Analysis

  • max time kernel
    114s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-04-2023 19:56

General

  • Target

    bd17cf0b20a52cd2e6b8550257854f07.exe

  • Size

    1.1MB

  • MD5

    bd17cf0b20a52cd2e6b8550257854f07

  • SHA1

    054cd955564e51b06b029a8bc27766b13def6e08

  • SHA256

    11ecd9e6c1c28244fe80686c531c851f64c73b288732d53af945159e96fc1065

  • SHA512

    690512d96b7ffa0536ad2997a12fb0ce3e291fda703c913798f0b7732191bd84a071faeccffd8e4a231631f19343b2322e83822387fac3d5227b82f0fbde699c

  • SSDEEP

    24576:6yh2k+ejptvtO2tRkeMqZnQGS0K1apWDDN4uKISgoYZHsQ97:Bya99tgqZnQoKM6mASYb

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

vidar

Version

3.6

Botnet

0759a1598875e73a9bab8e688f841ca2

C2

https://steamcommunity.com/profiles/76561199499188534

https://t.me/nutalse

Attributes
  • profile_id_v2

    0759a1598875e73a9bab8e688f841ca2

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd17cf0b20a52cd2e6b8550257854f07.exe
    "C:\Users\Admin\AppData\Local\Temp\bd17cf0b20a52cd2e6b8550257854f07.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4248
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za043698.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za043698.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za616567.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za616567.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1552
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za387309.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za387309.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1812
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\61027352.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\61027352.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1896
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u44504820.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u44504820.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1484
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 1084
              6⤵
              • Program crash
              PID:1332
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w71gj52.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w71gj52.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2504
          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2148
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:744
            • C:\Users\Admin\AppData\Local\Temp\1000048001\vidars.exe
              "C:\Users\Admin\AppData\Local\Temp\1000048001\vidars.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1320
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"
                7⤵
                  PID:2436
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                  7⤵
                    PID:1944
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"
                    7⤵
                      PID:1860
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"
                      7⤵
                        PID:4616
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"
                        7⤵
                          PID:1132
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe
                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"
                          7⤵
                            PID:4184
                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"
                            7⤵
                              PID:4624
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"
                              7⤵
                              • Loads dropped DLL
                              • Checks processor information in registry
                              • Suspicious behavior: EnumeratesProcesses
                              PID:400
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe" & exit
                                8⤵
                                  PID:2044
                                  • C:\Windows\SysWOW64\timeout.exe
                                    timeout /t 6
                                    9⤵
                                    • Delays execution with timeout.exe
                                    PID:1672
                            • C:\Users\Admin\AppData\Local\Temp\1000049001\vidars.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000049001\vidars.exe"
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:732
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
                                7⤵
                                  PID:4252
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"
                                  7⤵
                                  • Loads dropped DLL
                                  • Checks processor information in registry
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1876
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe" & exit
                                    8⤵
                                      PID:2828
                                      • C:\Windows\SysWOW64\timeout.exe
                                        timeout /t 6
                                        9⤵
                                        • Delays execution with timeout.exe
                                        PID:1640
                                • C:\Windows\SysWOW64\rundll32.exe
                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                  6⤵
                                  • Loads dropped DLL
                                  PID:3684
                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xQqtj16.exe
                            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xQqtj16.exe
                            3⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1736
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 1320
                              4⤵
                              • Program crash
                              PID:1140
                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys220408.exe
                          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys220408.exe
                          2⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2584
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1484 -ip 1484
                        1⤵
                          PID:4612
                        • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
                          C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
                          1⤵
                          • Executes dropped EXE
                          PID:4900
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1736 -ip 1736
                          1⤵
                            PID:904
                          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
                            C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
                            1⤵
                            • Executes dropped EXE
                            PID:224

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Execution

                          Scheduled Task

                          1
                          T1053

                          Persistence

                          Modify Existing Service

                          1
                          T1031

                          Registry Run Keys / Startup Folder

                          1
                          T1060

                          Scheduled Task

                          1
                          T1053

                          Privilege Escalation

                          Scheduled Task

                          1
                          T1053

                          Defense Evasion

                          Modify Registry

                          3
                          T1112

                          Disabling Security Tools

                          2
                          T1089

                          Credential Access

                          Credentials in Files

                          3
                          T1081

                          Discovery

                          Query Registry

                          3
                          T1012

                          System Information Discovery

                          3
                          T1082

                          Collection

                          Data from Local System

                          3
                          T1005

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\ProgramData\38418269460873027674995583
                            Filesize

                            148KB

                            MD5

                            90a1d4b55edf36fa8b4cc6974ed7d4c4

                            SHA1

                            aba1b8d0e05421e7df5982899f626211c3c4b5c1

                            SHA256

                            7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                            SHA512

                            ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                          • C:\ProgramData\65882470603290671801986704
                            Filesize

                            92KB

                            MD5

                            988b3b69326285fe3025cafc08a1bc8b

                            SHA1

                            3cf978d7e8f6281558c2c34fa60d13882edfd81e

                            SHA256

                            0acbaf311f2539bdf907869f7b8e75c614597d7d0084e2073ac002cf7e5437f4

                            SHA512

                            6fcc3acea7bee90489a23f76d4090002a10d8c735174ad90f8641a310717cfceb9b063dc700a88fcb3f9054f0c28b86f31329759f71c8eaf15620cefa87a17d4

                          • C:\ProgramData\89245726103933381454820722
                            Filesize

                            124KB

                            MD5

                            9618e15b04a4ddb39ed6c496575f6f95

                            SHA1

                            1c28f8750e5555776b3c80b187c5d15a443a7412

                            SHA256

                            a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                            SHA512

                            f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                          • C:\ProgramData\99617344308409219213198326
                            Filesize

                            112KB

                            MD5

                            780853cddeaee8de70f28a4b255a600b

                            SHA1

                            ad7a5da33f7ad12946153c497e990720b09005ed

                            SHA256

                            1055ff62de3dea7645c732583242adf4164bdcfb9dd37d9b35bbb9510d59b0a3

                            SHA512

                            e422863112084bb8d11c682482e780cd63c2f20c8e3a93ed3b9efd1b04d53eb5d3c8081851ca89b74d66f3d9ab48eb5f6c74550484f46e7c6e460a8250c9b1d8

                          • C:\ProgramData\freebl3.dll
                            Filesize

                            669KB

                            MD5

                            550686c0ee48c386dfcb40199bd076ac

                            SHA1

                            ee5134da4d3efcb466081fb6197be5e12a5b22ab

                            SHA256

                            edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa

                            SHA512

                            0b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e

                          • C:\ProgramData\mozglue.dll
                            Filesize

                            593KB

                            MD5

                            c8fd9be83bc728cc04beffafc2907fe9

                            SHA1

                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                            SHA256

                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                            SHA512

                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                          • C:\ProgramData\mozglue.dll
                            Filesize

                            593KB

                            MD5

                            c8fd9be83bc728cc04beffafc2907fe9

                            SHA1

                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                            SHA256

                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                            SHA512

                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                          • C:\ProgramData\mozglue.dll
                            Filesize

                            593KB

                            MD5

                            c8fd9be83bc728cc04beffafc2907fe9

                            SHA1

                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                            SHA256

                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                            SHA512

                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                          • C:\ProgramData\mozglue.dll
                            Filesize

                            593KB

                            MD5

                            c8fd9be83bc728cc04beffafc2907fe9

                            SHA1

                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                            SHA256

                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                            SHA512

                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                          • C:\ProgramData\msvcp140.dll
                            Filesize

                            80KB

                            MD5

                            1f7305c508262812f918af61dc8cf7de

                            SHA1

                            a185aab6d5b379f0c708819b30bc098d4688e490

                            SHA256

                            e1085bb0d633c7bb141e1fd7a96132101d4f2de56d8078c2985fc44230755100

                            SHA512

                            3d50f309576cc671959b7897dc45515b947f8581a0297a90cf1ef4d20c2dc5bfb844d212320540d781e72d7b7fa0a22879ad49381e92702ed9904a17967d9d11

                          • C:\ProgramData\nss3.dll
                            Filesize

                            2.0MB

                            MD5

                            1cc453cdf74f31e4d913ff9c10acdde2

                            SHA1

                            6e85eae544d6e965f15fa5c39700fa7202f3aafe

                            SHA256

                            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                            SHA512

                            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                          • C:\ProgramData\nss3.dll
                            Filesize

                            2.0MB

                            MD5

                            1cc453cdf74f31e4d913ff9c10acdde2

                            SHA1

                            6e85eae544d6e965f15fa5c39700fa7202f3aafe

                            SHA256

                            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                            SHA512

                            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                          • C:\ProgramData\nss3.dll
                            Filesize

                            2.0MB

                            MD5

                            1cc453cdf74f31e4d913ff9c10acdde2

                            SHA1

                            6e85eae544d6e965f15fa5c39700fa7202f3aafe

                            SHA256

                            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                            SHA512

                            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                          • C:\ProgramData\nss3.dll
                            Filesize

                            2.0MB

                            MD5

                            1cc453cdf74f31e4d913ff9c10acdde2

                            SHA1

                            6e85eae544d6e965f15fa5c39700fa7202f3aafe

                            SHA256

                            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                            SHA512

                            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                          • C:\ProgramData\softokn3.dll
                            Filesize

                            251KB

                            MD5

                            4e52d739c324db8225bd9ab2695f262f

                            SHA1

                            71c3da43dc5a0d2a1941e874a6d015a071783889

                            SHA256

                            74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a

                            SHA512

                            2d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6

                          • C:\ProgramData\vcruntime140.dll
                            Filesize

                            78KB

                            MD5

                            a37ee36b536409056a86f50e67777dd7

                            SHA1

                            1cafa159292aa736fc595fc04e16325b27cd6750

                            SHA256

                            8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

                            SHA512

                            3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
                            Filesize

                            1KB

                            MD5

                            a26a339a26de8aa4e4984f6554c61073

                            SHA1

                            94119af675e415c4d40f8b8c3651730d3d77222d

                            SHA256

                            0f94571c2d7b080d7694b6db795af7352decdb65cbfe894aa60ba3cf4eb649c0

                            SHA512

                            575f5b3074749fc24a05cf0d102736f1c5e6a313053d123de17209536a2c320862d4e7004a54c6b33ebe057d9a347d62fff2e8bce2d4fee6b6fa65f0d7019937

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\70C71DBB8B7D2BBCA12DF82826D851E0_278EAB15C57802B8465F5CA2986E9B30
                            Filesize

                            1KB

                            MD5

                            c4401bee79bee7514006e0284b7e6b23

                            SHA1

                            6a93c2426162d943c4022f2713e1e8bf24ea321d

                            SHA256

                            0051f0df32eca2bbc48e21d06d375c3554e6e68743e65aded42ac56c7f3fbc0f

                            SHA512

                            fa0fb1ef588dac909fec5b8e9d4e8a9318759b9f6e4ce509efcb8f6c772f32e736989b5c7d147fd8a66645e165b191f037b5315aa804b8d7cc9cdff2cb69c865

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
                            Filesize

                            1KB

                            MD5

                            6ebf74c88037ef604a59fa0f6be37157

                            SHA1

                            db374613568f5c8f948d0c6310b5874e45ca6b40

                            SHA256

                            9ad02969068f71a68e6f1deddd5e32ced477166381e5b9c1033c98e80bfb094d

                            SHA512

                            d782a95e327800bd99dc9827790c19aa826e54a006cdda025555e3f3c719904a0f58b637fc536816b0937258ca9575405a96d715a276b75a882a17093a289262

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
                            Filesize

                            450B

                            MD5

                            d9622fb2b0d56ad7ad2fac2a7a9d607f

                            SHA1

                            07be32164e8b2912d3ed995fb89ceb976d972c38

                            SHA256

                            25041f95c00cdc0867e821a9a9ccb250928b4c5f84ff4665bf923a16530299f0

                            SHA512

                            dfc29af73a0aa28668e0a0b09728dbb9844bd609aa208f0afa6d358cd6558a8fcc7db456613e2d36b657237961de7147dcb6181ba42b00d2cb8bc64750849b72

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\70C71DBB8B7D2BBCA12DF82826D851E0_278EAB15C57802B8465F5CA2986E9B30
                            Filesize

                            474B

                            MD5

                            19bdec3b83b053d87d27acb9d66eb2da

                            SHA1

                            f127d906f2b095c48744e78af321505f9034f52d

                            SHA256

                            3e50a8c6f4273694fe882d35a0141e622dffc57626b7e5701cd71160f0d6c0fc

                            SHA512

                            e37a9a2b6737e6f81b480ccb1931ad58067ad9657aa1aa9f62c0164a4e82cb6726a93f520735e1f5629bedfdd9ea4e9c45c4510ee81fe354513c670ba21b0911

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
                            Filesize

                            458B

                            MD5

                            6c30023c7fbe5ad6656abcb7b660e721

                            SHA1

                            10d73da44a6c601ab600e188d5a73cab3a769d3c

                            SHA256

                            20a2166de0cbfc7fc29892855634e707cdfb3c4052ad34b4232d23a987d506b4

                            SHA512

                            4cbd2c319d63de8e12712fa4fd08e600c9029b71b2b42f8f9196b2d73fa209309e0682e0f7d42276208e2083e0d71e94950179159200757afc7b7ba56fdd2c24

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\vidars.exe.log
                            Filesize

                            425B

                            MD5

                            fff5cbccb6b31b40f834b8f4778a779a

                            SHA1

                            899ed0377e89f1ed434cfeecc5bc0163ebdf0454

                            SHA256

                            b8f7e4ed81764db56b9c09050f68c5a26af78d8a5e2443e75e0e1aa7cd2ccd76

                            SHA512

                            1a188a14c667bc31d2651b220aa762be9cce4a75713217846fbe472a307c7bbc6e3c27617f75f489902a534d9184648d204d03ee956ac57b11aa90551248b8f9

                          • C:\Users\Admin\AppData\Local\Temp\1000048001\vidars.exe
                            Filesize

                            2.6MB

                            MD5

                            4d998d76482527f07e8e4e6af24743f5

                            SHA1

                            a479fd8f41b3522687c33472989ec2c4609ebccf

                            SHA256

                            3c806d0324044d7d2adc3eda60299847e4b896e962b02aa0819ba878792ba854

                            SHA512

                            f275adb524f2b13111f01e5d9658732600dfa6591cf92af69497d19fc4b6b9de77f2bf6f2bc3fdafbc02b6bbe71ca4618600205edcb30da6adeddaab80e0ec4f

                          • C:\Users\Admin\AppData\Local\Temp\1000048001\vidars.exe
                            Filesize

                            2.6MB

                            MD5

                            4d998d76482527f07e8e4e6af24743f5

                            SHA1

                            a479fd8f41b3522687c33472989ec2c4609ebccf

                            SHA256

                            3c806d0324044d7d2adc3eda60299847e4b896e962b02aa0819ba878792ba854

                            SHA512

                            f275adb524f2b13111f01e5d9658732600dfa6591cf92af69497d19fc4b6b9de77f2bf6f2bc3fdafbc02b6bbe71ca4618600205edcb30da6adeddaab80e0ec4f

                          • C:\Users\Admin\AppData\Local\Temp\1000048001\vidars.exe
                            Filesize

                            2.6MB

                            MD5

                            4d998d76482527f07e8e4e6af24743f5

                            SHA1

                            a479fd8f41b3522687c33472989ec2c4609ebccf

                            SHA256

                            3c806d0324044d7d2adc3eda60299847e4b896e962b02aa0819ba878792ba854

                            SHA512

                            f275adb524f2b13111f01e5d9658732600dfa6591cf92af69497d19fc4b6b9de77f2bf6f2bc3fdafbc02b6bbe71ca4618600205edcb30da6adeddaab80e0ec4f

                          • C:\Users\Admin\AppData\Local\Temp\1000049001\vidars.exe
                            Filesize

                            2.6MB

                            MD5

                            4d998d76482527f07e8e4e6af24743f5

                            SHA1

                            a479fd8f41b3522687c33472989ec2c4609ebccf

                            SHA256

                            3c806d0324044d7d2adc3eda60299847e4b896e962b02aa0819ba878792ba854

                            SHA512

                            f275adb524f2b13111f01e5d9658732600dfa6591cf92af69497d19fc4b6b9de77f2bf6f2bc3fdafbc02b6bbe71ca4618600205edcb30da6adeddaab80e0ec4f

                          • C:\Users\Admin\AppData\Local\Temp\1000049001\vidars.exe
                            Filesize

                            2.6MB

                            MD5

                            4d998d76482527f07e8e4e6af24743f5

                            SHA1

                            a479fd8f41b3522687c33472989ec2c4609ebccf

                            SHA256

                            3c806d0324044d7d2adc3eda60299847e4b896e962b02aa0819ba878792ba854

                            SHA512

                            f275adb524f2b13111f01e5d9658732600dfa6591cf92af69497d19fc4b6b9de77f2bf6f2bc3fdafbc02b6bbe71ca4618600205edcb30da6adeddaab80e0ec4f

                          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
                            Filesize

                            229KB

                            MD5

                            3308051ded87b1863a8d92925202c4b3

                            SHA1

                            7834ddc23e7976b07118fb580ae38234466dbdfb

                            SHA256

                            13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

                            SHA512

                            f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

                          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
                            Filesize

                            229KB

                            MD5

                            3308051ded87b1863a8d92925202c4b3

                            SHA1

                            7834ddc23e7976b07118fb580ae38234466dbdfb

                            SHA256

                            13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

                            SHA512

                            f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

                          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
                            Filesize

                            229KB

                            MD5

                            3308051ded87b1863a8d92925202c4b3

                            SHA1

                            7834ddc23e7976b07118fb580ae38234466dbdfb

                            SHA256

                            13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

                            SHA512

                            f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

                          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
                            Filesize

                            229KB

                            MD5

                            3308051ded87b1863a8d92925202c4b3

                            SHA1

                            7834ddc23e7976b07118fb580ae38234466dbdfb

                            SHA256

                            13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

                            SHA512

                            f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

                          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
                            Filesize

                            229KB

                            MD5

                            3308051ded87b1863a8d92925202c4b3

                            SHA1

                            7834ddc23e7976b07118fb580ae38234466dbdfb

                            SHA256

                            13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

                            SHA512

                            f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys220408.exe
                            Filesize

                            136KB

                            MD5

                            726ee8bb300533dd3759fb051fdf9ef0

                            SHA1

                            8456f6874fb45fd254a685d70f58ecb54b12e358

                            SHA256

                            a44348fabb67c594041a971712e3f7070730d73a0e28507342de3e0256776405

                            SHA512

                            7fe60fcfd0f0dcb8c46909eeb382ca099775e56059aeff03416e6549a45e82b40ed1e878460a6976bf734cd5aa6f93ae38da0a62f356b1f23aa138e34a234f97

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ys220408.exe
                            Filesize

                            136KB

                            MD5

                            726ee8bb300533dd3759fb051fdf9ef0

                            SHA1

                            8456f6874fb45fd254a685d70f58ecb54b12e358

                            SHA256

                            a44348fabb67c594041a971712e3f7070730d73a0e28507342de3e0256776405

                            SHA512

                            7fe60fcfd0f0dcb8c46909eeb382ca099775e56059aeff03416e6549a45e82b40ed1e878460a6976bf734cd5aa6f93ae38da0a62f356b1f23aa138e34a234f97

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za043698.exe
                            Filesize

                            1003KB

                            MD5

                            af5d28e19623074845d5f53205e1bb1c

                            SHA1

                            20e797cf39dd577809b0b204ed1b073c56d30ab4

                            SHA256

                            147acf6b378523a7e3649367d5ff108d430f2e0c3372367eaa7a9334487d2588

                            SHA512

                            f30c55c9ea654ac4d225d29229a30968458a7f3191d5af0e142187f312bcee141cbf00bd8ed59c7e3c9dc06ea4cf7c6acee971b4df6e306e1feb2249e7756244

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za043698.exe
                            Filesize

                            1003KB

                            MD5

                            af5d28e19623074845d5f53205e1bb1c

                            SHA1

                            20e797cf39dd577809b0b204ed1b073c56d30ab4

                            SHA256

                            147acf6b378523a7e3649367d5ff108d430f2e0c3372367eaa7a9334487d2588

                            SHA512

                            f30c55c9ea654ac4d225d29229a30968458a7f3191d5af0e142187f312bcee141cbf00bd8ed59c7e3c9dc06ea4cf7c6acee971b4df6e306e1feb2249e7756244

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xQqtj16.exe
                            Filesize

                            415KB

                            MD5

                            cd462a18e87481b3c27b53fd7148aed7

                            SHA1

                            d6b731a104163aa92b8ff3132bda3b090b17202a

                            SHA256

                            d38273c0f00057beb15f3771474c01e837be2c6ed7a6b7e6a66bc7d4dd7aad2c

                            SHA512

                            f28cdae3f07de08316537e48f7fb4ee474942636f91d65c648dd478bcd191c15c44ecae026540b731cad216a65ce70d5cbcb2dd77198095b62ab1f812dcacb4c

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xQqtj16.exe
                            Filesize

                            415KB

                            MD5

                            cd462a18e87481b3c27b53fd7148aed7

                            SHA1

                            d6b731a104163aa92b8ff3132bda3b090b17202a

                            SHA256

                            d38273c0f00057beb15f3771474c01e837be2c6ed7a6b7e6a66bc7d4dd7aad2c

                            SHA512

                            f28cdae3f07de08316537e48f7fb4ee474942636f91d65c648dd478bcd191c15c44ecae026540b731cad216a65ce70d5cbcb2dd77198095b62ab1f812dcacb4c

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za616567.exe
                            Filesize

                            619KB

                            MD5

                            d45e34fc967f0caa7074c0dcf6a3feb1

                            SHA1

                            8002c4be94e302a97b554e79dbfa0af6ea6f3d9c

                            SHA256

                            5d0b857ec896c8fae642836bfaf5a1781af36b9f6c54ca447671c4594a9b198a

                            SHA512

                            6b988f59cdc37332e1f634791754d90ff6e479aa2fa5c5b4065dd8276c0791d0a59cb467d09e6c4f1b409238c2e22098a66bb7a95a1effd01b613db459d3cf05

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za616567.exe
                            Filesize

                            619KB

                            MD5

                            d45e34fc967f0caa7074c0dcf6a3feb1

                            SHA1

                            8002c4be94e302a97b554e79dbfa0af6ea6f3d9c

                            SHA256

                            5d0b857ec896c8fae642836bfaf5a1781af36b9f6c54ca447671c4594a9b198a

                            SHA512

                            6b988f59cdc37332e1f634791754d90ff6e479aa2fa5c5b4065dd8276c0791d0a59cb467d09e6c4f1b409238c2e22098a66bb7a95a1effd01b613db459d3cf05

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w71gj52.exe
                            Filesize

                            229KB

                            MD5

                            3308051ded87b1863a8d92925202c4b3

                            SHA1

                            7834ddc23e7976b07118fb580ae38234466dbdfb

                            SHA256

                            13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

                            SHA512

                            f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w71gj52.exe
                            Filesize

                            229KB

                            MD5

                            3308051ded87b1863a8d92925202c4b3

                            SHA1

                            7834ddc23e7976b07118fb580ae38234466dbdfb

                            SHA256

                            13b4b17671c12fd3f9db5491efb7fb389601b57ac7f89fd78638625c1ef201e4

                            SHA512

                            f8e016a2f9cd7851048811fa2846b1853f175916c32dc593e0c469614e87e4f6b07e3dee1f13c662fe9bb6865dc67837a1ab8036e238202e9353e3120f633ddc

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za387309.exe
                            Filesize

                            437KB

                            MD5

                            5e02236fdc196ab88b19abc4756cb82c

                            SHA1

                            feade9e43111be510f75c5be09ee43dff8c2525c

                            SHA256

                            5f6731a89ba5f37cf15942d06c6b8e6236f5d8c481911487f784815458daa3f2

                            SHA512

                            803b0f507a1c9f64786f38206075dab1dbb80caf6d9f8d8982641795b6e4e98d63e924651fb87f9a12015db10c8b0564bf4f63c058e58e4999545b3b942475c1

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za387309.exe
                            Filesize

                            437KB

                            MD5

                            5e02236fdc196ab88b19abc4756cb82c

                            SHA1

                            feade9e43111be510f75c5be09ee43dff8c2525c

                            SHA256

                            5f6731a89ba5f37cf15942d06c6b8e6236f5d8c481911487f784815458daa3f2

                            SHA512

                            803b0f507a1c9f64786f38206075dab1dbb80caf6d9f8d8982641795b6e4e98d63e924651fb87f9a12015db10c8b0564bf4f63c058e58e4999545b3b942475c1

                          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\61027352.exe
                            Filesize

                            175KB

                            MD5

                            a165b5f6b0a4bdf808b71de57bf9347d

                            SHA1

                            39a7b301e819e386c162a47e046fa384bb5ab437

                            SHA256

                            68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

                            SHA512

                            3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

                          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\61027352.exe
                            Filesize

                            175KB

                            MD5

                            a165b5f6b0a4bdf808b71de57bf9347d

                            SHA1

                            39a7b301e819e386c162a47e046fa384bb5ab437

                            SHA256

                            68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

                            SHA512

                            3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

                          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u44504820.exe
                            Filesize

                            332KB

                            MD5

                            4661b55e70a0ceba2c7419e2c275c280

                            SHA1

                            180c5878c4be5468526edb1bb451d9a6a7c8b97c

                            SHA256

                            937840122c9b96e8c8f4a02f4544f7685f625188e7d1bd647ec81ae39f56a8e5

                            SHA512

                            98a2d1981d1dc5872195c8bb236fc23b141c062a208fe1686c97b0b02e613a5ccc8088993ed414e7505d74b4567e4c37c61b3a8c3b28c2ffdb8693ef49926ae2

                          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u44504820.exe
                            Filesize

                            332KB

                            MD5

                            4661b55e70a0ceba2c7419e2c275c280

                            SHA1

                            180c5878c4be5468526edb1bb451d9a6a7c8b97c

                            SHA256

                            937840122c9b96e8c8f4a02f4544f7685f625188e7d1bd647ec81ae39f56a8e5

                            SHA512

                            98a2d1981d1dc5872195c8bb236fc23b141c062a208fe1686c97b0b02e613a5ccc8088993ed414e7505d74b4567e4c37c61b3a8c3b28c2ffdb8693ef49926ae2

                          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                            Filesize

                            89KB

                            MD5

                            73df88d68a4f5e066784d462788cf695

                            SHA1

                            e4bfed336848d0b622fa464d40cf4bd9222aab3f

                            SHA256

                            f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

                            SHA512

                            64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

                          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                            Filesize

                            89KB

                            MD5

                            73df88d68a4f5e066784d462788cf695

                            SHA1

                            e4bfed336848d0b622fa464d40cf4bd9222aab3f

                            SHA256

                            f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

                            SHA512

                            64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

                          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                            Filesize

                            89KB

                            MD5

                            73df88d68a4f5e066784d462788cf695

                            SHA1

                            e4bfed336848d0b622fa464d40cf4bd9222aab3f

                            SHA256

                            f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f

                            SHA512

                            64c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817

                          • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                            Filesize

                            162B

                            MD5

                            1b7c22a214949975556626d7217e9a39

                            SHA1

                            d01c97e2944166ed23e47e4a62ff471ab8fa031f

                            SHA256

                            340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                            SHA512

                            ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                          • memory/400-1213-0x0000000000400000-0x0000000000490000-memory.dmp
                            Filesize

                            576KB

                          • memory/400-473-0x0000000000400000-0x0000000000490000-memory.dmp
                            Filesize

                            576KB

                          • memory/400-1309-0x0000000000400000-0x0000000000490000-memory.dmp
                            Filesize

                            576KB

                          • memory/732-349-0x00000106EA450000-0x00000106EA451000-memory.dmp
                            Filesize

                            4KB

                          • memory/732-346-0x00000106ED400000-0x00000106ED410000-memory.dmp
                            Filesize

                            64KB

                          • memory/1320-344-0x0000018AA6440000-0x0000018AA6441000-memory.dmp
                            Filesize

                            4KB

                          • memory/1320-279-0x0000018AA5E40000-0x0000018AA60E8000-memory.dmp
                            Filesize

                            2.7MB

                          • memory/1320-342-0x0000018AC14B0000-0x0000018AC14C0000-memory.dmp
                            Filesize

                            64KB

                          • memory/1484-203-0x0000000002480000-0x0000000002492000-memory.dmp
                            Filesize

                            72KB

                          • memory/1484-219-0x0000000002480000-0x0000000002492000-memory.dmp
                            Filesize

                            72KB

                          • memory/1484-236-0x0000000004C80000-0x0000000004C90000-memory.dmp
                            Filesize

                            64KB

                          • memory/1484-235-0x0000000004C80000-0x0000000004C90000-memory.dmp
                            Filesize

                            64KB

                          • memory/1484-234-0x0000000004C80000-0x0000000004C90000-memory.dmp
                            Filesize

                            64KB

                          • memory/1484-200-0x0000000002480000-0x0000000002492000-memory.dmp
                            Filesize

                            72KB

                          • memory/1484-201-0x0000000002480000-0x0000000002492000-memory.dmp
                            Filesize

                            72KB

                          • memory/1484-205-0x0000000002480000-0x0000000002492000-memory.dmp
                            Filesize

                            72KB

                          • memory/1484-207-0x0000000002480000-0x0000000002492000-memory.dmp
                            Filesize

                            72KB

                          • memory/1484-209-0x0000000002480000-0x0000000002492000-memory.dmp
                            Filesize

                            72KB

                          • memory/1484-211-0x0000000002480000-0x0000000002492000-memory.dmp
                            Filesize

                            72KB

                          • memory/1484-213-0x0000000002480000-0x0000000002492000-memory.dmp
                            Filesize

                            72KB

                          • memory/1484-232-0x0000000000400000-0x0000000000466000-memory.dmp
                            Filesize

                            408KB

                          • memory/1484-231-0x0000000004C80000-0x0000000004C90000-memory.dmp
                            Filesize

                            64KB

                          • memory/1484-230-0x0000000004C80000-0x0000000004C90000-memory.dmp
                            Filesize

                            64KB

                          • memory/1484-229-0x0000000004C80000-0x0000000004C90000-memory.dmp
                            Filesize

                            64KB

                          • memory/1484-228-0x00000000005C0000-0x00000000005ED000-memory.dmp
                            Filesize

                            180KB

                          • memory/1484-227-0x0000000002480000-0x0000000002492000-memory.dmp
                            Filesize

                            72KB

                          • memory/1484-225-0x0000000002480000-0x0000000002492000-memory.dmp
                            Filesize

                            72KB

                          • memory/1484-223-0x0000000002480000-0x0000000002492000-memory.dmp
                            Filesize

                            72KB

                          • memory/1484-215-0x0000000002480000-0x0000000002492000-memory.dmp
                            Filesize

                            72KB

                          • memory/1484-217-0x0000000002480000-0x0000000002492000-memory.dmp
                            Filesize

                            72KB

                          • memory/1484-237-0x0000000000400000-0x0000000000466000-memory.dmp
                            Filesize

                            408KB

                          • memory/1484-221-0x0000000002480000-0x0000000002492000-memory.dmp
                            Filesize

                            72KB

                          • memory/1736-284-0x0000000004A50000-0x0000000004A60000-memory.dmp
                            Filesize

                            64KB

                          • memory/1736-1118-0x0000000007BD0000-0x0000000007BE2000-memory.dmp
                            Filesize

                            72KB

                          • memory/1736-1132-0x0000000008010000-0x0000000008076000-memory.dmp
                            Filesize

                            408KB

                          • memory/1736-1133-0x00000000086E0000-0x0000000008772000-memory.dmp
                            Filesize

                            584KB

                          • memory/1736-1134-0x0000000008780000-0x00000000087D0000-memory.dmp
                            Filesize

                            320KB

                          • memory/1736-1135-0x00000000087F0000-0x0000000008866000-memory.dmp
                            Filesize

                            472KB

                          • memory/1736-1148-0x00000000088E0000-0x0000000008AA2000-memory.dmp
                            Filesize

                            1.8MB

                          • memory/1736-1154-0x0000000008AB0000-0x0000000008FDC000-memory.dmp
                            Filesize

                            5.2MB

                          • memory/1736-1156-0x0000000004A50000-0x0000000004A60000-memory.dmp
                            Filesize

                            64KB

                          • memory/1736-1162-0x0000000009050000-0x000000000906E000-memory.dmp
                            Filesize

                            120KB

                          • memory/1736-1119-0x0000000007BF0000-0x0000000007CFA000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/1736-280-0x0000000005010000-0x0000000005045000-memory.dmp
                            Filesize

                            212KB

                          • memory/1736-1210-0x0000000004A50000-0x0000000004A60000-memory.dmp
                            Filesize

                            64KB

                          • memory/1736-1117-0x0000000007510000-0x0000000007B28000-memory.dmp
                            Filesize

                            6.1MB

                          • memory/1736-1122-0x0000000004A50000-0x0000000004A60000-memory.dmp
                            Filesize

                            64KB

                          • memory/1736-281-0x0000000005010000-0x0000000005045000-memory.dmp
                            Filesize

                            212KB

                          • memory/1736-286-0x0000000004A50000-0x0000000004A60000-memory.dmp
                            Filesize

                            64KB

                          • memory/1736-288-0x0000000005010000-0x0000000005045000-memory.dmp
                            Filesize

                            212KB

                          • memory/1736-285-0x0000000005010000-0x0000000005045000-memory.dmp
                            Filesize

                            212KB

                          • memory/1736-1120-0x0000000007D20000-0x0000000007D5C000-memory.dmp
                            Filesize

                            240KB

                          • memory/1736-282-0x0000000000600000-0x0000000000646000-memory.dmp
                            Filesize

                            280KB

                          • memory/1876-1217-0x0000000000400000-0x0000000000490000-memory.dmp
                            Filesize

                            576KB

                          • memory/1876-1214-0x0000000000400000-0x0000000000490000-memory.dmp
                            Filesize

                            576KB

                          • memory/1876-475-0x0000000000400000-0x0000000000490000-memory.dmp
                            Filesize

                            576KB

                          • memory/1896-167-0x0000000004A90000-0x0000000004AA3000-memory.dmp
                            Filesize

                            76KB

                          • memory/1896-179-0x0000000004A90000-0x0000000004AA3000-memory.dmp
                            Filesize

                            76KB

                          • memory/1896-194-0x0000000004BB0000-0x0000000004BC0000-memory.dmp
                            Filesize

                            64KB

                          • memory/1896-162-0x0000000004BB0000-0x0000000004BC0000-memory.dmp
                            Filesize

                            64KB

                          • memory/1896-192-0x0000000004BB0000-0x0000000004BC0000-memory.dmp
                            Filesize

                            64KB

                          • memory/1896-191-0x0000000004A90000-0x0000000004AA3000-memory.dmp
                            Filesize

                            76KB

                          • memory/1896-189-0x0000000004A90000-0x0000000004AA3000-memory.dmp
                            Filesize

                            76KB

                          • memory/1896-187-0x0000000004A90000-0x0000000004AA3000-memory.dmp
                            Filesize

                            76KB

                          • memory/1896-185-0x0000000004A90000-0x0000000004AA3000-memory.dmp
                            Filesize

                            76KB

                          • memory/1896-183-0x0000000004A90000-0x0000000004AA3000-memory.dmp
                            Filesize

                            76KB

                          • memory/1896-181-0x0000000004A90000-0x0000000004AA3000-memory.dmp
                            Filesize

                            76KB

                          • memory/1896-193-0x0000000004BB0000-0x0000000004BC0000-memory.dmp
                            Filesize

                            64KB

                          • memory/1896-177-0x0000000004A90000-0x0000000004AA3000-memory.dmp
                            Filesize

                            76KB

                          • memory/1896-175-0x0000000004A90000-0x0000000004AA3000-memory.dmp
                            Filesize

                            76KB

                          • memory/1896-173-0x0000000004A90000-0x0000000004AA3000-memory.dmp
                            Filesize

                            76KB

                          • memory/1896-171-0x0000000004A90000-0x0000000004AA3000-memory.dmp
                            Filesize

                            76KB

                          • memory/1896-169-0x0000000004A90000-0x0000000004AA3000-memory.dmp
                            Filesize

                            76KB

                          • memory/1896-161-0x0000000004BC0000-0x0000000005164000-memory.dmp
                            Filesize

                            5.6MB

                          • memory/1896-165-0x0000000004A90000-0x0000000004AA3000-memory.dmp
                            Filesize

                            76KB

                          • memory/1896-164-0x0000000004A90000-0x0000000004AA3000-memory.dmp
                            Filesize

                            76KB

                          • memory/1896-163-0x0000000004BB0000-0x0000000004BC0000-memory.dmp
                            Filesize

                            64KB

                          • memory/2584-1222-0x0000000000790000-0x00000000007B8000-memory.dmp
                            Filesize

                            160KB

                          • memory/2584-1223-0x00000000078B0000-0x00000000078C0000-memory.dmp
                            Filesize

                            64KB