Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/04/2024, 18:41

240425-xbtfwade97 10

23/02/2024, 00:25

240223-aqsrkahd35 10

22/02/2024, 20:52

240222-znqxmafa7x 10

22/02/2024, 17:28

240222-v17zfsdd86 10

22/02/2024, 17:13

240222-vrss6sdc92 10

22/02/2024, 17:01

240222-vjm8qadc33 10

22/02/2024, 15:57

240222-ted9ksce55 10

Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/02/2024, 15:57

General

  • Target

    6958ACC382E71103A0B83D20BBBB37D2.exe

  • Size

    232KB

  • MD5

    6958acc382e71103a0b83d20bbbb37d2

  • SHA1

    65bf64dfcabf7bc83e47ffc4360cda022d4dab34

  • SHA256

    078f586ebb8a22305540fb5982b2521f1b82e4317f286e13bab680fff0a9d164

  • SHA512

    ebfa8b6986630b3502409d38cdff54881e4bce48511c7ba4f027345296c29708112c19ec6c9181c4b0188fa1f5cbe17b3c5d44dc07f33858323c677ef9caaeae

  • SSDEEP

    3072:FdfbYSFlTBL/A9OYh6++4hY7gfv9yPQxAVUmZAzsqvj1letKv/jbNRKCnrQbW:PbYSFH/AYYh9vERVUmSAQj1la9

Malware Config

Extracted

Family

smokeloader

Botnet

tfd5

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://habrafa.com/test1/get.php

Attributes
  • extension

    .lkhy

  • offline_id

    OxV6DGl22io8sqMOW1zCCOlzPiv4f1Vqzw7Y8zt1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://habrafa.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://we.tl/t-uNdL2KHHdy Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0851ASdw

rsa_pubkey.plain

Extracted

Family

vidar

Version

7.9

Botnet

7f6c51bbce50f99b5a632c204a5ec558

C2

https://t.me/hypergog

https://steamcommunity.com/profiles/76561199642171824

Attributes
  • profile_id_v2

    7f6c51bbce50f99b5a632c204a5ec558

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36

Signatures

  • DcRat 5 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Vidar Stealer 5 IoCs
  • Detected Djvu ransomware 14 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 9 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Windows security bypass 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 27 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 5 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6958ACC382E71103A0B83D20BBBB37D2.exe
    "C:\Users\Admin\AppData\Local\Temp\6958ACC382E71103A0B83D20BBBB37D2.exe"
    1⤵
    • DcRat
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2768
  • C:\Windows\system32\cmd.exe
    cmd /c ""C:\Users\Admin\AppData\Local\Temp\ECB0.bat" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\system32\reg.exe
      reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
      2⤵
        PID:2520
    • C:\Users\Admin\AppData\Local\Temp\386F.exe
      C:\Users\Admin\AppData\Local\Temp\386F.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\386F.exe
        C:\Users\Admin\AppData\Local\Temp\386F.exe
        2⤵
        • DcRat
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2436
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\2a5bdfbc-fe67-4016-9470-48e4bc54a82f" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          3⤵
          • Modifies file permissions
          PID:2820
        • C:\Users\Admin\AppData\Local\Temp\386F.exe
          "C:\Users\Admin\AppData\Local\Temp\386F.exe" --Admin IsNotAutoStart IsNotTask
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2232
          • C:\Users\Admin\AppData\Local\Temp\386F.exe
            "C:\Users\Admin\AppData\Local\Temp\386F.exe" --Admin IsNotAutoStart IsNotTask
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2084
            • C:\Users\Admin\AppData\Local\64a48ac9-8419-4191-9713-6f43dfb33641\build2.exe
              "C:\Users\Admin\AppData\Local\64a48ac9-8419-4191-9713-6f43dfb33641\build2.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1016
              • C:\Users\Admin\AppData\Local\64a48ac9-8419-4191-9713-6f43dfb33641\build2.exe
                "C:\Users\Admin\AppData\Local\64a48ac9-8419-4191-9713-6f43dfb33641\build2.exe"
                6⤵
                • Executes dropped EXE
                • Modifies system certificate store
                PID:1492
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 1480
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2336
            • C:\Users\Admin\AppData\Local\64a48ac9-8419-4191-9713-6f43dfb33641\build3.exe
              "C:\Users\Admin\AppData\Local\64a48ac9-8419-4191-9713-6f43dfb33641\build3.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1812
              • C:\Users\Admin\AppData\Local\64a48ac9-8419-4191-9713-6f43dfb33641\build3.exe
                "C:\Users\Admin\AppData\Local\64a48ac9-8419-4191-9713-6f43dfb33641\build3.exe"
                6⤵
                • Executes dropped EXE
                PID:2660
                • C:\Windows\SysWOW64\schtasks.exe
                  /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                  7⤵
                  • DcRat
                  • Creates scheduled task(s)
                  PID:2528
    • C:\Users\Admin\AppData\Local\Temp\7957.exe
      C:\Users\Admin\AppData\Local\Temp\7957.exe
      1⤵
      • Executes dropped EXE
      PID:2620
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 128
        2⤵
        • Loads dropped DLL
        • Program crash
        PID:1160
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\871D.bat" "
      1⤵
        PID:1480
        • C:\Windows\system32\reg.exe
          reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
          2⤵
            PID:2136
        • C:\Users\Admin\AppData\Local\Temp\F7E.exe
          C:\Users\Admin\AppData\Local\Temp\F7E.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2044
          • C:\Users\Admin\AppData\Local\Temp\F7E.exe
            "C:\Users\Admin\AppData\Local\Temp\F7E.exe"
            2⤵
            • Windows security bypass
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Adds Run key to start application
            • Checks for VirtualBox DLLs, possible anti-VM trick
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            PID:1808
            • C:\Windows\system32\cmd.exe
              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
              3⤵
                PID:3000
                • C:\Windows\system32\netsh.exe
                  netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                  4⤵
                  • Modifies Windows Firewall
                  • Modifies data under HKEY_USERS
                  PID:2172
              • C:\Windows\rss\csrss.exe
                C:\Windows\rss\csrss.exe
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies system certificate store
                • Suspicious use of AdjustPrivilegeToken
                PID:1800
                • C:\Windows\system32\schtasks.exe
                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                  4⤵
                  • DcRat
                  • Creates scheduled task(s)
                  PID:2920
                • C:\Windows\system32\schtasks.exe
                  schtasks /delete /tn ScheduledUpdate /f
                  4⤵
                    PID:776
                  • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                    "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Modifies system certificate store
                    PID:1396
                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                    C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                    4⤵
                    • Executes dropped EXE
                    PID:756
            • C:\Users\Admin\AppData\Local\Temp\1952.exe
              C:\Users\Admin\AppData\Local\Temp\1952.exe
              1⤵
              • Executes dropped EXE
              PID:2376
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k move Unlikely Unlikely.bat & Unlikely.bat & exit
                2⤵
                • Loads dropped DLL
                PID:2680
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                  3⤵
                    PID:312
                  • C:\Windows\SysWOW64\tasklist.exe
                    tasklist
                    3⤵
                    • Enumerates processes with tasklist
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2088
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /I "wrsa.exe opssvc.exe"
                    3⤵
                      PID:576
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist
                      3⤵
                      • Enumerates processes with tasklist
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1688
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c md 22141
                      3⤵
                        PID:1364
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c copy /b Here + Td + Passwords + Movements + Cambodia 22141\Upgrades.pif
                        3⤵
                          PID:1460
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c copy /b Meaning 22141\Z
                          3⤵
                            PID:2712
                          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\22141\Upgrades.pif
                            22141\Upgrades.pif 22141\Z
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:2744
                          • C:\Windows\SysWOW64\PING.EXE
                            ping -n 5 127.0.0.1
                            3⤵
                            • Runs ping.exe
                            PID:1920
                      • C:\Windows\system32\makecab.exe
                        "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240222155939.log C:\Windows\Logs\CBS\CbsPersist_20240222155939.cab
                        1⤵
                        • Drops file in Windows directory
                        PID:1804
                      • C:\Users\Admin\AppData\Local\Temp\1E04.exe
                        C:\Users\Admin\AppData\Local\Temp\1E04.exe
                        1⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2592
                      • C:\Windows\system32\taskeng.exe
                        taskeng.exe {DBD5BF41-5DD2-4058-8F1D-F140C77CF6EC} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]
                        1⤵
                          PID:932
                          • C:\Users\Admin\AppData\Roaming\vbssutc
                            C:\Users\Admin\AppData\Roaming\vbssutc
                            2⤵
                            • Executes dropped EXE
                            • Checks SCSI registry key(s)
                            • Suspicious behavior: MapViewOfSection
                            PID:2456
                          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                            C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:788
                            • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                              C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                              3⤵
                              • Executes dropped EXE
                              PID:2172
                              • C:\Windows\SysWOW64\schtasks.exe
                                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                                4⤵
                                • DcRat
                                • Creates scheduled task(s)
                                PID:1204

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                          Filesize

                          1KB

                          MD5

                          04e1c0fb7c50efaf86ba32ac99af0cd4

                          SHA1

                          844aeeaba2b3c0a23a3f3580ee9eafde8eee9aa0

                          SHA256

                          59cd12f0b76ce31550e9068fed1da5c917f8b4361ef4f3c62c9522473162705a

                          SHA512

                          3394f7025fe90250bc8ae1caeba12ec23019a31c1762e5ab757cd874ff33160b1596be9bb079b5641b7476c306c8ebd520fab5f00a0dca06372c67387f21ce40

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                          Filesize

                          724B

                          MD5

                          8202a1cd02e7d69597995cabbe881a12

                          SHA1

                          8858d9d934b7aa9330ee73de6c476acf19929ff6

                          SHA256

                          58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

                          SHA512

                          97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                          Filesize

                          410B

                          MD5

                          8cfc4b11c6c1a77c77a8b92e2e245606

                          SHA1

                          ce72cc4b26895883e361b181d7d128a2a4dc959a

                          SHA256

                          98fe25f849beb04c2398908cf94ddd32fe1fba8758509bf39784614e2e205ee8

                          SHA512

                          2ba0f69cfe43c74daca270898cd6ef388ba6bffd090f5be0299524e6baf6d3649f44619af405ee975847eb199db4e3d4041947be9385c309d1940c1628854f5e

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          44d4b2b3554d34a4de4bfd1f449d3bc1

                          SHA1

                          5f3d051a16867f1a31f9d04710e00bb89588d097

                          SHA256

                          8a03e16d05baf7300a5f166f383061704c77118d0ed2e989deec1a13efc175c4

                          SHA512

                          c7a8ad27681d18d6db627444ac8f3578c44338cd735df829870e4d7584d9a84e0217b1265ea0b363f7885207f711f6c1c6f133204536cb312e1c54d11b187d19

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          e9db2d9ac6d0e8bbf47f330d1ab3183d

                          SHA1

                          336a815cd0a4643bcc9069d1f56195fced2792b3

                          SHA256

                          390680d9df9bc9e05a26d48511ca2d9738b0513ddd10f17ab1a2b92467352ddc

                          SHA512

                          941dc02aee8aa12a5d6693760f8f8e41219478a0c1843c2554ee6214e81f86998db927698aef7e971f991a50771b8fdb0112af25a00036540fb1f9f2b10aae42

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          14bf68be70d3243a2d6e8c6fa0279a88

                          SHA1

                          0dda267957e48ba89498940f6550ce2c656f4278

                          SHA256

                          c487946caf8e7dcd03d2f5d252df4c460ea770660ad1fbffb390aa1e6c7e5a4e

                          SHA512

                          4ed1304a27c6d9f181094eee40c3f73c072ab2fa2db8cfb2ad8cb875f74404bc841bfb6a8d28483e28e64aecf25004dd9f3615414673a5122345bae354dbd557

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                          Filesize

                          392B

                          MD5

                          d32350d7b7e01589827debfe8147a629

                          SHA1

                          4277846e13488f6fe127c0f061448d8b15e425bd

                          SHA256

                          da5e416d313099491f937a03edab205c087f327fb7a34cd443d3cb229877f474

                          SHA512

                          04b149d07501838336d36bf0edbde5ab05e01f4fffcdec431cadcb8d47d74600fc23ba7e16df69a9761071a211215a3536af8bb67809e9a6e259c2dc9dfff990

                        • C:\Users\Admin\AppData\Local\64a48ac9-8419-4191-9713-6f43dfb33641\build3.exe

                          Filesize

                          192KB

                          MD5

                          5c883ef6d1ad03173f30db4fc691d0a7

                          SHA1

                          4007444885a94ad3092e287a196249bc6c1301ef

                          SHA256

                          b1e0b896d1cdbe0cfe16d1d6f604640e2b22aeb144eb411086fa31d2073f316e

                          SHA512

                          125b18de452ee08cc42806f15864bb5429403ca696e385d5fb32d87cde841629e12f0d64c308c8ff7444d36c5da71e75fdc66733418bc886cad6a6e9ba7eb816

                        • C:\Users\Admin\AppData\Local\Temp\1952.exe

                          Filesize

                          415KB

                          MD5

                          0f81629bc70111f74fba07ec424cdfd4

                          SHA1

                          827ce84d850e15dfd34aadbc82bccac6199c219a

                          SHA256

                          1c6276dab0189565566a3ddb34b6e965e90be730005fcfe4eb1679f4b5710d37

                          SHA512

                          8d66b9dc5afd1e7ab77079d123c5d44a7991a75c46890dc7800667639cfa1e1ca81f2fcf0886b2c2bc109e3c22703a18bb7322e7b6d29b37ddaa8e1a0d01b713

                        • C:\Users\Admin\AppData\Local\Temp\1952.exe

                          Filesize

                          353KB

                          MD5

                          790388875e58943ba5d1784587db5b66

                          SHA1

                          f089904c843d22f19e5b4e596befb88bd3041fff

                          SHA256

                          e050b2db6fd3b51463bb2d65fb32f96b2fdaa042c7067e9257352a935807035b

                          SHA512

                          3dcb1bec490ec59447943ea1c505b317a9468d99b2c6b82c676f99d073f2460f0ae78f0bfef1302f966dfbab13fef116b9b2a6494408f353bf8542e7ce7eb54f

                        • C:\Users\Admin\AppData\Local\Temp\1E04.exe

                          Filesize

                          11KB

                          MD5

                          3d3ae7c2eddea19c3146543b95cdda7e

                          SHA1

                          ea36133e7bfc1b57cd8e78a6daf24f59526ceba0

                          SHA256

                          1f2a148765b1ef3247ca4312ea8d1460673744448ebd4559377eabd1ca1702f2

                          SHA512

                          2ee471f0e0423610dbac9f9d472d529d0b9da22f7ca45ae973a80080920f9ac04342051ad16858918ac4bbab48068b16d78d4d177b8a029c21dde509e333c775

                        • C:\Users\Admin\AppData\Local\Temp\386F.exe

                          Filesize

                          666KB

                          MD5

                          5648348e81a70ef7ab40f963b44713f6

                          SHA1

                          3e2d708a95de8e53ba4a6b9359cc0cc6dfcddea7

                          SHA256

                          4bf966f6dd9cb739b073a8bc48f521eb9c35b4f050e799be6eac795fe615263d

                          SHA512

                          899d833a1a43ca6160bfb89775c83a049afaa0e3e8cf48dde112f7de351d307fd194c97ffe3ab0c2e86fc7bb75ed3b3d53b0d95ea1fa80252020153ca4813a8f

                        • C:\Users\Admin\AppData\Local\Temp\386F.exe

                          Filesize

                          663KB

                          MD5

                          4a63d28d3bd5fcb5166030842fc85b87

                          SHA1

                          4bb1c13045bb46ead5099a54f9ff6041e6e071cb

                          SHA256

                          242b5b3e89bbd10b2131dcb88cb032f70c965a616d677a8599eb57af6128b71b

                          SHA512

                          275fbc4e40e1c5718444fb77784000c00a06759b1ac53f55a15bb98b4b5ac7b4a98b48240618d99d227435b272263df93d282c75622000fdd3f5709809591afe

                        • C:\Users\Admin\AppData\Local\Temp\386F.exe

                          Filesize

                          510KB

                          MD5

                          a18e279f98aaaa58539b477e2e3ee8e8

                          SHA1

                          0f23e9dbb4c52463407fbd03b4c81b46eeac5074

                          SHA256

                          9a710d5529063a7fb16e6c1a4fb0eabbba95f783e24bc2cd2acee997459f7084

                          SHA512

                          dadae9fe3fabd62873327a4ea728a76fc5c9dc33db716930e0cbd8e2162cd3513a58549f8b9696d82b7c190677e720f8037ce2dd193d88d02b41d00e4bc13aa4

                        • C:\Users\Admin\AppData\Local\Temp\7957.exe

                          Filesize

                          2.7MB

                          MD5

                          a09dfad823cdcbf527bf15aa92769422

                          SHA1

                          9f1b89154dd4f023c5ab8285a1c7ca628e6a06a7

                          SHA256

                          cd70d31ef5300bdbc9729cd80af1082a1fd089babaf9aa96947d05788749bae9

                          SHA512

                          e5439ce485bdd19ce084d8c3fd698466a4b0b3ab581b98e83cbcf47c9bf2544d01315244fb9f68d080a80f6709198f86bfc7ddbcd4fe8c00134e182c2b093118

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\22141\Upgrades.pif

                          Filesize

                          924KB

                          MD5

                          848164d084384c49937f99d5b894253e

                          SHA1

                          3055ef803eeec4f175ebf120f94125717ee12444

                          SHA256

                          f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3

                          SHA512

                          aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Cambodia

                          Filesize

                          216KB

                          MD5

                          4e9db9155039f5a6a04e16a6a6bfe3b0

                          SHA1

                          b293c7fe05d7e92ce7d9cc6f36940eba14f5d460

                          SHA256

                          bd3cd1801a2c226c63186f6fe3182fff1847609c5d99ca22209c7e9dbdd3db2d

                          SHA512

                          8692e29ec7717ddad30ea365bd4408a178f1d3ff7f7c3535f8ba1545ffdcfe78ae108259d4feb81b1ca819eedf4ef79531103512d29f7fd0fd8146beb14e854a

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Here

                          Filesize

                          227KB

                          MD5

                          1e7e25167c2a8f93c2d176e935b21834

                          SHA1

                          95b93372222ebde1bed0e0efec167bdda7ef04bc

                          SHA256

                          d022378a9b3074cf3fb5ea080588846c0aaadb2112cfd5554a0068e76cdd5736

                          SHA512

                          503f7b6797182ed5f1ef42d3b52b2815e140ebed505fc9b81ee8f920e49c36f379881c1a51afb4b398c9577a583155a0d2c66ca6cdaf303ac9538746571efdb1

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Meaning

                          Filesize

                          577KB

                          MD5

                          a6c58504594ab91fc0ca6102abd10e80

                          SHA1

                          03edc02d3806aa46d5e4c3c1aa8b6cff1b5c80f6

                          SHA256

                          b07a3cb7f4af841db56d43b6d8d35aea563993b8e0ec6d921eab372f637260f7

                          SHA512

                          07d68c06afc66c71b04da74d387536cd800f7dcda422f4b67dbff60ba2b883fa360e9292190655448fc130d1ebbeb31af828ee1ba279f904b2a7e556dbb8f1ea

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Movements

                          Filesize

                          151KB

                          MD5

                          d7563558933a24bd74f0254272cf7830

                          SHA1

                          6982d08318ff2204d3714ce12d68a99b4f726fe7

                          SHA256

                          1b11dc628b44a4982b7b13891fae62471a380eb2973af359655cf65254ac5a7e

                          SHA512

                          fccdc060fd5ddd9b3892f82c343dcd80fdbc1bc24a24c50e9f86a1d917867c2b4189a3d4d6762daf8e9c719b999988a0d568f481c09802c5168010c490fdfcb5

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Passwords

                          Filesize

                          207KB

                          MD5

                          334f84837c9bcece9220e2c979503f68

                          SHA1

                          bdbdc63f1b85f72f8cf487dec6aaeb98e352c283

                          SHA256

                          10dfb698a8c05eff79092b546608c15e7df803d4aa759090509da6d5d96373d7

                          SHA512

                          37c3315a16d9f0e8ab044415a61220e2fa180e6f70f85435de7ccd7d1dcde84a0c13d48f670204e02ba7cfbe892a76f2efa979717b6b2b844a15aea0a845dcbb

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Td

                          Filesize

                          123KB

                          MD5

                          e32d058720e98d0fab73018ce1753b55

                          SHA1

                          f6b431cf3f225c3563591fbec4af922f6bff05d9

                          SHA256

                          1cf7bcef592ee857c079e82d39a1c371868597ee1c33e692556d780b5040b83b

                          SHA512

                          8f259f0f2eccbe01dc4efe5d4ad34a94dcb0b97f20c3f36c6b7e6c24c14a73fbb6aeefc11e76142cdba83f9bf1dd4d0647bcd1ad2d3a6780e063c48d872caa11

                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Unlikely

                          Filesize

                          10KB

                          MD5

                          19bc1bbe515dee767f02d503fa9d2cff

                          SHA1

                          acc900deea8e8eff4e1bda1ac2c89aa70ef0e7f9

                          SHA256

                          51ad4dc19fa436ac00a8b019da9ca49f30dcfe31d9aee0aabbb037fd10bca367

                          SHA512

                          fd0b3d6a867d8c7923d1166f546d4e14db0209df8d13dc46e9d08578ee78d4fc8739638e01f456f542cc383a2d086ed600931a8e889dcb1c4eb93d3cfe3a3dac

                        • C:\Users\Admin\AppData\Local\Temp\Cab4AA7.tmp

                          Filesize

                          65KB

                          MD5

                          ac05d27423a85adc1622c714f2cb6184

                          SHA1

                          b0fe2b1abddb97837ea0195be70ab2ff14d43198

                          SHA256

                          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                          SHA512

                          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                        • C:\Users\Admin\AppData\Local\Temp\ECB0.bat

                          Filesize

                          77B

                          MD5

                          55cc761bf3429324e5a0095cab002113

                          SHA1

                          2cc1ef4542a4e92d4158ab3978425d517fafd16d

                          SHA256

                          d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

                          SHA512

                          33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

                        • C:\Users\Admin\AppData\Local\Temp\F7E.exe

                          Filesize

                          4.1MB

                          MD5

                          c9e01ab6208b39a9f1a1253dca7e89bc

                          SHA1

                          5bcba5cc0dc560772f8026cb6dd4f236acbfd8bb

                          SHA256

                          0e1ccfee9b80ca2c36a53cc104ef5e8d3a702dabbcc1daafecca2a7f7db043b8

                          SHA512

                          4cacf3f7794a8e06ca2da7aaa0bef37009206fde58a5d5ce4326ef84addd7bdbfd7477b437ac6a72fa31023c17e9a7f7079bb0e97ff772d880d090bbb96d1da1

                        • C:\Users\Admin\AppData\Local\Temp\F7E.exe

                          Filesize

                          913KB

                          MD5

                          887ab8d1e93ef061e6c8bb9b7d69d609

                          SHA1

                          f44a86d92f94d84ab35fd3edae2e194efc498744

                          SHA256

                          b3fecd566bd0518e95513607278b57afe6b79ce50b3b37966ec8d7f6e33a5f7d

                          SHA512

                          d497ef963069d7bacbc6ed85eb95c3b89e346f04751b9d006fb224c4d3bfc64609ddb19081404e70da9adf8a62b4b7cebed0042abd466f5ecc5dbb468a5287a5

                        • C:\Users\Admin\AppData\Local\Temp\F7E.exe

                          Filesize

                          129KB

                          MD5

                          51824fe4775131e620f669195052f140

                          SHA1

                          fc4f80342fd1e26fed2a05bfb32ea4592b68a452

                          SHA256

                          e1fe1724035c6f4a0621c70dd2172c3621ee11294b9993d2bf67180f9dbfdb63

                          SHA512

                          a5b5bc48f577a0b51e7f5bd852c7290b61e5a2a26049a3c929203322c8b2da33f6db5f513df6523965342ac61882e2a94050436e70907c9c570b537d4443a307

                        • C:\Users\Admin\AppData\Local\Temp\Tar66C0.tmp

                          Filesize

                          171KB

                          MD5

                          9c0c641c06238516f27941aa1166d427

                          SHA1

                          64cd549fb8cf014fcd9312aa7a5b023847b6c977

                          SHA256

                          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                          SHA512

                          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                        • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

                          Filesize

                          1.8MB

                          MD5

                          c41c3be9c15587a82952179c1c4467e3

                          SHA1

                          4015bd6d980e260c3bf759c37ef1463fd4d88bc2

                          SHA256

                          ab3ca69ff0282d028f4b8460e921d37553e98ebf12c6a9f8c6741875d889e9d3

                          SHA512

                          17c69a1d66c53d82036806e82fe849570052853839eeefde1f9cb4ec5e3628ed7dc3d06d453b9f35fd7cf51abb8006c78322841ad37829d6b87638fc7060f4a5

                        • C:\Windows\rss\csrss.exe

                          Filesize

                          128KB

                          MD5

                          930b4cc39b36524b6ab351b7dc64d7d7

                          SHA1

                          5fe06023c97aa952a0e68f99d826f7e91b425e1e

                          SHA256

                          2fc86747e3b006c2f3e79d73eba67c4d7349d78a14a3cf0c875256278cea418a

                          SHA512

                          bffb8dd35d1adf88fe4d9534d40ebeec1d36f55337887b6960904c252d9da550cada47d372eda44961218926fc8aa530946cf1802dd0b832337359a905c3c1f1

                        • C:\Windows\rss\csrss.exe

                          Filesize

                          838KB

                          MD5

                          f80e509cc96d8724a591774c0239a57f

                          SHA1

                          59281be9066e091e08551230cb967a5242e60ac3

                          SHA256

                          17c24ffd867bc11c5990ac44c49ae2cc3341279bfb4f80c8a32c26184f557b88

                          SHA512

                          9259e093bfde6a725764efdcb8aa57f9f4a0b9de89f654f8af243552ca64450ea72483f12fec9f047a90f3fefb19415d647bf3fc5304f972e6d31e60f27ec903

                        • \Users\Admin\AppData\Local\64a48ac9-8419-4191-9713-6f43dfb33641\build2.exe

                          Filesize

                          334KB

                          MD5

                          c6d3d647baad8a5b93b81d2487f4f072

                          SHA1

                          e9c1105dc41f85d4f7e94d4e004f8427787c8802

                          SHA256

                          7754125653413cfca3bde887fb2a22f0cd5144ec447bb274c69b005861b70a0a

                          SHA512

                          55425dc95161e627e19e17f1bb910f958dade0c2b12da5eaad31159f0e2dc5217ff293c52f39d860d399807d5b4a814f1bb24376c58b40cc171d298282052049

                        • \Users\Admin\AppData\Local\64a48ac9-8419-4191-9713-6f43dfb33641\build3.exe

                          Filesize

                          299KB

                          MD5

                          41b883a061c95e9b9cb17d4ca50de770

                          SHA1

                          1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

                          SHA256

                          fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

                          SHA512

                          cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

                        • \Users\Admin\AppData\Local\Temp\386F.exe

                          Filesize

                          555KB

                          MD5

                          245ff167651a986a8d990a9c43179389

                          SHA1

                          e94c5b646e9f6eced2d531bd6d1499918587d4d4

                          SHA256

                          d9b57420bc9140b61ac48579564a446df435e912d3838509702014c0db775f56

                          SHA512

                          583b91ba6ea719f803ec669fdb635999d742528d76f83dde8a2006483d12f118db97e06a9d93050d467cbcbaf90a9fca03d90844740a9f8b633abee4ddc4d1fd

                        • \Users\Admin\AppData\Local\Temp\7957.exe

                          Filesize

                          2.0MB

                          MD5

                          dc316c79793f2940cb2d0b2a3d34d906

                          SHA1

                          1e1219d3bd665b04628a681a73713dbdec328700

                          SHA256

                          9b6b57ff04e1108412bc31dc24b8ac0b3a6835422b2c0eb51aac85e2e2894734

                          SHA512

                          7edb26fbf62549c9fac4285488c032377e93c92f7fc20a968451e2aa99865d5b7b6a60f6486457ae9c13a815cfcd177e53016173a3bad3f8a5cf11e8b31426f0

                        • \Users\Admin\AppData\Local\Temp\7957.exe

                          Filesize

                          2.5MB

                          MD5

                          f070aab842aa4396e14585d8c283eb0b

                          SHA1

                          1ff3c1de51843c1eb4b0b2472cfe7103f1de9e66

                          SHA256

                          f8a591aa7b4c0300111159db515193bfa7ba091f105c8ee3ee00b06dd08f8f93

                          SHA512

                          0cc3f133a280cff38c8be6c0b09ca06635891f3571c2730bf7ce0995fedb4169219ece8a3936ad2db126862caf43ca790d5f8760f2eb4b199302180defb18583

                        • \Users\Admin\AppData\Local\Temp\7957.exe

                          Filesize

                          2.3MB

                          MD5

                          6412f45985f8316102d85f3b4fa87d94

                          SHA1

                          d58e122e555c2af2dc381a3f270a2441473ef663

                          SHA256

                          d550f5297471b5413a587e5e9fa8875c5d7f79f278113db3c3f14c92697d060a

                          SHA512

                          884ee423f2200fe9d5ad2926e2e01238928a301b311e97921973ba123cc095401c0105644279b74711a662bc064bbddd67bcb77ad95cdbc66f271e573eec2303

                        • \Users\Admin\AppData\Local\Temp\7957.exe

                          Filesize

                          2.2MB

                          MD5

                          be294f38a21d9b4e6eb144e06162d299

                          SHA1

                          4c5537aaa32228fcba8bbcfc02dc4f54112e3b9c

                          SHA256

                          a7e580ad02ed67ddbcb3f8b10262cee44b6054f96a535040f5b13b2f0f768ef6

                          SHA512

                          60dd6c734d632d55ca0d2f0f9baace25e497741f35f009877b426d39f3dffbebb28293ce89be7690be555161179499be38c76c44f875c277b6d388a1aaf3bec3

                        • \Users\Admin\AppData\Local\Temp\7957.exe

                          Filesize

                          1.8MB

                          MD5

                          0a5cbcde409f211f0a74b20899c93642

                          SHA1

                          cb40f721df063ecfd2310453171d97fee4d3041b

                          SHA256

                          14877cc7f69e4b1833530f36c9bd7ba02774ba8b3dfa09efd048e4e6f6c0dd2f

                          SHA512

                          307bd91e52d1680ccad9df593e71ac20326c90603ff8d0f35c83b87bd8b0615d561a892464b67e911a8e4a45fe2a0c5663affeca66d86cc307e746be8126a218

                        • \Users\Admin\AppData\Local\Temp\csrss\patch.exe

                          Filesize

                          1.7MB

                          MD5

                          13aaafe14eb60d6a718230e82c671d57

                          SHA1

                          e039dd924d12f264521b8e689426fb7ca95a0a7b

                          SHA256

                          f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3

                          SHA512

                          ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3

                        • \Users\Admin\AppData\Local\Temp\dbghelp.dll

                          Filesize

                          1.5MB

                          MD5

                          f0616fa8bc54ece07e3107057f74e4db

                          SHA1

                          b33995c4f9a004b7d806c4bb36040ee844781fca

                          SHA256

                          6e58fcf4d763022b1f79a3c448eb2ebd8ad1c15df3acf58416893f1cbc699026

                          SHA512

                          15242e3f5652d7f1d0e31cebadfe2f238ca3222f0e927eb7feb644ab2b3d33132cf2316ee5089324f20f72f1650ad5bb8dd82b96518386ce5b319fb5ceb8313c

                        • \Users\Admin\AppData\Local\Temp\symsrv.dll

                          Filesize

                          163KB

                          MD5

                          5c399d34d8dc01741269ff1f1aca7554

                          SHA1

                          e0ceed500d3cef5558f3f55d33ba9c3a709e8f55

                          SHA256

                          e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f

                          SHA512

                          8ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d

                        • \Windows\rss\csrss.exe

                          Filesize

                          200KB

                          MD5

                          ec49db40704b62847fe17043f0c4d523

                          SHA1

                          781aa33cb6352381dfef0412fcbe9610d0b668dc

                          SHA256

                          617333a54f23391c90cd5ed9ccdb254750a2002a67836f99c1c43d9739ae7c4f

                          SHA512

                          f5f881faacc0aa4f27c7ecedd9d2f03908be13a54574282f3f7b10a890c7f9b2b8e75b85012edd821750a7e889a5bf4850f5c65cc320a1848c422f9210fa79a3

                        • \Windows\rss\csrss.exe

                          Filesize

                          470KB

                          MD5

                          ae231696f3881fbad392e099078f223f

                          SHA1

                          97d4fd4c453ff0545fb14338c122fb67686cb8de

                          SHA256

                          19464fa457d109161bc4f7dca82d33b62d2dab2894900f074e44192638e7353b

                          SHA512

                          2805db3c3a1e0af99f3efce395f9a59922a7580b5c889c92c31739d06fc5a05c76b6076f42056b0199b65299aec5930d45211a126f5a9213b7f98c2982edb1d7

                        • memory/788-657-0x0000000000940000-0x0000000000A40000-memory.dmp

                          Filesize

                          1024KB

                        • memory/1016-107-0x0000000001B90000-0x0000000001BC6000-memory.dmp

                          Filesize

                          216KB

                        • memory/1016-105-0x0000000000260000-0x0000000000360000-memory.dmp

                          Filesize

                          1024KB

                        • memory/1208-4-0x0000000002BC0000-0x0000000002BD6000-memory.dmp

                          Filesize

                          88KB

                        • memory/1252-26-0x00000000008A0000-0x0000000000932000-memory.dmp

                          Filesize

                          584KB

                        • memory/1252-28-0x0000000002100000-0x000000000221B000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1252-27-0x00000000008A0000-0x0000000000932000-memory.dmp

                          Filesize

                          584KB

                        • memory/1396-663-0x00000000004A0000-0x0000000000A88000-memory.dmp

                          Filesize

                          5.9MB

                        • memory/1396-569-0x0000000000620000-0x0000000000C08000-memory.dmp

                          Filesize

                          5.9MB

                        • memory/1396-558-0x00000000004A0000-0x0000000000A88000-memory.dmp

                          Filesize

                          5.9MB

                        • memory/1492-104-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                          Filesize

                          4KB

                        • memory/1492-112-0x0000000000400000-0x0000000000649000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1492-108-0x0000000000400000-0x0000000000649000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1492-111-0x0000000000400000-0x0000000000649000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1492-322-0x0000000000400000-0x0000000000649000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/1800-656-0x0000000000400000-0x0000000000D1C000-memory.dmp

                          Filesize

                          9.1MB

                        • memory/1800-551-0x0000000000400000-0x0000000000D1C000-memory.dmp

                          Filesize

                          9.1MB

                        • memory/1800-549-0x0000000002640000-0x0000000002A38000-memory.dmp

                          Filesize

                          4.0MB

                        • memory/1800-550-0x0000000002A40000-0x000000000332B000-memory.dmp

                          Filesize

                          8.9MB

                        • memory/1808-517-0x0000000002610000-0x0000000002A08000-memory.dmp

                          Filesize

                          4.0MB

                        • memory/1808-519-0x0000000000400000-0x0000000000D1C000-memory.dmp

                          Filesize

                          9.1MB

                        • memory/1808-546-0x0000000000400000-0x0000000000D1C000-memory.dmp

                          Filesize

                          9.1MB

                        • memory/1812-255-0x0000000000930000-0x0000000000A30000-memory.dmp

                          Filesize

                          1024KB

                        • memory/1812-256-0x0000000000220000-0x0000000000224000-memory.dmp

                          Filesize

                          16KB

                        • memory/2044-514-0x0000000000400000-0x0000000000D1C000-memory.dmp

                          Filesize

                          9.1MB

                        • memory/2044-480-0x0000000002890000-0x0000000002C88000-memory.dmp

                          Filesize

                          4.0MB

                        • memory/2044-513-0x0000000002890000-0x0000000002C88000-memory.dmp

                          Filesize

                          4.0MB

                        • memory/2044-515-0x0000000002C90000-0x000000000357B000-memory.dmp

                          Filesize

                          8.9MB

                        • memory/2044-482-0x0000000000400000-0x0000000000D1C000-memory.dmp

                          Filesize

                          9.1MB

                        • memory/2044-481-0x0000000002C90000-0x000000000357B000-memory.dmp

                          Filesize

                          8.9MB

                        • memory/2084-69-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2084-82-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2084-131-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2084-113-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2084-90-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2084-89-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2084-87-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2084-83-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2084-68-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2232-60-0x0000000000220000-0x00000000002B2000-memory.dmp

                          Filesize

                          584KB

                        • memory/2232-61-0x0000000000220000-0x00000000002B2000-memory.dmp

                          Filesize

                          584KB

                        • memory/2436-31-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                          Filesize

                          4KB

                        • memory/2436-33-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2436-58-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2436-37-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2436-36-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2456-630-0x00000000005E0000-0x00000000006E0000-memory.dmp

                          Filesize

                          1024KB

                        • memory/2456-631-0x0000000000400000-0x000000000044A000-memory.dmp

                          Filesize

                          296KB

                        • memory/2456-649-0x0000000000400000-0x000000000044A000-memory.dmp

                          Filesize

                          296KB

                        • memory/2592-588-0x000007FEF52A0000-0x000007FEF5C8C000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/2592-509-0x0000000001150000-0x000000000115A000-memory.dmp

                          Filesize

                          40KB

                        • memory/2592-518-0x0000000000150000-0x00000000001D0000-memory.dmp

                          Filesize

                          512KB

                        • memory/2592-645-0x0000000000150000-0x00000000001D0000-memory.dmp

                          Filesize

                          512KB

                        • memory/2592-512-0x000007FEF52A0000-0x000007FEF5C8C000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/2620-285-0x00000000000B0000-0x00000000000B1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-350-0x00000000775AF000-0x00000000775B0000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-270-0x0000000000310000-0x0000000000DE7000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2620-274-0x0000000000090000-0x0000000000091000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-298-0x00000000775AF000-0x00000000775B0000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-275-0x00000000775AF000-0x00000000775B0000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-271-0x0000000000080000-0x0000000000081000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-277-0x0000000000090000-0x0000000000091000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-268-0x0000000000080000-0x0000000000081000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-308-0x00000000775AF000-0x00000000775B0000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-293-0x0000000000140000-0x0000000000141000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-323-0x00000000775AF000-0x00000000775B0000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-328-0x00000000775AF000-0x00000000775B0000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-251-0x0000000000310000-0x0000000000DE7000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2620-279-0x0000000000090000-0x0000000000091000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-284-0x00000000000A0000-0x00000000000A1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-333-0x00000000775AF000-0x00000000775B0000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-282-0x00000000000A0000-0x00000000000A1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-280-0x00000000000A0000-0x00000000000A1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-296-0x00000000775AF000-0x00000000775B0000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-287-0x00000000000B0000-0x00000000000B1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-289-0x00000000000B0000-0x00000000000B1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-290-0x0000000000140000-0x0000000000141000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-291-0x00000000775B0000-0x00000000775B1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-379-0x0000000000E20000-0x0000000000E21000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-377-0x00000000775AF000-0x00000000775B0000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-364-0x00000000775AF000-0x00000000775B0000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-363-0x0000000000310000-0x0000000000DE7000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2620-273-0x0000000000080000-0x0000000000081000-memory.dmp

                          Filesize

                          4KB

                        • memory/2620-339-0x00000000775B0000-0x00000000775B1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2660-259-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                          Filesize

                          4KB

                        • memory/2660-265-0x0000000000400000-0x0000000000406000-memory.dmp

                          Filesize

                          24KB

                        • memory/2660-266-0x0000000000400000-0x0000000000406000-memory.dmp

                          Filesize

                          24KB

                        • memory/2660-262-0x0000000000400000-0x0000000000406000-memory.dmp

                          Filesize

                          24KB

                        • memory/2744-533-0x00000000775A0000-0x0000000077676000-memory.dmp

                          Filesize

                          856KB

                        • memory/2768-1-0x0000000000290000-0x0000000000390000-memory.dmp

                          Filesize

                          1024KB

                        • memory/2768-5-0x0000000000400000-0x000000000044A000-memory.dmp

                          Filesize

                          296KB

                        • memory/2768-3-0x0000000000400000-0x000000000044A000-memory.dmp

                          Filesize

                          296KB

                        • memory/2768-2-0x00000000001C0000-0x00000000001CB000-memory.dmp

                          Filesize

                          44KB