b495cd474a05dcb

                                    SHA1

                                    d293f427eaa8efc18bb8929a9f54fb61e03bdd89

                                    SHA256

                                    619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab

                                    SHA512

                                    6717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7

                                  • C:\Users\Admin\AppData\Local\Temp\Player3.exe

                                    Filesize

                                    244KB

                                    MD5

                                    43a3e1c9723e124a9b495cd474a05dcb

                                    SHA1

                                    d293f427eaa8efc18bb8929a9f54fb61e03bdd89

                                    SHA256

                                    619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab

                                    SHA512

                                    6717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7

                                  • C:\Users\Admin\AppData\Local\Temp\Player3.exe

                                    Filesize

                                    244KB

                                    MD5

                                    43a3e1c9723e124a9b495cd474a05dcb

                                    SHA1

                                    d293f427eaa8efc18bb8929a9f54fb61e03bdd89

                                    SHA256

                                    619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab

                                    SHA512

                                    6717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7

                                  • C:\Users\Admin\AppData\Local\Temp\Player3.exe

                                    Filesize

                                    244KB

                                    MD5

                                    43a3e1c9723e124a9b495cd474a05dcb

                                    SHA1

                                    d293f427eaa8efc18bb8929a9f54fb61e03bdd89

                                    SHA256

                                    619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab

                                    SHA512

                                    6717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7

                                  • C:\Users\Admin\AppData\Local\Temp\Player3.exe

                                    Filesize

                                    244KB

                                    MD5

                                    43a3e1c9723e124a9b495cd474a05dcb

                                    SHA1

                                    d293f427eaa8efc18bb8929a9f54fb61e03bdd89

                                    SHA256

                                    619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab

                                    SHA512

                                    6717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7

                                  • C:\Users\Admin\AppData\Local\Temp\XandETC.exe

                                    Filesize

                                    3.7MB

                                    MD5

                                    3006b49f3a30a80bb85074c279acc7df

                                    SHA1

                                    728a7a867d13ad0034c29283939d94f0df6c19df

                                    SHA256

                                    f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                                    SHA512

                                    e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                                  • C:\Users\Admin\AppData\Local\Temp\XandETC.exe

                                    Filesize

                                    3.7MB

                                    MD5

                                    3006b49f3a30a80bb85074c279acc7df

                                    SHA1

                                    728a7a867d13ad0034c29283939d94f0df6c19df

                                    SHA256

                                    f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                                    SHA512

                                    e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                                  • C:\Users\Admin\AppData\Local\Temp\ss31.exe

                                    Filesize

                                    417KB

                                    MD5

                                    34ff8af4a01c1dd79149160c41dbcf7c

                                    SHA1

                                    0a439e12ae6cc354b5bae34271a9c8f229014543

                                    SHA256

                                    cb822ab02a16a3e9925643830c692f67cb5cfe127d58e0448d9e925f27f58ba3

                                    SHA512

                                    db1168117cc746cfa415bf463b9d431662dee61c319654567c2d1a845e15ae10b1bc72a5c6de575bdb3f3d736fd565efbaf91971a341837da79f203e357815a3

                                  • C:\Users\Admin\AppData\Local\Temp\ss31.exe

                                    Filesize

                                    417KB

                                    MD5

                                    34ff8af4a01c1dd79149160c41dbcf7c

                                    SHA1

                                    0a439e12ae6cc354b5bae34271a9c8f229014543

                                    SHA256

                                    cb822ab02a16a3e9925643830c692f67cb5cfe127d58e0448d9e925f27f58ba3

                                    SHA512

                                    db1168117cc746cfa415bf463b9d431662dee61c319654567c2d1a845e15ae10b1bc72a5c6de575bdb3f3d736fd565efbaf91971a341837da79f203e357815a3

                                  • C:\Users\Admin\AppData\Local\Temp\ss31.exe

                                    Filesize

                                    417KB

                                    MD5

                                    34ff8af4a01c1dd79149160c41dbcf7c

                                    SHA1

                                    0a439e12ae6cc354b5bae34271a9c8f229014543

                                    SHA256

                                    cb822ab02a16a3e9925643830c692f67cb5cfe127d58e0448d9e925f27f58ba3

                                    SHA512

                                    db1168117cc746cfa415bf463b9d431662dee61c319654567c2d1a845e15ae10b1bc72a5c6de575bdb3f3d736fd565efbaf91971a341837da79f203e357815a3

                                  • C:\Users\Admin\AppData\Local\bowsakkdestx.txt

                                    Filesize

                                    559B

                                    MD5

                                    26f46db1233de6727079d7a2a95ea4b6

                                    SHA1

                                    5e0535394a608411c1a1c6cb1d5b4d6b52e1364d

                                    SHA256

                                    fb1b78c5bdcfedc3c928847a89411870bfd5b69c3c0054db272c84b8d282cdab

                                    SHA512

                                    81cf0bdf4215aa51c93ec0a581d2a35eda53f3d496b9dc4d6c720512b13301639d97bccd5a13570786301b552185a1afab2ea88606a2d536e6895024eaea1b4b

                                  • C:\Users\Admin\AppData\Local\cd652715-aaab-441c-8bf9-852f69a9b9c5\build2.exe

                                    Filesize

                                    416KB

                                    MD5

                                    aa18968e6cfbdc382ada6a3ed2852085

                                    SHA1

                                    4a41fa1a182916d5790aa2071106b3441d64468d

                                    SHA256

                                    c165c8db38ef8dd8c33d103b5ee78e9ddafd8081ff0c7c035fa5251f970e6cfb

                                    SHA512

                                    8ffdacca2b003438fd4874e7c88beedb6ad8cf9cd5b36fda5907751e06a85a829e7d9ce7335fb59590462f78054722bccba511b21db838368c661d993000a845

                                  • C:\Users\Admin\AppData\Local\cd652715-aaab-441c-8bf9-852f69a9b9c5\build2.exe

                                    Filesize

                                    416KB

                                    MD5

                                    aa18968e6cfbdc382ada6a3ed2852085

                                    SHA1

                                    4a41fa1a182916d5790aa2071106b3441d64468d

                                    SHA256

                                    c165c8db38ef8dd8c33d103b5ee78e9ddafd8081ff0c7c035fa5251f970e6cfb

                                    SHA512

                                    8ffdacca2b003438fd4874e7c88beedb6ad8cf9cd5b36fda5907751e06a85a829e7d9ce7335fb59590462f78054722bccba511b21db838368c661d993000a845

                                  • C:\Users\Admin\AppData\Local\cd652715-aaab-441c-8bf9-852f69a9b9c5\build2.exe

                                    Filesize

                                    416KB

                                    MD5

                                    aa18968e6cfbdc382ada6a3ed2852085

                                    SHA1

                                    4a41fa1a182916d5790aa2071106b3441d64468d

                                    SHA256

                                    c165c8db38ef8dd8c33d103b5ee78e9ddafd8081ff0c7c035fa5251f970e6cfb

                                    SHA512

                                    8ffdacca2b003438fd4874e7c88beedb6ad8cf9cd5b36fda5907751e06a85a829e7d9ce7335fb59590462f78054722bccba511b21db838368c661d993000a845

                                  • C:\Users\Admin\AppData\Local\cd652715-aaab-441c-8bf9-852f69a9b9c5\build2.exe

                                    Filesize

                                    416KB

                                    MD5

                                    aa18968e6cfbdc382ada6a3ed2852085

                                    SHA1

                                    4a41fa1a182916d5790aa2071106b3441d64468d

                                    SHA256

                                    c165c8db38ef8dd8c33d103b5ee78e9ddafd8081ff0c7c035fa5251f970e6cfb

                                    SHA512

                                    8ffdacca2b003438fd4874e7c88beedb6ad8cf9cd5b36fda5907751e06a85a829e7d9ce7335fb59590462f78054722bccba511b21db838368c661d993000a845

                                  • C:\Users\Admin\AppData\Local\cd652715-aaab-441c-8bf9-852f69a9b9c5\build3.exe

                                    Filesize

                                    9KB

                                    MD5

                                    9ead10c08e72ae41921191f8db39bc16

                                    SHA1

                                    abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                    SHA256

                                    8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                    SHA512

                                    aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                  • C:\Users\Admin\AppData\Local\cd652715-aaab-441c-8bf9-852f69a9b9c5\build3.exe

                                    Filesize

                                    9KB

                                    MD5

                                    9ead10c08e72ae41921191f8db39bc16

                                    SHA1

                                    abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                    SHA256

                                    8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                    SHA512

                                    aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                  • C:\Users\Admin\AppData\Local\cd652715-aaab-441c-8bf9-852f69a9b9c5\build3.exe

                                    Filesize

                                    9KB

                                    MD5

                                    9ead10c08e72ae41921191f8db39bc16

                                    SHA1

                                    abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                                    SHA256

                                    8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                                    SHA512

                                    aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                                  • C:\Users\Admin\AppData\Roaming\wwsihdi

                                    Filesize

                                    223KB

                                    MD5

                                    756e6f02ed86a420d2446940cc3609b0

                                    SHA1

                                    6ef4a5bbee2155fa2bd0a6448d925b60469caa7f

                                    SHA256

                                    7546b63a4bf979b556f69f162af20ad0fe3ee55662365511842436a9701af98e

                                    SHA512

                                    ab8d3b2706d85c60d079dcf74a276888970493cdfb630cf65f6c0e78b240287b2af0ff68842000cc4bdeb5c7658c34f0e6281e2c069122b1efebe6a1b6d64ee3

                                  • memory/220-258-0x0000000000200000-0x0000000000664000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/1068-167-0x0000000004910000-0x0000000004A2B000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/1428-304-0x0000000000400000-0x0000000002B77000-memory.dmp

                                    Filesize

                                    39.5MB

                                  • memory/1676-179-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1676-166-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1676-164-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1676-168-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1676-169-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/2076-328-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/2076-264-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/2076-324-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/2076-334-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/2076-265-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/2108-215-0x0000000004940000-0x0000000004A5B000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2344-312-0x0000000000400000-0x000000000046C000-memory.dmp

                                    Filesize

                                    432KB

                                  • memory/2344-301-0x0000000000400000-0x000000000046C000-memory.dmp

                                    Filesize

                                    432KB

                                  • memory/2344-303-0x0000000000400000-0x000000000046C000-memory.dmp

                                    Filesize

                                    432KB

                                  • memory/2344-327-0x0000000000400000-0x000000000046C000-memory.dmp

                                    Filesize

                                    432KB

                                  • memory/3024-206-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/3024-231-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/3024-229-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/3024-204-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/3184-147-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-149-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-144-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-145-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-146-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-241-0x0000000008340000-0x0000000008356000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/3184-142-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-135-0x0000000000C30000-0x0000000000C46000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/3184-148-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-143-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-150-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-158-0x0000000002CD0000-0x0000000002CDA000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/3184-141-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-157-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-151-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-140-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-139-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-156-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-155-0x0000000002CA0000-0x0000000002CB0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3184-223-0x0000000002CD0000-0x0000000002CDA000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/3272-243-0x0000000000400000-0x0000000002B66000-memory.dmp

                                    Filesize

                                    39.4MB

                                  • memory/3272-240-0x0000000002CC0000-0x0000000002CC9000-memory.dmp

                                    Filesize

                                    36KB

                                  • memory/3404-335-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/3404-191-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/3404-218-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/3404-213-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/3404-192-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/3404-190-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/3404-185-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/3404-220-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/3404-290-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/3404-255-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/3404-184-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4156-134-0x00000000048A0000-0x00000000048A9000-memory.dmp

                                    Filesize

                                    36KB

                                  • memory/4156-138-0x0000000000400000-0x0000000002B66000-memory.dmp

                                    Filesize

                                    39.4MB

                                  • memory/4764-209-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4764-214-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4764-207-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4764-226-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4764-234-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4876-326-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4876-331-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4876-270-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4876-273-0x0000000000400000-0x0000000000537000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4932-311-0x0000000004810000-0x0000000004867000-memory.dmp

                                    Filesize

                                    348KB