Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-04-2024 18:33

General

  • Target

    2024-04-27_935f1f2371fa80218a8e0b8ab8ec4bc4_ryuk.exe

  • Size

    5.5MB

  • MD5

    935f1f2371fa80218a8e0b8ab8ec4bc4

  • SHA1

    53bb9e154372205a4d56f7d5f65da17cb958f804

  • SHA256

    90f8457cc72de32faf5361168b9e76859fe9a066bb3a8ed61f1e0e181f4ae152

  • SHA512

    ca6ade59fdd2ee5e98ac97d611ad6e9a5a171315c1dc237ba871767e49c75603873c53d3dfd4c2c781d8b8c90adb02a028b7fc24ed0cb378f36e196d0a8db3ec

  • SSDEEP

    49152:EEFbqzA/PvIGDFr9AtwA3PlpIgong0yTI+q47W1Ln9tJEUxDG0BYYrLA50IHLGfD:iAI5pAdVJn9tbnR1VgBVmhfFPfUNF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 26 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 26 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-27_935f1f2371fa80218a8e0b8ab8ec4bc4_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-27_935f1f2371fa80218a8e0b8ab8ec4bc4_ryuk.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Users\Admin\AppData\Local\Temp\2024-04-27_935f1f2371fa80218a8e0b8ab8ec4bc4_ryuk.exe
      C:\Users\Admin\AppData\Local\Temp\2024-04-27_935f1f2371fa80218a8e0b8ab8ec4bc4_ryuk.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=113.0.5672.93 --initial-client-data=0x2c8,0x2cc,0x2d0,0x29c,0x2d4,0x140462458,0x140462468,0x140462478
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1472
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --force-first-run
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4652
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff83e87cc40,0x7ff83e87cc4c,0x7ff83e87cc58
        3⤵
          PID:3828
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,17410877879987045637,9277786818274174187,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1912 /prefetch:2
          3⤵
            PID:4888
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,17410877879987045637,9277786818274174187,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2168 /prefetch:3
            3⤵
              PID:1652
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,17410877879987045637,9277786818274174187,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2472 /prefetch:8
              3⤵
                PID:448
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3092,i,17410877879987045637,9277786818274174187,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3112 /prefetch:1
                3⤵
                  PID:3704
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,17410877879987045637,9277786818274174187,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3180 /prefetch:1
                  3⤵
                    PID:5124
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4456,i,17410877879987045637,9277786818274174187,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4528 /prefetch:1
                    3⤵
                      PID:5460
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4752,i,17410877879987045637,9277786818274174187,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4764 /prefetch:8
                      3⤵
                        PID:5984
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\chrmstp.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings
                        3⤵
                        • Executes dropped EXE
                        PID:6000
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\chrmstp.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x2c4,0x2c8,0x2cc,0x2c0,0x2d0,0x140384698,0x1403846a4,0x1403846b0
                          4⤵
                          • Executes dropped EXE
                          PID:6108
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\chrmstp.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\initial_preferences" --create-shortcuts=1 --install-level=0
                          4⤵
                          • Executes dropped EXE
                          • Modifies registry class
                          • Suspicious use of FindShellTrayWindow
                          PID:4800
                          • C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\chrmstp.exe
                            "C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x2bc,0x2c0,0x2c4,0x298,0x2c8,0x140384698,0x1403846a4,0x1403846b0
                            5⤵
                            • Executes dropped EXE
                            PID:5356
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5056,i,17410877879987045637,9277786818274174187,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5052 /prefetch:8
                        3⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5160
                  • C:\Windows\System32\alg.exe
                    C:\Windows\System32\alg.exe
                    1⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    PID:3784
                  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
                    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3324
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
                    1⤵
                      PID:1376
                    • C:\Windows\system32\fxssvc.exe
                      C:\Windows\system32\fxssvc.exe
                      1⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4504
                    • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                      1⤵
                      • Executes dropped EXE
                      PID:1300
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
                      1⤵
                      • Executes dropped EXE
                      PID:1484
                    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                      "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                      1⤵
                      • Executes dropped EXE
                      PID:1208
                    • C:\Windows\System32\msdtc.exe
                      C:\Windows\System32\msdtc.exe
                      1⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Drops file in Windows directory
                      PID:4580
                    • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
                      "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
                      1⤵
                      • Executes dropped EXE
                      PID:2848
                    • C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
                      C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
                      1⤵
                      • Executes dropped EXE
                      PID:1768
                    • C:\Windows\SysWow64\perfhost.exe
                      C:\Windows\SysWow64\perfhost.exe
                      1⤵
                      • Executes dropped EXE
                      PID:4488
                    • C:\Windows\system32\locator.exe
                      C:\Windows\system32\locator.exe
                      1⤵
                      • Executes dropped EXE
                      PID:3164
                    • C:\Windows\System32\SensorDataService.exe
                      C:\Windows\System32\SensorDataService.exe
                      1⤵
                      • Executes dropped EXE
                      • Checks SCSI registry key(s)
                      PID:4756
                    • C:\Windows\System32\snmptrap.exe
                      C:\Windows\System32\snmptrap.exe
                      1⤵
                      • Executes dropped EXE
                      PID:5068
                    • C:\Windows\system32\spectrum.exe
                      C:\Windows\system32\spectrum.exe
                      1⤵
                      • Executes dropped EXE
                      • Checks SCSI registry key(s)
                      PID:2804
                    • C:\Windows\System32\OpenSSH\ssh-agent.exe
                      C:\Windows\System32\OpenSSH\ssh-agent.exe
                      1⤵
                      • Executes dropped EXE
                      PID:2160
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc
                      1⤵
                        PID:896
                      • C:\Windows\system32\TieringEngineService.exe
                        C:\Windows\system32\TieringEngineService.exe
                        1⤵
                        • Executes dropped EXE
                        • Checks processor information in registry
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3404
                      • C:\Windows\system32\AgentService.exe
                        C:\Windows\system32\AgentService.exe
                        1⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:436
                      • C:\Windows\System32\vds.exe
                        C:\Windows\System32\vds.exe
                        1⤵
                        • Executes dropped EXE
                        PID:2780
                      • C:\Windows\system32\vssvc.exe
                        C:\Windows\system32\vssvc.exe
                        1⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3420
                      • C:\Windows\system32\wbengine.exe
                        "C:\Windows\system32\wbengine.exe"
                        1⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2124
                      • C:\Windows\system32\wbem\WmiApSrv.exe
                        C:\Windows\system32\wbem\WmiApSrv.exe
                        1⤵
                        • Executes dropped EXE
                        PID:3436
                      • C:\Windows\system32\SearchIndexer.exe
                        C:\Windows\system32\SearchIndexer.exe /Embedding
                        1⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4244
                        • C:\Windows\system32\SearchProtocolHost.exe
                          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                          2⤵
                          • Modifies data under HKEY_USERS
                          PID:4848
                        • C:\Windows\system32\SearchFilterHost.exe
                          "C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 896
                          2⤵
                          • Modifies data under HKEY_USERS
                          PID:2512
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                        1⤵
                          PID:1300

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

                          Filesize

                          2.1MB

                          MD5

                          e54b799e5250ac4ac77c93ac48daa044

                          SHA1

                          a8aab6de8b62b553f377727b24a6f507fc358630

                          SHA256

                          30ac877b5db04d32b0e5a63b4fd2f638f91a9448ca09bdece4cd8ff701afca40

                          SHA512

                          39215463b48108780a7ac47b7649f9c15280aa504afa4299c426c733bc3f727348b05e16c15067b7bd52a26067174d3c4344b00bed971ed73af94ff25a8fd066

                        • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

                          Filesize

                          789KB

                          MD5

                          e13b063fadd8b2967fa1d4d829a7b354

                          SHA1

                          d14e47fb59d5fe4666e6efd8604ec8bc643e1809

                          SHA256

                          b9090f70d169cb10527143034ead47df19d3f251a4bfd9c8136c0143afdabeef

                          SHA512

                          85fe20eb8edf2f5bf461822a6ea51658c9731b926a80cf076ab59ac58f6cc5e0d1756a0a3da0131fcbcc9d5653b591c12ee9fc5514419a0d8959a8c30c66540b

                        • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

                          Filesize

                          805KB

                          MD5

                          31ddd4a8c510e9cdef33616eb2325960

                          SHA1

                          285516986d7ede07b1a6714661b9cca6b428e5b9

                          SHA256

                          9b807a311c2635fc56a3ff270e4b8e4ed6bd65ca1d0d8472a2d95140fb457ff1

                          SHA512

                          10a356818b30019f39caa89a1b7796e2a81f5b140686a9e68d885355a094fcbef00eb8291370dc87f6b4d8f5ba70826ae1cee557304ce0b2e80c9fc949bbf599

                        • C:\Program Files\Crashpad\settings.dat

                          Filesize

                          40B

                          MD5

                          7404d467b2fb89e4e84776aa412bad2c

                          SHA1

                          fb32e21aeea74145df18cfc71af67b4e99c7df19

                          SHA256

                          8786c85561e8a3742609386f8eafbc94aece005a0873ee05af5912711f67864a

                          SHA512

                          22da866486d4f764bbac8b4ce8314220b58fd5c3d77c71d260e90f6d96050e330d2fbcbfc607e61ead472e8fe4e1305f769406ffd57d4d202e085e2af97ba51c

                        • C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\chrmstp.exe

                          Filesize

                          4.6MB

                          MD5

                          c70291c50e4b1b261c0ee7f94efa3a08

                          SHA1

                          52e139380f5cbdbaedf6ef47030e4fa9ef3aee01

                          SHA256

                          982b2ebdbc317dad80f431e9d7555d6d28cd07dff47fdf69e50ba41fed36fff3

                          SHA512

                          bd10f294667a5d30d547f04be7b7240921218edcca75de668f2c45116a7dbedc54670ef46231a026bd05a1e23838f5dfe30c083365567918e4bfaa724932568a

                        • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe

                          Filesize

                          2.1MB

                          MD5

                          3a06d00566070e6b93304da883f0d71c

                          SHA1

                          285b565df24402dc24bfc3d19db1d8c2593c449c

                          SHA256

                          55dea187945a7ac3ee072c78164712c24f814656efadd37e99b6b9fb04f3c2ad

                          SHA512

                          7ad4d9c7cb36952e3f99766c94b997ed104027b3e7850bac56fa95175c723ce87055968f4ab6d5702364059b44e73bc2e0c2c6a84df51119e78faaf718c15a10

                        • C:\Program Files\Google\Chrome\Application\SetupMetrics\5a812329-e993-4b7b-8649-4b9e31cc12c6.tmp

                          Filesize

                          520B

                          MD5

                          d7bdecbddac6262e516e22a4d6f24f0b

                          SHA1

                          1a633ee43641fa78fbe959d13fa18654fd4a90be

                          SHA256

                          db3be7c6d81b2387c39b32d15c096173022cccee1015571dd3e09f2a69b508a9

                          SHA512

                          1e72db18de776fe264db3052ce9a842c9766a720a9119fc6605f795c36d4c7bf8f77680c5564f36e591368ccd354104a7412f267c4157f04c4926bce51aeeaa1

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                          Filesize

                          40B

                          MD5

                          bf53a83ddea2e5f1782e8ea1fd92b5c2

                          SHA1

                          c82339fcce3181fec9ee3015292dff2b2e42173f

                          SHA256

                          5db038fab6e4e0147293c9eb1747e43bb168677c2a5766532ebc300b8fde591e

                          SHA512

                          3ecdcb21511144b6c15ec5ded069ed8fbd76942bec079a271c40b08a81981e3663cc6ab50edd1547175533fe9cb5cca617a783a828439758f3d48e4864e6c1ad

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                          Filesize

                          649B

                          MD5

                          c1203f345899ce2cfbbd12000e93110b

                          SHA1

                          1b51771b7fa8f1120ec77c4f71e73917f6a23eae

                          SHA256

                          300c75bcf1aec7177712d7c0f9526c0430e065f49de60a65cb6f2f5caa0c4ad9

                          SHA512

                          433875546978cfec82be172318b860ac13f11ec7f8530344fc50657615ba9dee52c0281d4262e2ed4add5814a2ade119d3b58156dd22ba136467c9fe545b7cf9

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Google Profile.ico

                          Filesize

                          192KB

                          MD5

                          a8cf54419129b874864cf206392ece0f

                          SHA1

                          2d8f78e5d6951faedba3257d5794227f34c50967

                          SHA256

                          b8a7649c907c010db609d7143f3f0601a385b9cf803f4b0bddb449c41151cc1f

                          SHA512

                          02a77857be5123636fdc44791f6cf7a4532fa53e34576be7f6ab21da51ef400fc138d7dda6a2880b2b42ddb22a803a1897e4f95ea3479487af61a199c7929a8c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          69f0a6a47f1c62c9273868c53d940320

                          SHA1

                          8c9f380f9ecbf5e9828552b2b7bd64dd1faf83f2

                          SHA256

                          f38e64b615a2a5f34b8f219b88e847402c622f6814bbd0cb753c80a0690c56ce

                          SHA512

                          d7b1d5aae7873ae145700872174143eeaad1dd7fcd0f760876a520e4a406dde909aaf77c651e0aa78acb39e9205b2c73ae26340266c88bd40004094a407f66e3

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          679abdfd22f707e18db576ca33de4623

                          SHA1

                          7ec5fa1640b0954be49ad64dd17035c9fe5949b0

                          SHA256

                          157c32e0c17e57e2d967dc3c66bd7181df8e69ce58d347188f1f6e49f6a15eb7

                          SHA512

                          134467f7c63d249795ba1d1aad81d7641054c08de124fe9287631a2d5e297724b2b8f6ff685f2843027397d5350cd9fcad4b1c635b31c906059d00951dccd7a5

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          e918f1a10c702e0071db6a78e6f2e4a4

                          SHA1

                          e8cf933f182de4883499625c1e08d48f12cb2a3f

                          SHA256

                          f7ea4c7a2fe8065e71e5ba38920c521b661ed290ecea73f473878b8cbe578267

                          SHA512

                          e70baf22d9b87d29c58946c183489b991d0161912cd384e7d1ceb4afce179708333c36f538ed9a63b20b7b35f92158a6e0c97932d9a8bf0038e5d30704ed91b1

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          e97b886409fc6108104d1fedff47335c

                          SHA1

                          e29299cd4486e9cc968504ea2800e374f4fb1a1b

                          SHA256

                          8fdcd2ae6a7cd302b5e7cf7c2f16f806176d8ea0a892e942ff7ea13f7bdbdd54

                          SHA512

                          870ba422060e0ff44ae331c6eba6526385730da1fc8d0df618f944570006eace77d800a23ce24ab7e29ce4979565e28170171812df53838b2d53fbc8a9893e70

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          9663a8f89e4b855fa361ad9e714f06a3

                          SHA1

                          a8db1b88445e3a3006fe2dbcb5954fed81688e25

                          SHA256

                          8ab4e07b201c8068850bd088a128e4077b64ebf7e20e08ccf5db1e5cf9f4a2c4

                          SHA512

                          482d0b2871d74626abf4051ef332d813a1304f975441820dd112a69b1b5d211df042d5cd836a2ef3ca0ab0f974b441756c85c1fb1ee8128f11e9f106808322e4

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          da106397022a1c6c0b8c910a1d7397af

                          SHA1

                          3c94b26e674b4c05b8ae6437b797eb30ce431c33

                          SHA256

                          415af2785fd244fc5a52a51644276dd5d3dd038834b5cf5f0487a57283cf4ec8

                          SHA512

                          61f810a3252a87ff61d7f0872f85513d2c54e1257307eabd8241ac7da6af5b8cd3ce7b61bd5911cc86aaf93cf573d30fa5a84d07744beccadfb0475e06269b8c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          bfbb1cf5575dc3abc5297da787125cb4

                          SHA1

                          e20b7252514812f499c35af1281eda72d5590c93

                          SHA256

                          e340b3ad12bd2d3a25c905f854242d4976d05ccfba0b64f3af8e5f956dea25e7

                          SHA512

                          c9f83db5a342935b96fc9fcc84211da90131145d5ec20512f1682ad2b220cb6db3fb78055ed67ce1612de0ce2fa2e0fc09ffd2596f35aff72aac405c3221986a

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          e4a0a54b9c5e5c16c8fab7399d8038e5

                          SHA1

                          b09216789aabecd5a138b52e71aa844805ec6083

                          SHA256

                          1ddef28627d7959b3d77dcfa2cf4997fa754cd3e6d2529381299e451aeda093a

                          SHA512

                          9b6f26d25b77090d6bbbcdb0bdeacc98b60aa3802ca2581dfb42f0c9482159e98b0aae3fc18135469a29b11cd552920bcab19552759a3ea65e4d99333dcd005a

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          f1dcdc3dc8caa62d6022924fb224426a

                          SHA1

                          683b151e7ff59ed590a340580740a919a7d7588a

                          SHA256

                          3ed59ce2bc52b38c1bc02d9913ccb9920309f9bc24d9d6f5eb430e901e216747

                          SHA512

                          a8a895ae3e4209db972b2d6e097ee784d397ce37dd9ede1d5483b03c4345d4cfc4b236e9d4ba6b78fc7391fc495385d59f9dafd4d9690b35eb8bc0dff76fa1d0

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          fcfd6ff6ca81ca30e61759271aebb6be

                          SHA1

                          f94690ce4e59e780a96fe1011ae816f1bced5f04

                          SHA256

                          9df50acc61b242c021172e353147b18e771e79e05ed2034cb0a14aa77bda7e83

                          SHA512

                          a1d8a32b70963f31426f51717f9182bbfe464a14d26f5f111fe98798e9d940e78430fb4d3a9507bb55ed3fbfc661ffbf439f2e000f1f3f812f40a96e528bd497

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences~RFe576254.TMP

                          Filesize

                          1KB

                          MD5

                          54394ba89cb7d1ccae61e1a72e930d91

                          SHA1

                          7b2c679c8076573cfacc024692c3dddc1f551c8c

                          SHA256

                          a470b0ef5b4a484126b7e7fce3c3485e80f580a99ff4f57f04770059949368e7

                          SHA512

                          2428291f125894b426348df6a0f3756fd26c7786ea2aff03d89aaae77d409f09a5b8512bf06633a70f28fbf86793ed26c6ac3b67cc411b907e49cd3d344e8cff

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          77KB

                          MD5

                          25fa1fa15f86ff7ac1493cc21e847eac

                          SHA1

                          0245df77c06d829a33d628a32a41f1cf092076c5

                          SHA256

                          f130f6acfd0df43a519cb08a890d9826fede7807f10264a927d06903f51ca22b

                          SHA512

                          31bd7ebb614647466fc92b4196233da6b344744ba84475e77130f08a004786864a4e028e5d0917d655e36d4af40fad7ffbe20df92457a65ad220d0b00f142b42

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          77KB

                          MD5

                          c501e08d1669a18f420d419fb1ae8192

                          SHA1

                          01e7da2ccf1cfd51d6eca8e50dc81ee07488b492

                          SHA256

                          d0ff87320b3ae74e55a5246cad2673b8807bc635c56db839ed30d38fe251985a

                          SHA512

                          e7091313bec271edd65966c39c6210300d4bc78d91b3f3ad71c3fd715b27b3b12fb297d5b8c038de3f0b4c563b12145514af768613cf4aff9152d6264ccca7d1

                        • C:\Users\Admin\AppData\Local\Temp\chrome_installer.log

                          Filesize

                          7KB

                          MD5

                          821fc5af140fe637ef399648bef61cc7

                          SHA1

                          0337eef38b93071aae71129da135a95a09da25bf

                          SHA256

                          72caca883a975e1fd01eda7e04df4ba5c2899580a5e25ad7f753ad8ffdb7948b

                          SHA512

                          535b14289f093c1ad9ee33a3f529d9e1bdaec00e9bace1ee0f4a34cbf4d3952e23af64d382677a58a53fd126d22a00ef4860c69253b0adfde23d6cf424c76e9e

                        • C:\Users\Admin\AppData\Local\Temp\chrome_installer.log

                          Filesize

                          8KB

                          MD5

                          8e780d52ca32113040db17493d78b6db

                          SHA1

                          f79fbfa913fac9eb7bdae61ba9d41887f524085e

                          SHA256

                          072af19f38f3206d5f6edc9dfe62f76a8217cc564ac0c820d594c9ca058f68ec

                          SHA512

                          677869e4e5561edfc5527c25a31c2cd09286b74e3cc03f9886fed98d68af88430e36216a8341dd239d1cf6121eefebc6ae3c7169c7067e192fe634e87cd43105

                        • C:\Users\Admin\AppData\Roaming\77a5a4f0aa61dacc.bin

                          Filesize

                          12KB

                          MD5

                          3411a84146caa29ce47347084808b801

                          SHA1

                          e52399cd65fdfbee057033e682630827f307d8b6

                          SHA256

                          a3bdf5c61a7805619293942365b86cff6f267637e7e43352f073857100148647

                          SHA512

                          c5d5d1d2e95e0e026ccd201790fa599ce0ac8d72b0e8606f81f589f6f53070911f39f43772f5bb07fb9a6d0f09f3ca88dbc129b239ca041e1f46cb912993cd7d

                        • C:\Windows\SysWOW64\perfhost.exe

                          Filesize

                          588KB

                          MD5

                          573a3238a03c6c8ae3b2ab7b96674193

                          SHA1

                          cbce9e478ebee48e15cacb0660ed259225782a0b

                          SHA256

                          787ccdb2d32abe53f2971c87e0f9310c4d720c2e879df2c1f6215893e57fa1b9

                          SHA512

                          652f35d7e5826a572e3e93c86d9c71bc1bb2e9a8671368d184582986006d3bbfadd5cec91d97d61f0da03ec26d785266425e6c28493f09049be42f3f93603361

                        • C:\Windows\System32\AgentService.exe

                          Filesize

                          1.7MB

                          MD5

                          54f81b2ab5dcb40f71247452b67e7432

                          SHA1

                          37e8186addf6f60cf3d84aa054aac718fed9ff7d

                          SHA256

                          5d0e5d2b86a28bf3297f2e5e1c0dccad9292cba041f3ab6ba5bc0652f9dcb17d

                          SHA512

                          d34ba80427ca168d042b8aa35a4cbfd4d49ab9d1525f52ad89aaa4fb9522c014face42fd720bdb6292540a33a45db03e64e039ceb5d8dd67df97c46d9d7da961

                        • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

                          Filesize

                          659KB

                          MD5

                          7b57df3f6a81d139f1123e763d9b22e0

                          SHA1

                          83c4a8b3fe87b5726ba35ff929eaaa112009e563

                          SHA256

                          bedd6a40c2673aa93aff46339551020b62992fbd700f6763f4dd8c623e59f1ce

                          SHA512

                          7c10d9e92542746741b2a210a9ffe4c2c852e33981573c802ebbf510e7365223446a84277a61ea3ccb6a6ea5a5725df75b3955a7244f1e27510b3e7a142e8e14

                        • C:\Windows\System32\FXSSVC.exe

                          Filesize

                          1.2MB

                          MD5

                          7a99ff6f661c56d45bbfaebe20248ae2

                          SHA1

                          10179a2fe453050878d4c19fb233d18780202ff0

                          SHA256

                          e893a41f292d0c67f494159293260d338d67eb0c827ef7b00621b3af3b77660e

                          SHA512

                          629ff486e4391f0838ad07f670ec2baf592f337890415301f59cbf07dd8502a1cf953d925434e34dc7644b417ee58548781ec37cb3e73ae5f4a9b7958b2db01e

                        • C:\Windows\System32\Locator.exe

                          Filesize

                          578KB

                          MD5

                          d5fd80225139190ae39078bed0f34cbe

                          SHA1

                          a466d8b69f5ae66045d1da5a89067489767acd9a

                          SHA256

                          94d1eeb17905ce201af767703d973faa24745a9aef8fab6e5884815a865e08a6

                          SHA512

                          57fa473b62ff93465592bc22a8190ed70764a675e007492523a1a75a0fb8f9c64fc9f084909230f6f1dfaccd5cb59a675174eda5c153a4ed78a22e4968d20f94

                        • C:\Windows\System32\OpenSSH\ssh-agent.exe

                          Filesize

                          940KB

                          MD5

                          f51a7ceca06095888c9622b07e3e2f16

                          SHA1

                          32812f6144ccda5f05332f69e281a716054312e0

                          SHA256

                          24682afc8023910a62c4b6c73d126b47896b554229d42413086845601ce6df19

                          SHA512

                          edcf15a99326c4c83eab213ec809d1fbb01a41372ee8c505a39d9689caa525e2999a2a9992bec05eadba33ae7a7951a236314871b8bf4ae57d184eeede521be8

                        • C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe

                          Filesize

                          671KB

                          MD5

                          a827086d085a09704294c8dac3891e45

                          SHA1

                          ac7bb52ba413bf3ab3be12ab97524f6bd15d7e1c

                          SHA256

                          405d57d8d2c477de162f2731a05b106dd3166c1e88e4df8d490ffcbb3e36ba72

                          SHA512

                          98ad9898f528f19c4186d8759870f3733210bb1d32cbb8cd3d5fb9edd5050f43a1ebb960fd4fdc1956fba5c910877f927a01cabceaf15dd284c57b9bb59ebb0c

                        • C:\Windows\System32\SearchIndexer.exe

                          Filesize

                          1.4MB

                          MD5

                          9ed60fb37102fcafea8b69d87033121b

                          SHA1

                          c931965f0b84362630a0f6e20a66d817d53eadd6

                          SHA256

                          cc9f4b5dd6f4c8117e1d9208fb4f9d17f6f1d099214e5a9de888163b31c352d0

                          SHA512

                          2468ba99dc09242e47c615d3c9f9b594eb4e9ad761f9d101bfccfed8309437d1b38149e3fa67d5f8fa2a77f891a2d8572784d43a331f0be72ab82c98fba18ba3

                        • C:\Windows\System32\SensorDataService.exe

                          Filesize

                          1.8MB

                          MD5

                          557a5a34d29c5e12659dcffcda1aa46a

                          SHA1

                          fa11eda8ab769e4f26311910f8a701c12e3629cd

                          SHA256

                          8b6b137ee335400886042636bd89c1ce040e58243c88c82c74b692bedd3eec97

                          SHA512

                          8ef3ad7b4cce125d1b9a7e4ba8d3ebb288a737239b0b981a5db50dbfc4cd360b8386f93c1192fea2f5731738f5f342cecc6549b20f311b1321635e9354f5052c

                        • C:\Windows\System32\Spectrum.exe

                          Filesize

                          1.4MB

                          MD5

                          fccf746b2c299f15fdcc2b5924dedeb3

                          SHA1

                          4f46570d6c850409ddc439f3e0b6fa322cbb54b2

                          SHA256

                          da081dd760cd9fdd94644fb3d2d87b2db77008b1101a4998d01463e5d7f26cc2

                          SHA512

                          81ff7a9a001878370264f9546cc3e25a0c1ffbc9730071c30c6cb053662da70dc17c57fe977ac7ba28595043b7e0eb3fdfea8483b0a97dd7fdc84870a45e2cd8

                        • C:\Windows\System32\TieringEngineService.exe

                          Filesize

                          885KB

                          MD5

                          f90e9c097368f8489952383208b3f428

                          SHA1

                          f34154fcb4c4a5b88ce2c3316f4eea06cb5ce523

                          SHA256

                          c1ce27b2d8a746a3b5d902aa00d4306236f618341c77a35b501cfdbe454a20e3

                          SHA512

                          3f1e0357eb490ec2b46ce56739da096939ef7bbffff0244af3663c0aa62ad0888526da27de491837f5ef8cfca244d6726272d0ac4ffcc76046b44c5f0df6e8a6

                        • C:\Windows\System32\VSSVC.exe

                          Filesize

                          2.0MB

                          MD5

                          dd71bcbccb72b097f779e4751a1bcee2

                          SHA1

                          ed6e5641431cb85029fcf9583213285d18ab8b4f

                          SHA256

                          79cafe798f4b772af461eb7ba58aa197a93ab862be3ad91a4b138d8fe1361c03

                          SHA512

                          aa7ac157cfb5568d72633c043c39d22d6a41ea6e3663c4c50063d6058ec63da0ac354239fa727d165cd0997018477154e58e8bea14652ae8a7542cab47427c6f

                        • C:\Windows\System32\alg.exe

                          Filesize

                          661KB

                          MD5

                          a20f4ca8c2e7bcd389da885c54fa2254

                          SHA1

                          971fe4e358e26f119f0ce33a42726a426c6f1c44

                          SHA256

                          2a32cedaaaf0f9ca5ca21227e36e007182663d888b765e37ffbe04d71f541797

                          SHA512

                          22a1ce29981b8b32848a4a7ac119b720ab0017622a75c58bace7087edc59346a81f788cae6eea3b2696c9334b2c3188b0cee4b40666501303a4d876842a677e1

                        • C:\Windows\System32\msdtc.exe

                          Filesize

                          712KB

                          MD5

                          1e8d1e01666997d5405d63e2cad08bca

                          SHA1

                          d27b6cad1ec0a1d38a47ca75be523aa092d8c869

                          SHA256

                          882ce2d10390efdc08818ba6b85c56c2dc68463d7eed6ff81228ef2d6d80af78

                          SHA512

                          96d7e377797b928c9c141b49b2b71a5a31f163e1bb4d5ca73ca9e30a4e6aa1c393dbb2e1203934c26b74c21d80e5b7e1957a9d3e525411d87dc3942eb57ce3bb

                        • C:\Windows\System32\snmptrap.exe

                          Filesize

                          584KB

                          MD5

                          abc6d7a88c8dcdeb6a8c5519b36f4e00

                          SHA1

                          8cd2a055ea6560098a129e358b28ae54b97c2355

                          SHA256

                          bd567b6c3241011e5213b6b9660ed81b8ffaed15d87960aab120f5886e095cc8

                          SHA512

                          3c62fb48c3d7e05dc655cfde2cf33a68fccca535ce23d348314887d3477990c0754edfdcccdff165763f0621136fa2a032db9a3f7cea4e46626ced345be6eaed

                        • C:\Windows\System32\vds.exe

                          Filesize

                          1.3MB

                          MD5

                          d7e7212d7c8a31c23711a481bf853eec

                          SHA1

                          e6758555861069657f6b527978899c2db3527575

                          SHA256

                          23754fab79bba2c4529e66f28a729a038ad6a93fc2d6d91c830c3ec0a10a537e

                          SHA512

                          2e9df4ac687450aa87105cc1980bf036bf80c362e1f0e709d01c7edd0982bf6d425846e29109042ff8b998ae29b33c7540886a75556ddb678a984f272a207d54

                        • C:\Windows\System32\wbem\WmiApSrv.exe

                          Filesize

                          772KB

                          MD5

                          ac806e8edca3a8d3a9d82e8732d9d5fa

                          SHA1

                          d733601aa75da659abc458818b1ddcd23926245f

                          SHA256

                          a81a7bb6fd0835b5a8380c0f57a13ab14ed0e21ba6042c47ae189f32c72ec34f

                          SHA512

                          73ea104cc17875feaccccc5787e2d3a83fcf829c6109c4735bfd582614598fa2a570d12f0f86b6c942d6ebb71465963be8cfba66ba2d305979d8b8e02548c861

                        • C:\Windows\System32\wbengine.exe

                          Filesize

                          2.1MB

                          MD5

                          b0b4e35f499f3f2595d325d09df1bfb5

                          SHA1

                          21202afb2772e6504b0ce2e76ec8412aede4fca9

                          SHA256

                          6fc8eb0c98a0a4a87acf39ce2961324f659ce6c8a237b30d7f5030d8be4c104e

                          SHA512

                          b1ce12b67707f22c529b203599d32efd029fd6a94c51772d348cf43816c87ed05871f82c6665282df470bf559981d00c973b8180adc50452cdc194fa89f073fd

                        • memory/436-212-0x0000000140000000-0x00000001401C0000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/1208-101-0x0000000140000000-0x00000001400CF000-memory.dmp

                          Filesize

                          828KB

                        • memory/1208-89-0x0000000001A60000-0x0000000001AC0000-memory.dmp

                          Filesize

                          384KB

                        • memory/1300-72-0x0000000000440000-0x00000000004A0000-memory.dmp

                          Filesize

                          384KB

                        • memory/1300-314-0x0000000140000000-0x0000000140234000-memory.dmp

                          Filesize

                          2.2MB

                        • memory/1300-443-0x0000000140000000-0x0000000140234000-memory.dmp

                          Filesize

                          2.2MB

                        • memory/1300-66-0x0000000000440000-0x00000000004A0000-memory.dmp

                          Filesize

                          384KB

                        • memory/1472-718-0x0000000140000000-0x0000000140592000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/1472-10-0x0000000000710000-0x0000000000770000-memory.dmp

                          Filesize

                          384KB

                        • memory/1472-19-0x0000000000710000-0x0000000000770000-memory.dmp

                          Filesize

                          384KB

                        • memory/1472-33-0x0000000140000000-0x0000000140592000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/1484-85-0x00000000001A0000-0x0000000000200000-memory.dmp

                          Filesize

                          384KB

                        • memory/1484-720-0x0000000140000000-0x000000014022B000-memory.dmp

                          Filesize

                          2.2MB

                        • memory/1484-313-0x0000000140000000-0x000000014022B000-memory.dmp

                          Filesize

                          2.2MB

                        • memory/1484-79-0x00000000001A0000-0x0000000000200000-memory.dmp

                          Filesize

                          384KB

                        • memory/1768-317-0x0000000140000000-0x00000001400AB000-memory.dmp

                          Filesize

                          684KB

                        • memory/2124-345-0x0000000140000000-0x0000000140216000-memory.dmp

                          Filesize

                          2.1MB

                        • memory/2160-325-0x0000000140000000-0x0000000140102000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/2780-332-0x0000000140000000-0x0000000140147000-memory.dmp

                          Filesize

                          1.3MB

                        • memory/2788-16-0x0000000140000000-0x0000000140592000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/2788-0-0x00000000020F0000-0x0000000002150000-memory.dmp

                          Filesize

                          384KB

                        • memory/2788-34-0x00000000020F0000-0x0000000002150000-memory.dmp

                          Filesize

                          384KB

                        • memory/2788-35-0x0000000140000000-0x0000000140592000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/2788-6-0x00000000020F0000-0x0000000002150000-memory.dmp

                          Filesize

                          384KB

                        • memory/2804-324-0x0000000140000000-0x0000000140169000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/2848-316-0x0000000140000000-0x00000001400CF000-memory.dmp

                          Filesize

                          828KB

                        • memory/3164-319-0x0000000140000000-0x0000000140095000-memory.dmp

                          Filesize

                          596KB

                        • memory/3324-52-0x0000000000680000-0x00000000006E0000-memory.dmp

                          Filesize

                          384KB

                        • memory/3324-311-0x0000000140000000-0x00000001400A9000-memory.dmp

                          Filesize

                          676KB

                        • memory/3324-46-0x0000000000680000-0x00000000006E0000-memory.dmp

                          Filesize

                          384KB

                        • memory/3404-330-0x0000000140000000-0x00000001400E2000-memory.dmp

                          Filesize

                          904KB

                        • memory/3420-341-0x0000000140000000-0x00000001401FC000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/3436-721-0x0000000140000000-0x00000001400C6000-memory.dmp

                          Filesize

                          792KB

                        • memory/3436-348-0x0000000140000000-0x00000001400C6000-memory.dmp

                          Filesize

                          792KB

                        • memory/3784-719-0x0000000140000000-0x00000001400AA000-memory.dmp

                          Filesize

                          680KB

                        • memory/3784-36-0x0000000000610000-0x0000000000670000-memory.dmp

                          Filesize

                          384KB

                        • memory/3784-37-0x0000000140000000-0x00000001400AA000-memory.dmp

                          Filesize

                          680KB

                        • memory/3784-22-0x0000000000610000-0x0000000000670000-memory.dmp

                          Filesize

                          384KB

                        • memory/4244-349-0x0000000140000000-0x0000000140179000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/4244-722-0x0000000140000000-0x0000000140179000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/4488-318-0x0000000000400000-0x0000000000497000-memory.dmp

                          Filesize

                          604KB

                        • memory/4504-77-0x0000000140000000-0x0000000140135000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/4504-56-0x0000000000A30000-0x0000000000A90000-memory.dmp

                          Filesize

                          384KB

                        • memory/4504-75-0x0000000000A30000-0x0000000000A90000-memory.dmp

                          Filesize

                          384KB

                        • memory/4504-62-0x0000000000A30000-0x0000000000A90000-memory.dmp

                          Filesize

                          384KB

                        • memory/4580-315-0x0000000140000000-0x00000001400B9000-memory.dmp

                          Filesize

                          740KB

                        • memory/4756-605-0x0000000140000000-0x00000001401D7000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/4756-320-0x0000000140000000-0x00000001401D7000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/4800-556-0x0000000140000000-0x00000001404AD000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/4800-568-0x0000000140000000-0x00000001404AD000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5068-321-0x0000000140000000-0x0000000140096000-memory.dmp

                          Filesize

                          600KB

                        • memory/5356-733-0x0000000140000000-0x00000001404AD000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/5356-557-0x0000000140000000-0x00000001404AD000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/6000-518-0x0000000140000000-0x00000001404AD000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/6000-579-0x0000000140000000-0x00000001404AD000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/6108-732-0x0000000140000000-0x00000001404AD000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/6108-522-0x0000000140000000-0x00000001404AD000-memory.dmp

                          Filesize

                          4.7MB