Analysis

  • max time kernel
    124s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2024 05:59

General

  • Target

    tmp.exe

  • Size

    1.9MB

  • MD5

    3754420df3c482019cd40c7796daafc7

  • SHA1

    e41398638097b43c7bc923fe860826958a0b713d

  • SHA256

    b2c50730f7eb0d32be9d21cf1974c0581bf617de03c3f8afb0548bcebf0eccb2

  • SHA512

    709a185f2ee077b334a1da62c37bf5fa8dcf6a218e7ab4c79498f7ec3b9a44e9c073e30bb9057f2aac35429367909e7e66f190c5c492dc1c86052502ae99843c

  • SSDEEP

    49152:n27wrlvBU7wbExyf3KC3O3oHTpciOL/ik:n+cla0bE0/KCe3sqF

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 8 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 10 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:228
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4912
      • C:\Users\Admin\AppData\Local\Temp\1000022001\b09c94c1de.exe
        "C:\Users\Admin\AppData\Local\Temp\1000022001\b09c94c1de.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        PID:984
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1332
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4468
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            5⤵
              PID:3084
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\904519900954_Desktop.zip' -CompressionLevel Optimal
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4688
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:1332
        • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
          "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
          3⤵
            PID:5156
          • C:\Users\Admin\AppData\Local\Temp\1000036001\lumma21.exe
            "C:\Users\Admin\AppData\Local\Temp\1000036001\lumma21.exe"
            3⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            PID:5228
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3956 --field-trial-handle=2588,i,4353937220825226770,7138584070663735671,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:5532
        • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
          C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
          1⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3296
          • C:\Users\Admin\AppData\Local\Temp\1000087001\amadka.exe
            "C:\Users\Admin\AppData\Local\Temp\1000087001\amadka.exe"
            2⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:5368
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
            2⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:5960
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
              3⤵
              • Blocklisted process makes network request
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:5980
              • C:\Windows\system32\netsh.exe
                netsh wlan show profiles
                4⤵
                  PID:6008
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\904519900954_Desktop.zip' -CompressionLevel Optimal
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4768
            • C:\Users\Admin\AppData\Local\Temp\1000091001\un300un.exe
              "C:\Users\Admin\AppData\Local\Temp\1000091001\un300un.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:5396
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                3⤵
                  PID:3208
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
                  3⤵
                  • Drops startup file
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5552
                  • C:\Users\Admin\Pictures\fAyDZWvOJZFCwh7ygXnfATaV.exe
                    "C:\Users\Admin\Pictures\fAyDZWvOJZFCwh7ygXnfATaV.exe"
                    4⤵
                      PID:5952
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        5⤵
                          PID:6008
                      • C:\Users\Admin\Pictures\G6yhNRQzZNzJBDLTE2qUqy3i.exe
                        "C:\Users\Admin\Pictures\G6yhNRQzZNzJBDLTE2qUqy3i.exe"
                        4⤵
                          PID:6032
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            5⤵
                              PID:5976
                          • C:\Users\Admin\Pictures\Dxd3tHT5HWtUwXZxgjY72r2w.exe
                            "C:\Users\Admin\Pictures\Dxd3tHT5HWtUwXZxgjY72r2w.exe"
                            4⤵
                              PID:6068
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                5⤵
                                  PID:2688
                              • C:\Users\Admin\Pictures\tD55kjy3daziS55rtxlU73zs.exe
                                "C:\Users\Admin\Pictures\tD55kjy3daziS55rtxlU73zs.exe"
                                4⤵
                                  PID:2380
                                • C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe
                                  "C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe" --silent --allusers=0
                                  4⤵
                                    PID:5628
                                    • C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe
                                      C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x2e0,0x2e4,0x2e8,0x2bc,0x2ec,0x6e9f21f8,0x6e9f2204,0x6e9f2210
                                      5⤵
                                        PID:5928
                                      • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\FH22Hd0WmOKVz4QM2q1UeYOn.exe
                                        "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\FH22Hd0WmOKVz4QM2q1UeYOn.exe" --version
                                        5⤵
                                          PID:1612
                                        • C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe
                                          "C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=5628 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240326060141" --session-guid=db00fa51-afcf-4f9b-ba70-72493bab0d51 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=A005000000000000
                                          5⤵
                                            PID:5836
                                            • C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe
                                              C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x2ec,0x2f0,0x2f4,0x2bc,0x2f8,0x6de821f8,0x6de82204,0x6de82210
                                              6⤵
                                                PID:5492
                                          • C:\Users\Admin\Pictures\8H7rsN84Pk3pB7ASPY6POqSw.exe
                                            "C:\Users\Admin\Pictures\8H7rsN84Pk3pB7ASPY6POqSw.exe"
                                            4⤵
                                              PID:3480
                                              • C:\Users\Admin\AppData\Local\Temp\7zSBA9C.tmp\Install.exe
                                                .\Install.exe
                                                5⤵
                                                  PID:6064
                                          • C:\Windows\SysWOW64\rundll32.exe
                                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                                            2⤵
                                            • Blocklisted process makes network request
                                            • Loads dropped DLL
                                            PID:5364
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                          1⤵
                                            PID:2952
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                            1⤵
                                              PID:5484

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                              Filesize

                                              3KB

                                              MD5

                                              fe3aab3ae544a134b68e881b82b70169

                                              SHA1

                                              926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6

                                              SHA256

                                              bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b

                                              SHA512

                                              3fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              1KB

                                              MD5

                                              4b6a25a6c2228d5e8c6d21de29f7ab9b

                                              SHA1

                                              08b46ff30e31bb8b32ed835458f40885d5f3f305

                                              SHA256

                                              a2ac48e136a9d05230a7710bf2a0777dc5537066ba16a4dd0cc5f904040677e7

                                              SHA512

                                              c67ac96967fcd644d2c6c27de99bda74e05adf169a10b0126af3558f71ec019882df92a554e9fdd368eed797a3c27b2afb409a681e9c35ae879ad93ee08cad7a

                                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              e5445a597f28eba93d9d31d4ff0a09ce

                                              SHA1

                                              22015fe3e6efbc8eb8567fbca07fb909f459c9cf

                                              SHA256

                                              013eede914b541f29a58db80fbfb690160273e8df9a722ddc474e3924759e1c6

                                              SHA512

                                              bf1102741e1325e74bdc4b21b5b1cbffd6f7d1cdba5b852f392496ca44aa6bb293a48ea77d5c3b5ee34cf5b1a034fe48d3adf81465c5a3e5f60fb36e855dd074

                                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                              Filesize

                                              832KB

                                              MD5

                                              43624c35f8fbd2e0e228fb08db9cdbc2

                                              SHA1

                                              3188ca6fa612026168b4bbafcec2e7c920bcbe5b

                                              SHA256

                                              34f31c9c98f43fffe0ebdf8cd177ca7842e14b5f261cd2c6364e8047a6c17e82

                                              SHA512

                                              26169d7492ac8bb92d6e23eb21e01930bfcff2eccec405031bdd076971e27f0ffb0b224da70ead0e01f34d7578ee8472413dca9c6e74337baf5bf33f3b63ca1e

                                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                              Filesize

                                              640KB

                                              MD5

                                              34c0458fc7eee3686c2936f4a30dd062

                                              SHA1

                                              be2e2c95a80aa0fd7944dad71e383c0a5b41564b

                                              SHA256

                                              e421f92324dd47519646a1c12ff34539922a19d7c723f478cb8535f356143546

                                              SHA512

                                              3cf6f1bd3f1a724697bf7968110837eefb66b81df9afc274761e6760945353f47d6360e36401fb80869d69dea734beb76993d052827a519809603d79fedc33e1

                                            • C:\Users\Admin\AppData\Local\Temp\1000022001\b09c94c1de.exe

                                              Filesize

                                              3.0MB

                                              MD5

                                              d55881f086622bc20fbee8894ba6c8c2

                                              SHA1

                                              784eb93766dccfdadb20454e3e2c45d5487a2c46

                                              SHA256

                                              8c24e831b99c3e28ae83a9666d873196118ca4487b7a758d8d8ce7692ca5fd90

                                              SHA512

                                              58dfdb2f153a81e6b0e6043ab95eb82ef218856005eb508980d2a9731131c76fa4ec0e55063ff4f737882678855cafaaa09b5b66bfb703274d1472ec1725f120

                                            • C:\Users\Admin\AppData\Local\Temp\1000036001\lumma21.exe

                                              Filesize

                                              413KB

                                              MD5

                                              d467222c3bd563cb72fa49302f80b079

                                              SHA1

                                              9335e2a36abb8309d8a2075faf78d66b968b2a91

                                              SHA256

                                              fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e

                                              SHA512

                                              484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7

                                            • C:\Users\Admin\AppData\Local\Temp\1000087001\amadka.exe

                                              Filesize

                                              1.9MB

                                              MD5

                                              3754420df3c482019cd40c7796daafc7

                                              SHA1

                                              e41398638097b43c7bc923fe860826958a0b713d

                                              SHA256

                                              b2c50730f7eb0d32be9d21cf1974c0581bf617de03c3f8afb0548bcebf0eccb2

                                              SHA512

                                              709a185f2ee077b334a1da62c37bf5fa8dcf6a218e7ab4c79498f7ec3b9a44e9c073e30bb9057f2aac35429367909e7e66f190c5c492dc1c86052502ae99843c

                                            • C:\Users\Admin\AppData\Local\Temp\1000091001\un300un.exe

                                              Filesize

                                              4.1MB

                                              MD5

                                              8803d74d52bcda67e9b889bd6cc5823e

                                              SHA1

                                              884a1fa1ae3d53bc435d34f912c0068e789a8b25

                                              SHA256

                                              627e36dea92cbdd49fcee34c18a29884010a72b5b004c89df90c19a50303a2b3

                                              SHA512

                                              c190ca373875789477a755f6246565bc7cb5744f1d5f62037e71d3595c1023f587f34a2437d9691ad96cde789026b7c2896110935e58cc2f1498cfea5d0d9564

                                            • C:\Users\Admin\AppData\Local\Temp\7zSBA9C.tmp\Install.exe

                                              Filesize

                                              512KB

                                              MD5

                                              18c829a8709c8aec1640bdd90345c031

                                              SHA1

                                              bbe99609a805090d8c91acadaa0b65076d089dc0

                                              SHA256

                                              0acdeb10389a208a5e548900b11ae1fe21e8f4e37dcd6f2ec64d4b1d116570b9

                                              SHA512

                                              f688640abcc9ab5625f8a6c26b336ca958e43cc61258fe312b2d1b84feed93e29d9d159f4faa9834bd6d22771cbafd6b314107885113a2aacf8c52c481e8f178

                                            • C:\Users\Admin\AppData\Local\Temp\7zSBA9C.tmp\Install.exe

                                              Filesize

                                              448KB

                                              MD5

                                              fc2dc82d1215c5dd23144cfed98495a4

                                              SHA1

                                              e30c79eca42733ac847d953407f68c086e054426

                                              SHA256

                                              ccb44a306575d5caea07efa38f4598631a68f041c180e2992966a6d406534271

                                              SHA512

                                              ad0114bfa6ae3e841205398ae541d74b75a2464b9708a8e14369045d81da1b106e372204b58b01856250cea406c2bd7601c29ee75563fffb49c1dece05b1854e

                                            • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403260601365525628.dll

                                              Filesize

                                              1.5MB

                                              MD5

                                              6e955e77535a4e3bf6c5176033e8bdd2

                                              SHA1

                                              5d2626b438ca9298ef5e33d9ba696241ec8666ff

                                              SHA256

                                              5570a7d8113978ec69073550f478f4b092023de1dfc4cbc1bf86c24a81de7b4c

                                              SHA512

                                              62eff301d672dd604a226194849cecb567fa150f4a007eb456b7d8fbf634293cbe9a2ea73e57cae36368ce2b174b2833b35b9387ccbb4c8faf03b5575c9cebdd

                                            • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403260601391025928.dll

                                              Filesize

                                              832KB

                                              MD5

                                              0d90a0ba773a43519b34d084159bbc14

                                              SHA1

                                              a2d094ebd67afcdea9a5b497a32d5ecaabf6e693

                                              SHA256

                                              f2a7e9e90bbcd814f3589566966a788c2c346351c21feccf06ece2b99151a82f

                                              SHA512

                                              8270746e68288d92a0f319abffffb3dacfaa3ae38e0196ff0cc7531ec091f368a51ddcc6c5cb14439dc268521151011aa6464068a9bfd69aa7e9b8c24569af1d

                                            • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403260601407371612.dll

                                              Filesize

                                              704KB

                                              MD5

                                              244df5e7fa5827d24cb2d3b807e1606e

                                              SHA1

                                              8a1d65eeb2d83e061470693fb036df427701aa55

                                              SHA256

                                              b5b7588484cbb69db1487f73dd8d65812a7106d239c3db8a04fc17994e16ee41

                                              SHA512

                                              37cd44e73768eff61c29ac7a7396be460882c982ba2a4e06b1678a1f627b4e98a8382cc6e3890ffad532732cb8bcb6fd7f33a8ce72539f77b1dd7597c57ca087

                                            • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403260601407371612.dll

                                              Filesize

                                              1.2MB

                                              MD5

                                              9a1ac4b43850b6cc1cb95961f89967e1

                                              SHA1

                                              46edc29fed3677ac0cf35b68522c05fc431fada8

                                              SHA256

                                              6332121f144a6a5f2de21bf664d07bb6b912450b27fa96db86a413d95cba65bb

                                              SHA512

                                              48f2c013a683ca0fbb03394e1e0430a9ff3b98e8a249c375c9078c6addca3ea9a3110115ddfc33fc5ac38d2ea6e9c8238b722bf14f9d9d5db564073e6c1e4ece

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hdirxo5q.xn4.ps1

                                              Filesize

                                              60B

                                              MD5

                                              d17fe0a3f47be24a6453e9ef58c94641

                                              SHA1

                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                              SHA256

                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                              SHA512

                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                            • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                                              Filesize

                                              40B

                                              MD5

                                              4a1b32afe5733facf7cde500f446cfd8

                                              SHA1

                                              b9b29fb49b0601e88c8ae95df1e3e5e1317a8a27

                                              SHA256

                                              86c10ea7a73c1d8e9efb2ddc63a4fc02b0ed7f3ae9474316b8a1aca102804094

                                              SHA512

                                              fdca965f0349c0d16670a84ee7785965d70ff03cdd2a133a0e879991fc6b6b66a9ab63cd6158ef190098ed7e6e68726893aa1c52888b5e75364698250592ca86

                                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                              Filesize

                                              109KB

                                              MD5

                                              726cd06231883a159ec1ce28dd538699

                                              SHA1

                                              404897e6a133d255ad5a9c26ac6414d7134285a2

                                              SHA256

                                              12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                              SHA512

                                              9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                              Filesize

                                              1.2MB

                                              MD5

                                              15a42d3e4579da615a384c717ab2109b

                                              SHA1

                                              22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                              SHA256

                                              3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                              SHA512

                                              1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                            • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                              Filesize

                                              109KB

                                              MD5

                                              154c3f1334dd435f562672f2664fea6b

                                              SHA1

                                              51dd25e2ba98b8546de163b8f26e2972a90c2c79

                                              SHA256

                                              5f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f

                                              SHA512

                                              1bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841

                                            • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                                              Filesize

                                              1.2MB

                                              MD5

                                              f35b671fda2603ec30ace10946f11a90

                                              SHA1

                                              059ad6b06559d4db581b1879e709f32f80850872

                                              SHA256

                                              83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7

                                              SHA512

                                              b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

                                            • C:\Users\Admin\Pictures\8H7rsN84Pk3pB7ASPY6POqSw.exe

                                              Filesize

                                              448KB

                                              MD5

                                              73843fa0154657d4b7e6db302678c8b7

                                              SHA1

                                              602614c460144e6174384e928b44ea1bacd79d82

                                              SHA256

                                              d9950fd93a1af569900a29357a66d07b6f000f40c4549351100c65fc4705d06b

                                              SHA512

                                              7f578997a56abf1d3447c9361bccb6f4160e12a672f21db3bc2ad72b2b1aad57ded9d20c94c8f8dc1cb69db9fe61a8d54f40da375c22015b076e181013422d91

                                            • C:\Users\Admin\Pictures\8H7rsN84Pk3pB7ASPY6POqSw.exe

                                              Filesize

                                              256KB

                                              MD5

                                              d5c8ad7b9ac4aba0205c4782099894f5

                                              SHA1

                                              0795949d3deafe6c7594c6f72c3e905c14635877

                                              SHA256

                                              c21a3cae810028b44f2d7b546dae9d698cf27dc01afa9d1690df385f6bf46d50

                                              SHA512

                                              39fd65175ca990d1f01807493808ec7c210d887740642e38cab92fa64fecdb87ac863f9a58ede8616ed390062047dc46c223a3b8539367289348ce7ca925830e

                                            • C:\Users\Admin\Pictures\Dxd3tHT5HWtUwXZxgjY72r2w.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              83c7bec9bf079ddcba29db0525179e96

                                              SHA1

                                              2cff3a73fbd3e16467453abbb6c7eec6ae5f57a8

                                              SHA256

                                              723dab28b312ecdace98a052a8e922a13ec015bef7507d5a3463ceec6f4ac4b2

                                              SHA512

                                              55efa591e85fa3a2f1fefb4e147db53fb45968814ac0a009f7937fdb8777ffcff0e73f8367909dfbc4bcb816d7c90ab3f4efdde9bf5e3f2a71e946d40818c83e

                                            • C:\Users\Admin\Pictures\Dxd3tHT5HWtUwXZxgjY72r2w.exe

                                              MD5

                                              d41d8cd98f00b204e9800998ecf8427e

                                              SHA1

                                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                                              SHA256

                                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                              SHA512

                                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                            • C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe

                                              Filesize

                                              1.6MB

                                              MD5

                                              0afb61fa5959c9ca954cb1896dff7d3c

                                              SHA1

                                              8e00ffdc69a387caf02f95e13bb3105ef21c8697

                                              SHA256

                                              80bed08cadf44957821212cb9e8b7543d81830abb49329a6fe1246d27c3ed5e1

                                              SHA512

                                              10f70d4b3d86869dcb88da92100928b469a97aec387b412bee8f40e64b1def0dce742eb76708f3f2ff615dd1332440ce2d216257b3a8ea459f2082933f8a01ee

                                            • C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe

                                              Filesize

                                              960KB

                                              MD5

                                              a2799c77c56a13071b30261f026b2de2

                                              SHA1

                                              607564cbc03c5ceadaeda1963c442f0408fea33f

                                              SHA256

                                              a29d876718fa21632e132506622fecd32f717482f60ff28ca5515c1e6edf2bf1

                                              SHA512

                                              5f7d0192759d57118a239fedf30fa1cf2694435f4b4228cbe89711eee4b67b1fc42176e805af85a7998d63ffe655b6724705580dfe91728ba3bae454c6080570

                                            • C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe

                                              Filesize

                                              448KB

                                              MD5

                                              68f59bc88e041113b18b45ae2892d9a8

                                              SHA1

                                              a2432878d6834db3bd78ea1c4e4631a0e89abab5

                                              SHA256

                                              b03d8079ea5fb92cfda789aada070362717862dbb08ea0dc33b5679a840c4a63

                                              SHA512

                                              6e0f6aa34be0ce021dadf80664b1f780f7d832c6b1564d1b058d4b67de1936cfcc9995ce2071bb9b4190e7231007db6d73caffbd86a958e3329abf58824ef5b9

                                            • C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe

                                              Filesize

                                              896KB

                                              MD5

                                              b0e80a8b06c2538322cf212f5842c440

                                              SHA1

                                              4879ff3b4c8b766ed33d7a4ea09724cc5f39346c

                                              SHA256

                                              bc91e39e0b51649bfa879107151377268ce3b79ecb2b73356688fff9eaee2a61

                                              SHA512

                                              014e08ab7e76b811dd75999348f12f96f8023db716e7a8a47019aa1d888b0595bffce29c3b3529f2b383b28fd763315a6e83becf821f11a8117c143278bed221

                                            • C:\Users\Admin\Pictures\FH22Hd0WmOKVz4QM2q1UeYOn.exe

                                              Filesize

                                              768KB

                                              MD5

                                              cc046d496f43fbdf3f776cdf4499d089

                                              SHA1

                                              ad9184123968aeffe658231a532ca4f01b92284c

                                              SHA256

                                              be04da447bb8f6cd89e3900fd670b54c0c1b273e694b98705e7e75a332ba5139

                                              SHA512

                                              cd63604d2190639cdba5433be77c27a94868330ad908d6c27509fe59545ff87d8c29b7b07f8f0a36f01ffe97e0f49ff99c6ab83c753b36b4a19f051043007700

                                            • C:\Users\Admin\Pictures\G6yhNRQzZNzJBDLTE2qUqy3i.exe

                                              Filesize

                                              576KB

                                              MD5

                                              0ea456954070fded0b59946e4f5ce152

                                              SHA1

                                              7774851643ced236c3460d32d21c8d5eef765a28

                                              SHA256

                                              d83344d7c45357d75365e611fe484ee0d620ea9db1e9314fee7bdad979ac68a4

                                              SHA512

                                              e9c1fecf5f41397448a3f80c6642a1c30588c9e8021c3d2bd471164a74514b7052718498c34b742ffd4b3cf2ef0d12a034b50695c5d186b06f4311a26057b9f6

                                            • C:\Users\Admin\Pictures\G6yhNRQzZNzJBDLTE2qUqy3i.exe

                                              Filesize

                                              128KB

                                              MD5

                                              44250daae1893bbcc0635101e770e353

                                              SHA1

                                              8892bcd35102543061e7f76b0a74ce337b77c0e4

                                              SHA256

                                              31367523f39953d879a2fa5b02bc2e10499e38546a8f6ec08c7e0f7fce0d5ea2

                                              SHA512

                                              eb46e1561dfa08b3f32bd13ab5418cea14fc458d171ded69d4bc5bd9dfffe6a70c71f98876832a7b447cf7a176a4ab475956669a9036cafb8fe60f2d81abc80c

                                            • C:\Users\Admin\Pictures\Xgy37fCOFXo8Jw2SfgKSwpTA.exe

                                              Filesize

                                              7KB

                                              MD5

                                              5b423612b36cde7f2745455c5dd82577

                                              SHA1

                                              0187c7c80743b44e9e0c193e993294e3b969cc3d

                                              SHA256

                                              e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                              SHA512

                                              c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                            • C:\Users\Admin\Pictures\fAyDZWvOJZFCwh7ygXnfATaV.exe

                                              Filesize

                                              1.9MB

                                              MD5

                                              736c55aaeb89878a6edaf95f895a5369

                                              SHA1

                                              465dc58bf76b8c4cb0be2112a408b00b2e91c4cb

                                              SHA256

                                              ad3d6c8439afeb13c79547bfd92d3f7c9180ac23b14605de3af645a8363afee4

                                              SHA512

                                              ed4377734a24fccf41893d1a0e18091f8476fee60c04f43a33d8ba4f7d2ae3d3244af5d9683f6b0db7227b62c7bcd82ef3ffb9afbd81f662c25ec8106bd0c6e6

                                            • C:\Users\Admin\Pictures\fAyDZWvOJZFCwh7ygXnfATaV.exe

                                              Filesize

                                              896KB

                                              MD5

                                              867b5dba63a2a5f6732da2cf957260ad

                                              SHA1

                                              4c9b408d10ae5005f0a989c59f1ca423d3f71219

                                              SHA256

                                              cb96db841d5917fa434e09f63a6049716726b743ba95ca878239c792e5b1d1d3

                                              SHA512

                                              eb204e7b23212355b465720ed895581ab87a297e79532a95bc265e3cac03db9c0738a7c08aa89233172b9b2eff59b97ebdfd085d392f8574a5b8d2fd66ee9d20

                                            • C:\Users\Admin\Pictures\tD55kjy3daziS55rtxlU73zs.exe

                                              Filesize

                                              320KB

                                              MD5

                                              af491b2879fc40a4f9ad647481de6c68

                                              SHA1

                                              f37e42941bede0260f3e613a0dd95a058eb06516

                                              SHA256

                                              35d9f179818173a6462565a078413dfccd0301e4c3d4d3cc1b172eda93fe898d

                                              SHA512

                                              5995b0c8c1f5da1d5b65d85cf7cc0851ad585d7189e36dfc08ca7b344754587d2e11a0036eed6cc051edb0dbb86909d0e748e24872b40ff7784a85f2e456f9e1

                                            • C:\Users\Admin\Pictures\tD55kjy3daziS55rtxlU73zs.exe

                                              Filesize

                                              192KB

                                              MD5

                                              3253a5c50eecf6f5758bbaa817e2b1eb

                                              SHA1

                                              599e7773e1d33b37f69d1d8add7a17b40697740f

                                              SHA256

                                              1ac75d47c9cd81b439f89d8d49a2d53beaafb9227b4d302a60209542709ea8db

                                              SHA512

                                              510a5d88c9caaf8fb526fe1fea9573da57af7a670bd9be02527900c0507bfb1564dbee5549bf9e05cd126885864f5602e3503cf70826db7c5beb9701524e4522

                                            • C:\Windows\System32\GroupPolicy\gpt.ini

                                              Filesize

                                              127B

                                              MD5

                                              8ef9853d1881c5fe4d681bfb31282a01

                                              SHA1

                                              a05609065520e4b4e553784c566430ad9736f19f

                                              SHA256

                                              9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

                                              SHA512

                                              5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

                                            • memory/228-9-0x0000000005110000-0x0000000005111000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/228-0-0x00000000000B0000-0x000000000057D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/228-6-0x00000000050F0000-0x00000000050F1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/228-7-0x0000000005090000-0x0000000005091000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/228-21-0x00000000000B0000-0x000000000057D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/228-8-0x00000000050A0000-0x00000000050A1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/228-5-0x00000000050B0000-0x00000000050B1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/228-4-0x00000000050D0000-0x00000000050D1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/228-3-0x00000000050C0000-0x00000000050C1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/228-2-0x00000000000B0000-0x000000000057D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/228-1-0x0000000076FA4000-0x0000000076FA6000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/984-277-0x00000000008C0000-0x0000000000C60000-memory.dmp

                                              Filesize

                                              3.6MB

                                            • memory/984-127-0x00000000008C0000-0x0000000000C60000-memory.dmp

                                              Filesize

                                              3.6MB

                                            • memory/984-124-0x00000000008C0000-0x0000000000C60000-memory.dmp

                                              Filesize

                                              3.6MB

                                            • memory/984-129-0x00000000008C0000-0x0000000000C60000-memory.dmp

                                              Filesize

                                              3.6MB

                                            • memory/984-122-0x00000000008C0000-0x0000000000C60000-memory.dmp

                                              Filesize

                                              3.6MB

                                            • memory/984-131-0x00000000008C0000-0x0000000000C60000-memory.dmp

                                              Filesize

                                              3.6MB

                                            • memory/984-121-0x00000000008C0000-0x0000000000C60000-memory.dmp

                                              Filesize

                                              3.6MB

                                            • memory/984-135-0x00000000008C0000-0x0000000000C60000-memory.dmp

                                              Filesize

                                              3.6MB

                                            • memory/984-88-0x00000000008C0000-0x0000000000C60000-memory.dmp

                                              Filesize

                                              3.6MB

                                            • memory/984-336-0x00000000008C0000-0x0000000000C60000-memory.dmp

                                              Filesize

                                              3.6MB

                                            • memory/984-61-0x00000000008C0000-0x0000000000C60000-memory.dmp

                                              Filesize

                                              3.6MB

                                            • memory/984-161-0x00000000008C0000-0x0000000000C60000-memory.dmp

                                              Filesize

                                              3.6MB

                                            • memory/984-195-0x00000000008C0000-0x0000000000C60000-memory.dmp

                                              Filesize

                                              3.6MB

                                            • memory/984-52-0x00000000008C0000-0x0000000000C60000-memory.dmp

                                              Filesize

                                              3.6MB

                                            • memory/1612-357-0x0000000000A20000-0x0000000000F58000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/1612-358-0x0000000000A20000-0x0000000000F58000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/2380-298-0x00007FF766510000-0x00007FF766F27000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/2380-302-0x00007FF766510000-0x00007FF766F27000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/2380-307-0x00007FFECA7F0000-0x00007FFECA9E5000-memory.dmp

                                              Filesize

                                              2.0MB

                                            • memory/2380-304-0x00007FFEC7F10000-0x00007FFEC81D9000-memory.dmp

                                              Filesize

                                              2.8MB

                                            • memory/2380-303-0x00007FF766510000-0x00007FF766F27000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/2380-306-0x00007FFE80030000-0x00007FFE80031000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/2380-305-0x00007FFE80000000-0x00007FFE80002000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/2380-292-0x00007FF766510000-0x00007FF766F27000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/2380-293-0x00007FF766510000-0x00007FF766F27000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/2380-295-0x00007FF766510000-0x00007FF766F27000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/2380-297-0x00007FF766510000-0x00007FF766F27000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/2380-365-0x00007FF766510000-0x00007FF766F27000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/4688-77-0x00007FFEA85B0000-0x00007FFEA9071000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4688-78-0x000001A2CF0D0000-0x000001A2CF0E0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4688-79-0x000001A2CF0D0000-0x000001A2CF0E0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4688-87-0x00007FFEA85B0000-0x00007FFEA9071000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4688-80-0x000001A2CF6E0000-0x000001A2CF6F2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/4688-72-0x000001A2CF060000-0x000001A2CF082000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/4688-81-0x000001A2B6EC0000-0x000001A2B6ECA000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/4768-194-0x00007FFEA8B70000-0x00007FFEA9631000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4768-188-0x000001C5625B0000-0x000001C5625C0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4768-189-0x000001C5625B0000-0x000001C5625C0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4768-187-0x000001C5625B0000-0x000001C5625C0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4768-186-0x00007FFEA8B70000-0x00007FFEA9631000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4912-196-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-134-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-125-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-123-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-51-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-99-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-65-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-126-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-128-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-291-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-32-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-130-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-66-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-349-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-31-0x0000000004F60000-0x0000000004F61000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4912-30-0x0000000004F70000-0x0000000004F71000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4912-29-0x0000000004F00000-0x0000000004F01000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4912-28-0x0000000004EF0000-0x0000000004EF1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4912-27-0x0000000004F50000-0x0000000004F51000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4912-26-0x0000000004F10000-0x0000000004F11000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4912-24-0x0000000004F20000-0x0000000004F21000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4912-25-0x0000000004F30000-0x0000000004F31000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4912-23-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-162-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4912-22-0x0000000000540000-0x0000000000A0D000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/5368-152-0x0000000000530000-0x00000000009FD000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/5368-156-0x0000000004EC0000-0x0000000004EC1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5368-159-0x0000000004EB0000-0x0000000004EB1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5368-160-0x0000000000530000-0x00000000009FD000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/5368-158-0x0000000004EA0000-0x0000000004EA1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5368-157-0x0000000004F00000-0x0000000004F01000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5368-155-0x0000000004EE0000-0x0000000004EE1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5368-153-0x0000000000530000-0x00000000009FD000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/5368-154-0x0000000004ED0000-0x0000000004ED1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/5552-216-0x0000000000400000-0x0000000000408000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/5552-217-0x00000000725C0000-0x0000000072D70000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/5552-228-0x0000000002FF0000-0x0000000003000000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/5552-359-0x00000000725C0000-0x0000000072D70000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/5628-330-0x0000000000F30000-0x0000000001468000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/5928-350-0x0000000000F30000-0x0000000001468000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/5952-337-0x0000000000400000-0x0000000000ED1000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/5952-266-0x0000000002BC0000-0x0000000002FB9000-memory.dmp

                                              Filesize

                                              4.0MB

                                            • memory/5952-268-0x0000000002FC0000-0x00000000038AB000-memory.dmp

                                              Filesize

                                              8.9MB

                                            • memory/5952-276-0x0000000000400000-0x0000000000ED1000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/6032-347-0x0000000000400000-0x0000000000ED1000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/6032-278-0x0000000002A60000-0x0000000002E67000-memory.dmp

                                              Filesize

                                              4.0MB

                                            • memory/6032-294-0x0000000000400000-0x0000000000ED1000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/6068-348-0x0000000000400000-0x0000000000ED1000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/6068-301-0x0000000000400000-0x0000000000ED1000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/6068-296-0x0000000002BF0000-0x0000000002FEA000-memory.dmp

                                              Filesize

                                              4.0MB

                                            • memory/6068-299-0x0000000002FF0000-0x00000000038DB000-memory.dmp

                                              Filesize

                                              8.9MB