Analysis

  • max time kernel
    294s
  • max time network
    287s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 22:30

General

  • Target

    612300066252c3151883d30f69a9b287c323a4a484a35ca553c5a73d3f7d0cfc.exe

  • Size

    424KB

  • MD5

    7660d1df7575e664c8f11be23a924bba

  • SHA1

    22a6592b490e2ef908f7ecacb7cad34256bdd216

  • SHA256

    612300066252c3151883d30f69a9b287c323a4a484a35ca553c5a73d3f7d0cfc

  • SHA512

    77c22370eaed5e096a476778d24c26fcd0105d56419bbd1a5af125028dea702aa8537017629920de08f9b7c20d3b9242606e37ace3e456d34730d0e54f20c15e

  • SSDEEP

    12288:ryWjrJS5FchtDO/V4Cqi0RlYZTRjzg2AYU:ryoJ8KhtDgVfJLTRjs2AYU

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.209

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Signatures

  • Detect ZGRat V1 3 IoCs
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 23 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Windows security bypass 2 TTPs 9 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Modifies boot configuration data using bcdedit 14 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Drops startup file 9 IoCs
  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 36 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 9 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 3 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 9 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\612300066252c3151883d30f69a9b287c323a4a484a35ca553c5a73d3f7d0cfc.exe
    "C:\Users\Admin\AppData\Local\Temp\612300066252c3151883d30f69a9b287c323a4a484a35ca553c5a73d3f7d0cfc.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Users\Admin\Pictures\0zd39W1gHkkSNhQHuOaQ1Q3z.exe
        "C:\Users\Admin\Pictures\0zd39W1gHkkSNhQHuOaQ1Q3z.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:568
        • C:\Users\Admin\AppData\Local\Temp\ufs.0.exe
          "C:\Users\Admin\AppData\Local\Temp\ufs.0.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:2296
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\EHDHIDAEHC.exe"
            5⤵
            • Loads dropped DLL
            PID:1360
            • C:\Users\Admin\AppData\Local\Temp\EHDHIDAEHC.exe
              "C:\Users\Admin\AppData\Local\Temp\EHDHIDAEHC.exe"
              6⤵
              • Executes dropped EXE
              PID:1308
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\EHDHIDAEHC.exe
                7⤵
                  PID:2040
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 2.2.2.2 -n 1 -w 3000
                    8⤵
                    • Runs ping.exe
                    PID:1232
          • C:\Users\Admin\AppData\Local\Temp\ufs.1.exe
            "C:\Users\Admin\AppData\Local\Temp\ufs.1.exe"
            4⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:580
            • C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe
              "C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD1
              5⤵
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1640
        • C:\Users\Admin\Pictures\2mMfUGxyHICIaTRCXyxj5igi.exe
          "C:\Users\Admin\Pictures\2mMfUGxyHICIaTRCXyxj5igi.exe"
          3⤵
          • Executes dropped EXE
          PID:848
        • C:\Users\Admin\Pictures\AKPqkG1XdFQPyrpprX0gnGsC.exe
          "C:\Users\Admin\Pictures\AKPqkG1XdFQPyrpprX0gnGsC.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2060
          • C:\Users\Admin\Pictures\AKPqkG1XdFQPyrpprX0gnGsC.exe
            "C:\Users\Admin\Pictures\AKPqkG1XdFQPyrpprX0gnGsC.exe"
            4⤵
            • Windows security bypass
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Adds Run key to start application
            • Checks for VirtualBox DLLs, possible anti-VM trick
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1692
            • C:\Windows\system32\cmd.exe
              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2880
              • C:\Windows\system32\netsh.exe
                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                6⤵
                • Modifies Windows Firewall
                • Modifies data under HKEY_USERS
                PID:2676
            • C:\Windows\rss\csrss.exe
              C:\Windows\rss\csrss.exe
              5⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Manipulates WinMon driver.
              • Manipulates WinMonFS driver.
              • Drops file in Windows directory
              • Modifies system certificate store
              • Suspicious use of AdjustPrivilegeToken
              PID:1600
              • C:\Windows\system32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                6⤵
                • Creates scheduled task(s)
                PID:2472
              • C:\Windows\system32\schtasks.exe
                schtasks /delete /tn ScheduledUpdate /f
                6⤵
                  PID:2360
                • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                  "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Modifies system certificate store
                  PID:1652
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:1008
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2292
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2724
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2908
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:1644
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:488
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2372
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:1932
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:1520
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:1632
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:1672
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -timeout 0
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:1944
                  • C:\Windows\system32\bcdedit.exe
                    C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
                    7⤵
                    • Modifies boot configuration data using bcdedit
                    PID:2376
                • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                  C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2860
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\Sysnative\bcdedit.exe /v
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2148
                • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                  C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                  6⤵
                  • Executes dropped EXE
                  PID:3008
                • C:\Windows\system32\schtasks.exe
                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                  6⤵
                  • Creates scheduled task(s)
                  PID:1840
                • C:\Windows\windefender.exe
                  "C:\Windows\windefender.exe"
                  6⤵
                  • Executes dropped EXE
                  PID:1368
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                    7⤵
                      PID:2252
                      • C:\Windows\SysWOW64\sc.exe
                        sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                        8⤵
                        • Launches sc.exe
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2684
            • C:\Users\Admin\Pictures\o0ux229IUgMZfOZnJsn4PXgg.exe
              "C:\Users\Admin\Pictures\o0ux229IUgMZfOZnJsn4PXgg.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1492
              • C:\Users\Admin\Pictures\o0ux229IUgMZfOZnJsn4PXgg.exe
                "C:\Users\Admin\Pictures\o0ux229IUgMZfOZnJsn4PXgg.exe"
                4⤵
                • Windows security bypass
                • Executes dropped EXE
                • Windows security modification
                • Adds Run key to start application
                • Checks for VirtualBox DLLs, possible anti-VM trick
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2312
                • C:\Windows\system32\cmd.exe
                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2292
                  • C:\Windows\system32\netsh.exe
                    netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                    6⤵
                    • Modifies Windows Firewall
                    • Modifies data under HKEY_USERS
                    PID:2388
            • C:\Users\Admin\Pictures\rDqQVjdJtztifq3NkTSYjW43.exe
              "C:\Users\Admin\Pictures\rDqQVjdJtztifq3NkTSYjW43.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2308
              • C:\Users\Admin\Pictures\rDqQVjdJtztifq3NkTSYjW43.exe
                "C:\Users\Admin\Pictures\rDqQVjdJtztifq3NkTSYjW43.exe"
                4⤵
                • Windows security bypass
                • Executes dropped EXE
                • Windows security modification
                • Adds Run key to start application
                • Checks for VirtualBox DLLs, possible anti-VM trick
                • Drops file in Windows directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2256
                • C:\Windows\system32\cmd.exe
                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2368
                  • C:\Windows\system32\netsh.exe
                    netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                    6⤵
                    • Modifies Windows Firewall
                    • Modifies data under HKEY_USERS
                    PID:2572
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 2000 -s 716
            2⤵
              PID:2584
          • C:\Windows\system32\makecab.exe
            "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240328223117.log C:\Windows\Logs\CBS\CbsPersist_20240328223117.cab
            1⤵
            • Drops file in Windows directory
            PID:2276
          • C:\Windows\windefender.exe
            C:\Windows\windefender.exe
            1⤵
            • Executes dropped EXE
            • Modifies data under HKEY_USERS
            PID:2408

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C

            Filesize

            579B

            MD5

            f55da450a5fb287e1e0f0dcc965756ca

            SHA1

            7e04de896a3e666d00e687d33ffad93be83d349e

            SHA256

            31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

            SHA512

            19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            68KB

            MD5

            29f65ba8e88c063813cc50a4ea544e93

            SHA1

            05a7040d5c127e68c25d81cc51271ffb8bef3568

            SHA256

            1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

            SHA512

            e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C

            Filesize

            252B

            MD5

            b57e543da6de4fbb05b4555667da9570

            SHA1

            4cc3b53cc3f71cb8e8de8304aaae0c8866c92ea1

            SHA256

            758b023ef6efb9dbf6b2e99c2338063c92f31f7dabfa9778c4da5bb020cc32dc

            SHA512

            01a4fe7edac34b9007b333f7312fd1367abf3fc044bd3dc47a38689d100687b41f7c25cdacb94b682f3991915c7d10838aefcb15c7dadf3113afea8c9fa91f24

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            99cf7b6506ea0d7485b675565754e96d

            SHA1

            4094768195a7a13f196e9a8096ff694f625103e9

            SHA256

            a839e39de22476b8ca866a4a03e317070ca64a58dc17be6ad42e69464aacd140

            SHA512

            b9b993e58059e4b22f06dd7a477cf1da6e8daacf18d251d2e786454a4567230d1d46c9903e06a562f601740ed6b7e46875aea934499e50db3dc242acf7d019da

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            e9ab9a60be7f59e4b38fa274a1b2014d

            SHA1

            c07d0eab19083dbcec74dab2ab59bc127ff66824

            SHA256

            7b3808589d3bb7f2e3a5b64591ac52f0271138205cf664c0033b5dd9681d95ec

            SHA512

            390f288747a05e603b1292dcb5fdd7dc5dc13225390e586391fcebee679a3a925fed471b75e72c5a8eb11d05dd4311d7f545ed3c8a475bf27c14c3c2963c66bc

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            bccc938cc929506388be0bef73f525e6

            SHA1

            c314b95a46a9cc5d953445ea8210f9a0d5329cff

            SHA256

            dbceaab8100f59bb3f1930dbf4016dd2efddf2385735d4d3eab2e7430662dde9

            SHA512

            5246c79f24abc7fd35bc22e55ed4c1ed4b5f5e0183ec89fc874575fd1bad1c6c5537cbfc680c9c1a0e7bbcf6060fb3302a0f1f87412a0e8fd7a717584206bb04

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            fb6ceb73a79ca5ed404726a5d2340717

            SHA1

            518c19a12ffb629be3359d0810a01ac93bea6f70

            SHA256

            0fccc824fff10c25b9cb7b83611e37af8b0539600ed6da50786f10f5a6b0776e

            SHA512

            7a2a1dc8f19dab46a39858953fe64c388a7dc7c8bfb292a85ea38fc26063be3b6b4097c880c86376ac6497b1fd37bfe0da6e8b0ec99e332ac327f9f9ab844ec9

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            182f9b898ff075633af60fb85b4c4fe7

            SHA1

            d157410b25f3063d6fe1d2f63143c0ab8b17cdc9

            SHA256

            c162c107e137011a7ecea2e05228009a324f7feb3dc7ed7f3e0361f00a941c8e

            SHA512

            fdd838367edf961a7b07c779b739b9c338b99558d7ec0f46f3879ae9a1bf4fff2a84216ca2f7d3e5a2bf21a35dfbef6bf97960af9da79ced3e9da57141fbd05e

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            6fa4f47ca5b55eb0d517383bc8aac83c

            SHA1

            05b14dd4d1eb13cd4f379a3a298f65aefacd4955

            SHA256

            c2723bc5c9a0d94d955b2702a7c11e0a551770c21225b39501928e8f3ae8e72c

            SHA512

            c9c54914d0fad2e8f6b28923d4da605fc619c3641efe82e194f38056d6f19ac5a38363a7af7eef8899129770992f8902401c336f873f9064894a61ac09cfdf4e

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            abfa15d66f2ac533a60737cb53965306

            SHA1

            193149a247f2ca777a4f9bf7ac597dad4870889b

            SHA256

            f83d99ae0e3507bd44673843e10317cefe07fee0b18bdcc426ca765ab41bcb8f

            SHA512

            fa742e0ccef3430515b2557f421af208dad16240cf04aced0eab97797b1e20bd1e43ac95b17e6635df89ee666a91ec645397de0281ea84f669545dab47814713

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            77fa2e5f10a94917406fcf6678466bb6

            SHA1

            0ced973d3f4a713ded271991028aea44d954e92b

            SHA256

            508b21d2cd346c88e63283c52fc781cec6e0af8e12fc8529a4d97a6a40b203e1

            SHA512

            42513bb4808179871446275ef1e4c588498b936cdf7d8607eddc56254ae2a6b6737bf552263170fee85391e46593bb51978fb01c30d6f47d086685b50bdb7ace

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            b67364e9555c9b02de431039e212c12e

            SHA1

            7616e3e96ddd6d0dda709674b7f9ae0653668a36

            SHA256

            e191511c79bb9ec990358b470f9f21a21a8639bc1960cd6d04cf83d0927de8d6

            SHA512

            74e77fbcfadfef4e184038bacb4d277ca41437c60b5284ae3e488b532ce74ecba38b194e3b8bd8fec41d64428008e5feb85fa5bc55e529b8674679541accba55

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            d150943e20deff0d3af6df0e77c49e9c

            SHA1

            59abe75dd23b4cbc72b7c534f3e51caf18099683

            SHA256

            b4580105c2ec53ce7eedcd81713dad6507cfc52ac6cda665d75c52db01093c67

            SHA512

            677c02b59f864fa529bac3b0c675a59435a5dc7128be1244758fb0c1b40f0839a0a101cc73a24364ba7c138fa4695f48add459fec83d4bd9979b6edd998160e6

          • C:\Users\Admin\AppData\Local\Microsoft\ApplicationInsights\049b7335d372bd07248452d0b58e37cfb8420ac5b148b226adcb19ae95655a7b\8ca5b49aa6234bb0a6791bfa64796b65.tmp

            Filesize

            1KB

            MD5

            f5dc21b613bdb1a461c2c9ed9929733e

            SHA1

            9d0972ae8042a6663ff73b0700be9d407bacf2b2

            SHA256

            3fb5b624e3b11b7f568ffd8fdbfc1f0d045154d160930f2bf0c887cc2de98f31

            SHA512

            4c3ab279b0d06d34a9e1edb75d76379b25350d53373d57fd30f0e36aea0d357cda721802c9555a1dad47995c2fdad0157ce2ac3744985363585766994fe296ad

          • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

            Filesize

            492KB

            MD5

            fafbf2197151d5ce947872a4b0bcbe16

            SHA1

            a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020

            SHA256

            feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71

            SHA512

            acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6

          • C:\Users\Admin\AppData\Local\Temp\Tar41F7.tmp

            Filesize

            177KB

            MD5

            435a9ac180383f9fa094131b173a2f7b

            SHA1

            76944ea657a9db94f9a4bef38f88c46ed4166983

            SHA256

            67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

            SHA512

            1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

            Filesize

            281KB

            MD5

            d98e33b66343e7c96158444127a117f6

            SHA1

            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

            SHA256

            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

            SHA512

            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

          • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe

            Filesize

            1.7MB

            MD5

            13aaafe14eb60d6a718230e82c671d57

            SHA1

            e039dd924d12f264521b8e689426fb7ca95a0a7b

            SHA256

            f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3

            SHA512

            ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3

          • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

            Filesize

            2KB

            MD5

            a71df0da9cf583851dabb1807aa81c09

            SHA1

            89e2780bd65f11dbeccce441d1e158d8721340c5

            SHA256

            75791c9e1cfb73b8eac4a54c4231975e9a4d452160311ae493d88ad2daa0bba0

            SHA512

            0eb36277a28f428877006a766d65342919beaedb84bbad80e2ae79398c0d3c73cdce6873e463fa5c7db428c633a3acc13c96d43416798e296de0ed5d6c9e5e3d

          • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

            Filesize

            5.3MB

            MD5

            1afff8d5352aecef2ecd47ffa02d7f7d

            SHA1

            8b115b84efdb3a1b87f750d35822b2609e665bef

            SHA256

            c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

            SHA512

            e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

          • C:\Users\Admin\AppData\Local\Temp\osloader.exe

            Filesize

            591KB

            MD5

            e2f68dc7fbd6e0bf031ca3809a739346

            SHA1

            9c35494898e65c8a62887f28e04c0359ab6f63f5

            SHA256

            b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

            SHA512

            26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

          • C:\Users\Admin\AppData\Local\Temp\ufs.1.exe

            Filesize

            4.6MB

            MD5

            397926927bca55be4a77839b1c44de6e

            SHA1

            e10f3434ef3021c399dbba047832f02b3c898dbd

            SHA256

            4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

            SHA512

            cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

          • C:\Users\Admin\Pictures\AKPqkG1XdFQPyrpprX0gnGsC.exe

            Filesize

            4.1MB

            MD5

            5f066ebf9264cad80bdb1384ce2a6b34

            SHA1

            a6bfd2df4ad14b8b0f90951b688a7de61f7d4bbc

            SHA256

            5c2b1d90d0299ff70ea73f89a9326628e602cf9f72c425b570ac5272279372e1

            SHA512

            0b0ce2214f57be9155b6eb7de144a96b09a9699fd75e82e4be525a4048a027c509c3f1495f111a3cc1c62b283deb150779d6458b13022095614d502a9805f1c5

          • C:\Windows\windefender.exe

            Filesize

            2.0MB

            MD5

            8e67f58837092385dcf01e8a2b4f5783

            SHA1

            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

            SHA256

            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

            SHA512

            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

          • \ProgramData\mozglue.dll

            Filesize

            593KB

            MD5

            c8fd9be83bc728cc04beffafc2907fe9

            SHA1

            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

            SHA256

            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

            SHA512

            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

          • \ProgramData\nss3.dll

            Filesize

            2.0MB

            MD5

            1cc453cdf74f31e4d913ff9c10acdde2

            SHA1

            6e85eae544d6e965f15fa5c39700fa7202f3aafe

            SHA256

            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

            SHA512

            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

          • \Users\Admin\AppData\Local\Temp\EHDHIDAEHC.exe

            Filesize

            106KB

            MD5

            fe380780b5c35bd6d54541791151c2be

            SHA1

            7fe3a583cf91474c733f85cebf3c857682e269e1

            SHA256

            b64a84d1f88e4e78464a1901c1cb5bbd5f00bb73203d719e64e072157a087b53

            SHA512

            ba05ba8aa13c4bc1cf98fbf6c08b021e8b19354098e0397fc8e1e5d3dcce367c1063203f24e50d0973193f6535681d0a43486e5dade5d112853b7a2fe8739b6c

          • \Users\Admin\AppData\Local\Temp\csrss\dsefix.exe

            Filesize

            94KB

            MD5

            d98e78fd57db58a11f880b45bb659767

            SHA1

            ab70c0d3bd9103c07632eeecee9f51d198ed0e76

            SHA256

            414035cc96d8bcc87ed173852a839ffbb45882a98c7a6f7b821e1668891deef0

            SHA512

            aafbd3eee102d0b682c4c854d69d50bac077e48f7f0dd8a5f913c6c73027aed7231d99fc9d716511759800da8c4f0f394b318821e9e47f6e62e436c8725a7831

          • \Users\Admin\AppData\Local\Temp\dbghelp.dll

            Filesize

            1.5MB

            MD5

            f0616fa8bc54ece07e3107057f74e4db

            SHA1

            b33995c4f9a004b7d806c4bb36040ee844781fca

            SHA256

            6e58fcf4d763022b1f79a3c448eb2ebd8ad1c15df3acf58416893f1cbc699026

            SHA512

            15242e3f5652d7f1d0e31cebadfe2f238ca3222f0e927eb7feb644ab2b3d33132cf2316ee5089324f20f72f1650ad5bb8dd82b96518386ce5b319fb5ceb8313c

          • \Users\Admin\AppData\Local\Temp\symsrv.dll

            Filesize

            163KB

            MD5

            5c399d34d8dc01741269ff1f1aca7554

            SHA1

            e0ceed500d3cef5558f3f55d33ba9c3a709e8f55

            SHA256

            e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f

            SHA512

            8ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d

          • \Users\Admin\AppData\Local\Temp\ufs.0.exe

            Filesize

            259KB

            MD5

            4524e1a1e2725e159d68b3bca2c1b296

            SHA1

            0e3b226d0ebd227b911c5fc25d6a28478ed0a957

            SHA256

            12a5bac24e4e354bfc93a989c398df11ac5ec63c9d9834e0a9062bd8857cdda7

            SHA512

            870e0e4e86593a3f060643b043d41f2aa6108af8075f19c0ba6c9d276a28df5c6f6e02a6cd088eb88382af35a41bcd626ea5add747494d468158abb7e610f3ca

          • \Users\Admin\Pictures\0zd39W1gHkkSNhQHuOaQ1Q3z.exe

            Filesize

            403KB

            MD5

            7fcc0bae1fa98de1d16819e6f85de171

            SHA1

            d8ba9866840e0449ddb78d31d6bcf2762ed3e6e4

            SHA256

            28249276aafcf8911cc5fc8b6adebe10efb7141f3869ab2ec2f0bf5cffc1c82a

            SHA512

            58cf14e662f68b61339dd3517dae6c831a5094ef01eab8e5ee64cf85a23e26b3ffce43912ba62356fdf1a4bbeba7249f55de222154b729b8d85fa48744ddbe29

          • \Users\Admin\Pictures\2mMfUGxyHICIaTRCXyxj5igi.exe

            Filesize

            372KB

            MD5

            e2a6c1f58b137874e490b8d94382fcdb

            SHA1

            71529c5d708091b1e1a580227dc52e62a140edd1

            SHA256

            4801879a7afb9d03f7edcbe76cd9306cb024d80abc8512c4995aa97e8fd52437

            SHA512

            24d12ce668e5189a4ba80520a4eaf480d17d3a07d8d0d4312964968f8489143df225881ec70e39e0c62e381061626801ead72d70cea164e2c3870bfbd7bc4eff

          • \Users\Admin\Pictures\o0ux229IUgMZfOZnJsn4PXgg.exe

            Filesize

            4.1MB

            MD5

            6126c6923b352edf2507639b7fe78e8a

            SHA1

            1fd3edb62b8d44673772fb58a05c43d5360e8e5b

            SHA256

            98db3710f7b5e68beb18c0ec584909ad3c92d66bbf093164892d5cd00d1021dd

            SHA512

            93fcbbc0a3f42f9fab3c5e0a5cbc83308b5d93999fa89f449c2b50653860de2fe3dbb42fc463bf34f5f5e5e69390dae8b6a1dfed8e742dcb0059a445cf041736

          • memory/568-665-0x0000000000400000-0x0000000000B0E000-memory.dmp

            Filesize

            7.1MB

          • memory/568-160-0x0000000000C70000-0x0000000000D70000-memory.dmp

            Filesize

            1024KB

          • memory/568-554-0x0000000000C70000-0x0000000000D70000-memory.dmp

            Filesize

            1024KB

          • memory/568-161-0x0000000000230000-0x000000000029E000-memory.dmp

            Filesize

            440KB

          • memory/568-176-0x0000000000400000-0x0000000000B0E000-memory.dmp

            Filesize

            7.1MB

          • memory/568-552-0x0000000000400000-0x0000000000B0E000-memory.dmp

            Filesize

            7.1MB

          • memory/568-644-0x0000000000400000-0x0000000000B0E000-memory.dmp

            Filesize

            7.1MB

          • memory/580-666-0x0000000000230000-0x0000000000231000-memory.dmp

            Filesize

            4KB

          • memory/580-762-0x0000000000400000-0x00000000008AD000-memory.dmp

            Filesize

            4.7MB

          • memory/580-738-0x0000000000400000-0x00000000008AD000-memory.dmp

            Filesize

            4.7MB

          • memory/848-471-0x0000000000400000-0x0000000000B06000-memory.dmp

            Filesize

            7.0MB

          • memory/848-472-0x0000000000C90000-0x0000000000D90000-memory.dmp

            Filesize

            1024KB

          • memory/848-473-0x0000000000220000-0x000000000026A000-memory.dmp

            Filesize

            296KB

          • memory/1492-519-0x0000000002790000-0x0000000002B88000-memory.dmp

            Filesize

            4.0MB

          • memory/1492-525-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/1492-545-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/1492-527-0x0000000002790000-0x0000000002B88000-memory.dmp

            Filesize

            4.0MB

          • memory/1600-852-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/1600-844-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/1600-870-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/1600-869-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/1600-837-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/1600-728-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/1600-747-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/1600-886-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/1600-812-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/1600-591-0x0000000002810000-0x0000000002C08000-memory.dmp

            Filesize

            4.0MB

          • memory/1600-593-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/1600-589-0x0000000002810000-0x0000000002C08000-memory.dmp

            Filesize

            4.0MB

          • memory/1640-773-0x0000000005AB0000-0x0000000005AD4000-memory.dmp

            Filesize

            144KB

          • memory/1640-809-0x0000000000510000-0x000000000051A000-memory.dmp

            Filesize

            40KB

          • memory/1640-811-0x000000001EBD0000-0x000000001EC50000-memory.dmp

            Filesize

            512KB

          • memory/1640-808-0x0000000000510000-0x000000000051A000-memory.dmp

            Filesize

            40KB

          • memory/1640-807-0x000000001EBD0000-0x000000001EC50000-memory.dmp

            Filesize

            512KB

          • memory/1640-802-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

            Filesize

            9.9MB

          • memory/1640-797-0x000000001EBD0000-0x000000001EC50000-memory.dmp

            Filesize

            512KB

          • memory/1640-798-0x000000001E6C0000-0x000000001E6CC000-memory.dmp

            Filesize

            48KB

          • memory/1640-793-0x0000000005A20000-0x0000000005A2A000-memory.dmp

            Filesize

            40KB

          • memory/1640-794-0x000000001E6A0000-0x000000001E6C2000-memory.dmp

            Filesize

            136KB

          • memory/1640-791-0x000000001EBD0000-0x000000001EC50000-memory.dmp

            Filesize

            512KB

          • memory/1640-792-0x000000001EBD0000-0x000000001EC50000-memory.dmp

            Filesize

            512KB

          • memory/1640-789-0x000000001FE00000-0x0000000020100000-memory.dmp

            Filesize

            3.0MB

          • memory/1640-785-0x00000000003B0000-0x00000000003BA000-memory.dmp

            Filesize

            40KB

          • memory/1640-780-0x00000000003A0000-0x00000000003AA000-memory.dmp

            Filesize

            40KB

          • memory/1640-783-0x0000000005990000-0x0000000005A0A000-memory.dmp

            Filesize

            488KB

          • memory/1640-784-0x0000000005AD0000-0x0000000005B32000-memory.dmp

            Filesize

            392KB

          • memory/1640-782-0x000000001E140000-0x000000001E1F2000-memory.dmp

            Filesize

            712KB

          • memory/1640-781-0x00000000003C0000-0x00000000003EA000-memory.dmp

            Filesize

            168KB

          • memory/1640-772-0x0000000000560000-0x0000000000574000-memory.dmp

            Filesize

            80KB

          • memory/1640-770-0x00000000002A0000-0x00000000002B0000-memory.dmp

            Filesize

            64KB

          • memory/1640-771-0x0000000000570000-0x000000000057C000-memory.dmp

            Filesize

            48KB

          • memory/1640-769-0x000000001EF70000-0x000000001F080000-memory.dmp

            Filesize

            1.1MB

          • memory/1640-768-0x000000001EBD0000-0x000000001EC50000-memory.dmp

            Filesize

            512KB

          • memory/1640-763-0x0000000000830000-0x0000000004128000-memory.dmp

            Filesize

            57.0MB

          • memory/1640-764-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

            Filesize

            9.9MB

          • memory/1652-602-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB

          • memory/1652-650-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB

          • memory/1692-588-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/1692-558-0x0000000002830000-0x0000000002C28000-memory.dmp

            Filesize

            4.0MB

          • memory/1692-561-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/1692-559-0x0000000002830000-0x0000000002C28000-memory.dmp

            Filesize

            4.0MB

          • memory/2000-0-0x0000000000080000-0x0000000000096000-memory.dmp

            Filesize

            88KB

          • memory/2000-507-0x000000001B590000-0x000000001B610000-memory.dmp

            Filesize

            512KB

          • memory/2000-474-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

            Filesize

            9.9MB

          • memory/2000-1-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

            Filesize

            9.9MB

          • memory/2000-2-0x000000001B590000-0x000000001B610000-memory.dmp

            Filesize

            512KB

          • memory/2000-3-0x00000000006D0000-0x000000000072C000-memory.dmp

            Filesize

            368KB

          • memory/2060-524-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/2060-526-0x0000000002BC0000-0x00000000034AB000-memory.dmp

            Filesize

            8.9MB

          • memory/2060-521-0x00000000027C0000-0x0000000002BB8000-memory.dmp

            Filesize

            4.0MB

          • memory/2060-506-0x00000000027C0000-0x0000000002BB8000-memory.dmp

            Filesize

            4.0MB

          • memory/2060-557-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/2256-553-0x00000000026B0000-0x0000000002AA8000-memory.dmp

            Filesize

            4.0MB

          • memory/2256-592-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/2256-550-0x00000000026B0000-0x0000000002AA8000-memory.dmp

            Filesize

            4.0MB

          • memory/2256-555-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/2296-578-0x0000000000220000-0x0000000000247000-memory.dmp

            Filesize

            156KB

          • memory/2296-599-0x0000000061E00000-0x0000000061EF3000-memory.dmp

            Filesize

            972KB

          • memory/2296-577-0x0000000000BB0000-0x0000000000CB0000-memory.dmp

            Filesize

            1024KB

          • memory/2296-810-0x0000000000400000-0x0000000000AEA000-memory.dmp

            Filesize

            6.9MB

          • memory/2296-859-0x0000000000400000-0x0000000000AEA000-memory.dmp

            Filesize

            6.9MB

          • memory/2296-746-0x0000000000400000-0x0000000000AEA000-memory.dmp

            Filesize

            6.9MB

          • memory/2296-836-0x0000000000400000-0x0000000000AEA000-memory.dmp

            Filesize

            6.9MB

          • memory/2296-739-0x0000000000BB0000-0x0000000000CB0000-memory.dmp

            Filesize

            1024KB

          • memory/2296-727-0x0000000000400000-0x0000000000AEA000-memory.dmp

            Filesize

            6.9MB

          • memory/2296-579-0x0000000000400000-0x0000000000AEA000-memory.dmp

            Filesize

            6.9MB

          • memory/2308-542-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/2308-551-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/2308-539-0x0000000002680000-0x0000000002A78000-memory.dmp

            Filesize

            4.0MB

          • memory/2308-541-0x0000000002680000-0x0000000002A78000-memory.dmp

            Filesize

            4.0MB

          • memory/2312-547-0x0000000002760000-0x0000000002B58000-memory.dmp

            Filesize

            4.0MB

          • memory/2312-546-0x0000000002760000-0x0000000002B58000-memory.dmp

            Filesize

            4.0MB

          • memory/2312-548-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/2312-590-0x0000000000400000-0x0000000000ECD000-memory.dmp

            Filesize

            10.8MB

          • memory/2468-9-0x0000000000400000-0x0000000000408000-memory.dmp

            Filesize

            32KB

          • memory/2468-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2468-11-0x0000000000400000-0x0000000000408000-memory.dmp

            Filesize

            32KB

          • memory/2468-13-0x0000000000400000-0x0000000000408000-memory.dmp

            Filesize

            32KB

          • memory/2468-14-0x0000000074390000-0x0000000074A7E000-memory.dmp

            Filesize

            6.9MB

          • memory/2468-4-0x0000000000400000-0x0000000000408000-memory.dmp

            Filesize

            32KB

          • memory/2468-5-0x0000000000400000-0x0000000000408000-memory.dmp

            Filesize

            32KB

          • memory/2468-6-0x0000000000400000-0x0000000000408000-memory.dmp

            Filesize

            32KB

          • memory/2468-7-0x0000000000400000-0x0000000000408000-memory.dmp

            Filesize

            32KB

          • memory/2468-540-0x00000000005F0000-0x0000000000630000-memory.dmp

            Filesize

            256KB

          • memory/2468-15-0x00000000005F0000-0x0000000000630000-memory.dmp

            Filesize

            256KB

          • memory/2468-520-0x0000000074390000-0x0000000074A7E000-memory.dmp

            Filesize

            6.9MB