Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 14:39

General

  • Target

    2d5a7950f833be277b05a9c52d77bc85.exe

  • Size

    1.8MB

  • MD5

    2d5a7950f833be277b05a9c52d77bc85

  • SHA1

    88764923d50c5105da5327a58fe2750f764aa880

  • SHA256

    d04f0d88706837f7af27edf86b3c0e3241bad8ab43939ddda29dc6541b20eed2

  • SHA512

    b6a825776c399d04bcbc831d5b480370a2ff28d329bd5e662a84e11bcf1b249d78133655cfb4df2a6952d1a721a657e5457f459be3630a3343d93de4aa0feaed

  • SSDEEP

    49152:gQ6KL5ujxgsuV8mkGPJRZ0MixJ8u1Dv9LQg8:gLKLwxska/WcG9LQ

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

0657d1

C2

http://185.215.113.19

Attributes
  • install_dir

    0d8f5eb8a7

  • install_file

    explorti.exe

  • strings_key

    6c55a5f34bb433fbd933a168577b1838

  • url_paths

    /Vi9leo/index.php

rc4.plain

Extracted

Family

stealc

Botnet

sila

C2

http://85.28.47.31

Attributes
  • url_path

    /5499d72b3a3e55be.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 14 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d5a7950f833be277b05a9c52d77bc85.exe
    "C:\Users\Admin\AppData\Local\Temp\2d5a7950f833be277b05a9c52d77bc85.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Users\Admin\AppData\Local\Temp\1000016001\172d16c90b.exe
        "C:\Users\Admin\AppData\Local\Temp\1000016001\172d16c90b.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:668
      • C:\Users\Admin\AppData\Local\Temp\1000017001\a6b54a2800.exe
        "C:\Users\Admin\AppData\Local\Temp\1000017001\a6b54a2800.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:992
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1552
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1552.0.1419545717\313100822" -parentBuildID 20221007134813 -prefsHandle 1212 -prefMapHandle 1204 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d07e8f8e-9689-44bd-a7c6-1e7814ae5bea} 1552 "\\.\pipe\gecko-crash-server-pipe.1552" 1276 10bda658 gpu
              6⤵
                PID:2304
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1552.1.343436588\2024257794" -parentBuildID 20221007134813 -prefsHandle 1480 -prefMapHandle 1476 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {edbaf02b-2529-46c6-89fd-2d18121ccd28} 1552 "\\.\pipe\gecko-crash-server-pipe.1552" 1492 f4fc958 socket
                6⤵
                  PID:2472
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1552.2.1506249330\1767734121" -childID 1 -isForBrowser -prefsHandle 2124 -prefMapHandle 2120 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 848 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2d65b92-310d-4e8f-bc54-41a0381e10af} 1552 "\\.\pipe\gecko-crash-server-pipe.1552" 2136 19a93558 tab
                  6⤵
                    PID:932
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1552.3.1916573191\968507331" -childID 2 -isForBrowser -prefsHandle 2916 -prefMapHandle 2908 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 848 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {83f380d2-0ba9-4626-a88d-b877d77744b3} 1552 "\\.\pipe\gecko-crash-server-pipe.1552" 2936 1c758858 tab
                    6⤵
                      PID:2996
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1552.4.2146460694\832646895" -childID 3 -isForBrowser -prefsHandle 3832 -prefMapHandle 3812 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 848 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a022195-6167-4149-89da-a470fab3e56c} 1552 "\\.\pipe\gecko-crash-server-pipe.1552" 3856 205da458 tab
                      6⤵
                        PID:564
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1552.5.1680003533\1552617065" -childID 4 -isForBrowser -prefsHandle 3936 -prefMapHandle 3940 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 848 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c63a09b-716e-44f9-87f9-a6ef791bf6c8} 1552 "\\.\pipe\gecko-crash-server-pipe.1552" 3912 205dc258 tab
                        6⤵
                          PID:2884
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1552.6.1672674348\1280716799" -childID 5 -isForBrowser -prefsHandle 3924 -prefMapHandle 3928 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 848 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {daed9267-0f68-441d-b9dc-28c2c2d0f01f} 1552 "\\.\pipe\gecko-crash-server-pipe.1552" 4040 205dc558 tab
                          6⤵
                            PID:2824

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\sexvjvzg.default-release\activity-stream.discovery_stream.json.tmp

                  Filesize

                  29KB

                  MD5

                  f10c909b731038394ddcc35d5f71c3a1

                  SHA1

                  79382aafc1f4dc2ce25e0a95f3e8a0e131358656

                  SHA256

                  e9aab47cc62a9538db835ee94660e6c441307bdc907e49a9a0ddbcca995f20e9

                  SHA512

                  6bfe609d0f93d22677608ea376e6f39b82e28524ee9feb3b6ae08a482ccb9ce5a2335443ad4116357154f75dfc4c9128017c9007f791ac2da663c6de723fc912

                • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

                  Filesize

                  1.8MB

                  MD5

                  2d5a7950f833be277b05a9c52d77bc85

                  SHA1

                  88764923d50c5105da5327a58fe2750f764aa880

                  SHA256

                  d04f0d88706837f7af27edf86b3c0e3241bad8ab43939ddda29dc6541b20eed2

                  SHA512

                  b6a825776c399d04bcbc831d5b480370a2ff28d329bd5e662a84e11bcf1b249d78133655cfb4df2a6952d1a721a657e5457f459be3630a3343d93de4aa0feaed

                • C:\Users\Admin\AppData\Local\Temp\1000016001\172d16c90b.exe

                  Filesize

                  261KB

                  MD5

                  d9ba49cf30d6d02ccaac5f46f5094640

                  SHA1

                  607df9affcb65ecd0bf3bc39ed7cb895c4b05a4a

                  SHA256

                  2c7b847e456e5723a96afc7e7ba57cc4092d77b96c88294b9efe4ecf7bec162c

                  SHA512

                  1f0d4796b62a1f3b715744d6852f9a8cdef56187087b8865fa354926eae9087fe2d8660b440cc848a8452968265a16eca5323df4d45ef0a5d1453c5839f10565

                • C:\Users\Admin\AppData\Local\Temp\1000017001\a6b54a2800.exe

                  Filesize

                  3.1MB

                  MD5

                  ecc82245442e28fe295f5f4960364b20

                  SHA1

                  00e5c5e558831058824ad9a309e10cd19985a4a2

                  SHA256

                  10ad94fe940be336a59041b9f2bd2df21c2e13739ea6d3a5f3e2f7e8ea9a9632

                  SHA512

                  48634575b898c59dd8cba2568a25c1b75664983dc1d9ab36145bf8c285a71507d67bc47491781339a9b234fadd5036d4ec98576c46a586af488dca9d1ada623e

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                  Filesize

                  442KB

                  MD5

                  85430baed3398695717b0263807cf97c

                  SHA1

                  fffbee923cea216f50fce5d54219a188a5100f41

                  SHA256

                  a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                  SHA512

                  06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                  Filesize

                  8.0MB

                  MD5

                  a01c5ecd6108350ae23d2cddf0e77c17

                  SHA1

                  c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                  SHA256

                  345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                  SHA512

                  b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  2KB

                  MD5

                  0c4a9602b2100c1ebda38bd220efc790

                  SHA1

                  c66d6f065bdd247578ceabc2260b7a7c85167f34

                  SHA256

                  4bdf14884c76cfe42b5eedd57c3bb73a9bec41fc1655e59e757c769321e869cc

                  SHA512

                  fb156c473a6c1b9585b07c67b3bdce2931c46bbaadb887eb72870cdbe43ff51bff11aba60e6650193247fc4f1cadca435b1b51a4c6500c94fa41b3a03c386743

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\datareporting\glean\pending_pings\03daa1b3-a629-48db-bf7b-b4a04181cb2a

                  Filesize

                  745B

                  MD5

                  9bea6f05cca5de755f52f4bbf0587913

                  SHA1

                  977ea2e75c2f7c8751447da26c973f765ae2153c

                  SHA256

                  1c2a7f15364889fdbc9f87658448fec4f92aa328295c69aa2b656dccfaa35766

                  SHA512

                  bd04accfc4b5d7d3abb12f062cfa9553743ce3f29d25ce63e283736bf873314150f0eb9b7ba6e6efe47cb011a30ffe7f4e3ae1fda7ba35ef01712e6a7ab0d8a6

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\datareporting\glean\pending_pings\0eb91d04-2064-4282-80aa-c37804007431

                  Filesize

                  12KB

                  MD5

                  b510c1ced2ad9206239784ead5a595dc

                  SHA1

                  ec9c4c538ec2f05f5c98da10e99081da2b8b9646

                  SHA256

                  ddc421a5f1311e4e556d1bdc668ceadb98adc4ac1b9019424c2c7e1e2522aa6a

                  SHA512

                  e90e8abb3cd5e29953c20b7a93ccf9b9a5c422a620542cce6add8eb00775babc74f99ebec3acaa18528c8702ba3d941bc903ba0391ebefafb0ab4d3143862c5b

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                  Filesize

                  997KB

                  MD5

                  fe3355639648c417e8307c6d051e3e37

                  SHA1

                  f54602d4b4778da21bc97c7238fc66aa68c8ee34

                  SHA256

                  1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                  SHA512

                  8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                  Filesize

                  116B

                  MD5

                  3d33cdc0b3d281e67dd52e14435dd04f

                  SHA1

                  4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                  SHA256

                  f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                  SHA512

                  a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                  Filesize

                  479B

                  MD5

                  49ddb419d96dceb9069018535fb2e2fc

                  SHA1

                  62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                  SHA256

                  2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                  SHA512

                  48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                  Filesize

                  372B

                  MD5

                  8be33af717bb1b67fbd61c3f4b807e9e

                  SHA1

                  7cf17656d174d951957ff36810e874a134dd49e0

                  SHA256

                  e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                  SHA512

                  6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                  Filesize

                  11.8MB

                  MD5

                  33bf7b0439480effb9fb212efce87b13

                  SHA1

                  cee50f2745edc6dc291887b6075ca64d716f495a

                  SHA256

                  8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                  SHA512

                  d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                  Filesize

                  1KB

                  MD5

                  688bed3676d2104e7f17ae1cd2c59404

                  SHA1

                  952b2cdf783ac72fcb98338723e9afd38d47ad8e

                  SHA256

                  33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                  SHA512

                  7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                  Filesize

                  1KB

                  MD5

                  937326fead5fd401f6cca9118bd9ade9

                  SHA1

                  4526a57d4ae14ed29b37632c72aef3c408189d91

                  SHA256

                  68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                  SHA512

                  b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\prefs-1.js

                  Filesize

                  7KB

                  MD5

                  4628a7e7baf117f79a53420d0ddcfe9b

                  SHA1

                  007a5a078d89d6443bf35513b57d0a6094236ef8

                  SHA256

                  1dbbabe5565ae71cf3cc1b784125ccaa1316c9f56246f24945cc53466f57e21a

                  SHA512

                  735ef62becea48f4681fea03c324661b4006dd4ad0de71701bc78c0c0206185f910499ec440f5a974a7ce0a4f588eec057ee29378e469e5d8ad6563c29afeff7

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\prefs-1.js

                  Filesize

                  7KB

                  MD5

                  228f02b188ccb7a3970744a5ffb48074

                  SHA1

                  1579aeec6f5661bf01d0624c7d5bf6c41dd41d73

                  SHA256

                  a67b4a5268ac63ecd76348204e2a4fd6f52362c7637e3b6c232d6808009789dc

                  SHA512

                  5bea293523d718574f06e36c4b91c1c75f8f228d75db23c5c69cefa14c5dbcb00c798aa18b137c20268beed57c94af895d27522c43f3997be185dbf58e6a9014

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\prefs-1.js

                  Filesize

                  6KB

                  MD5

                  0e8a0671c8b15772a4911edf67175c0c

                  SHA1

                  4c8352d58fc92fb26719c83407fb01990410bcf1

                  SHA256

                  5d19e1cd40fd92d92f6fb37e8007b461591d6b7e92c4b21f10b4647b3464fb79

                  SHA512

                  2d2c42e94d00f25241a2d5adc722bb25e4000ef02b30ac64a9d6ca38391e9fb010e967e1a5cbc9a2ab3fa762b49cc488a17796595f165bffd9d5342661060065

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sexvjvzg.default-release\sessionstore-backups\recovery.jsonlz4

                  Filesize

                  4KB

                  MD5

                  6ebfd29ae9d319c175c160ac23e2aad0

                  SHA1

                  00a1550aba0334eab68c3aa3447bd554ae071484

                  SHA256

                  5e346c1dcdb2737cb65a8c04caa4da17ee1ffc713c037bd1df38a0ef396c2d8d

                  SHA512

                  cbe66293b233dadf36333217908596fd573a37df0fbbd48ed4b9b1c0943bc124be649502a065df29610cff37a53a640c7197ec2ea30bff141d0b4daa84306368

                • memory/668-57-0x0000000000400000-0x000000000245A000-memory.dmp

                  Filesize

                  32.4MB

                • memory/1728-222-0x00000000000A0000-0x0000000000B7F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/1728-229-0x00000000000A0000-0x0000000000B7F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/1728-55-0x00000000000A0000-0x0000000000B7F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/1728-346-0x00000000000A0000-0x0000000000B7F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/1728-340-0x00000000000A0000-0x0000000000B7F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/1728-338-0x00000000000A0000-0x0000000000B7F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/1728-203-0x00000000000A0000-0x0000000000B7F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/1728-335-0x00000000000A0000-0x0000000000B7F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/1728-334-0x00000000000A0000-0x0000000000B7F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/1728-332-0x00000000000A0000-0x0000000000B7F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/1728-329-0x00000000000A0000-0x0000000000B7F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/1728-221-0x00000000000A0000-0x0000000000B7F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/1728-318-0x00000000000A0000-0x0000000000B7F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/1728-314-0x00000000000A0000-0x0000000000B7F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/1728-313-0x00000000000A0000-0x0000000000B7F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/2104-5-0x0000000000120000-0x00000000005CA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2104-3-0x0000000000120000-0x00000000005CA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2104-0-0x0000000000120000-0x00000000005CA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2104-1-0x00000000776C0000-0x00000000776C2000-memory.dmp

                  Filesize

                  8KB

                • memory/2104-2-0x0000000000121000-0x000000000014F000-memory.dmp

                  Filesize

                  184KB

                • memory/2104-17-0x0000000000120000-0x00000000005CA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2104-16-0x0000000000120000-0x00000000005CA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2104-9-0x0000000000120000-0x00000000005CA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-315-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-330-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-18-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-19-0x0000000001111000-0x000000000113F000-memory.dmp

                  Filesize

                  184KB

                • memory/2372-312-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-228-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-23-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-21-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-317-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-20-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-220-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-58-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-331-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-216-0x0000000006B90000-0x000000000766F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/2372-333-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-207-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-204-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-336-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-337-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-202-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-339-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-54-0x0000000006B90000-0x000000000766F000-memory.dmp

                  Filesize

                  10.9MB

                • memory/2372-174-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB

                • memory/2372-347-0x0000000001110000-0x00000000015BA000-memory.dmp

                  Filesize

                  4.7MB