Resubmissions

19/08/2024, 09:37

240819-llp1nawgrg 9

Analysis

  • max time kernel
    150s
  • max time network
    114s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 09:37

General

  • Target

    Bandicam 7.1.3.2456.exe

  • Size

    28.6MB

  • MD5

    c5b8907b4407dc5f86b1b300a799d007

  • SHA1

    4883f42ed8c7aa16b05eb6ac5469a90b821092ce

  • SHA256

    97391204d97cc1bdbdacd6e51655e7c6070b03c4d093baaeacf315bf8d04976b

  • SHA512

    029e39e0c1a1f8a3e340c119429eec9b08d49c2d6ecbe8a158c0669af09e7c38a164778bb3c5c4133c2624543ba5acf2687c681f01c6d1fa563a5cff4399c95a

  • SSDEEP

    786432:rjqKjScDomVyOH1k0QwA5oTLrDQAGUvt4Nr7MF0uyfAwCbVyZIf:6KjSte61D5oTLrDpGUvt4qe4EZIf

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 46 IoCs
  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in System32 directory 12 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 38 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bandicam 7.1.3.2456.exe
    "C:\Users\Admin\AppData\Local\Temp\Bandicam 7.1.3.2456.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Users\Admin\AppData\Local\Temp\is-334VF.tmp\Bandicam 7.1.3.2456.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-334VF.tmp\Bandicam 7.1.3.2456.tmp" /SL5="$40110,29686179,66048,C:\Users\Admin\AppData\Local\Temp\Bandicam 7.1.3.2456.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Windows\system32\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\Bandicam\BandiMPEG1\bdfilters.dll"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1896
        • C:\Windows\SysWOW64\regsvr32.exe
          /s "C:\Program Files\Bandicam\BandiMPEG1\bdfilters.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:2296
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\is-KI63R.tmp\bcact.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:464
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo [email protected] // LRepacks"
          4⤵
            PID:1768
          • C:\Users\Admin\AppData\Local\Temp\is-KI63R.tmp\bcact.exe
            "C:\Users\Admin\AppData\Local\Temp\is-KI63R.tmp\bcact.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:2252
        • C:\Program Files\Bandicam\bdcam.exe
          "C:\Program Files\Bandicam\bdcam.exe" /install
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2952
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" "C:\Program Files\Bandicam\bdcamvk64.dll",RegDll
            4⤵
            • Loads dropped DLL
            PID:2820
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Program Files\Bandicam\bdcamvk32.dll",RegDll
            4⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:3020
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe" /C "C:\Program Files\Bandicam\RegVulkanLayer.bat"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2604
          • C:\Windows\SysWOW64\rundll32.exe
            C:\Windows\SysWOW64\rundll32.exe "C:\Program Files\Bandicam\bdcamvk32.dll",RegDll
            4⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:2732
          • C:\Windows\system32\rundll32.exe
            C:\Windows\system32\rundll32.exe "C:\Program Files\Bandicam\bdcamvk64.dll",RegDll
            4⤵
            • Loads dropped DLL
            PID:2872
        • C:\Windows\regedit.exe
          "C:\Windows\regedit.exe" /S "C:\Users\Admin\AppData\Local\Temp\settings.reg"
          3⤵
          • Runs .reg file with regedit
          PID:2068
        • C:\Windows\system32\netsh.exe
          "C:\Windows\system32\netsh.exe" advfirewall firewall delete rule name="BlockBandicam"
          3⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2668
        • C:\Windows\system32\netsh.exe
          "C:\Windows\system32\netsh.exe" advfirewall firewall delete rule name="Bandicam"
          3⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2672
        • C:\Windows\system32\netsh.exe
          "C:\Windows\system32\netsh.exe" advfirewall firewall delete rule name="*Bandicam*"
          3⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:2764
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://lrepacks.net/
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:2972
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:2
            4⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2224
    • C:\Program Files\Bandicam\bdcam.exe
      "C:\Program Files\Bandicam\bdcam.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2620
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x53c
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2744
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2324

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\Bandicam\BandiMPEG1\bdfilters.dll

            Filesize

            4.1MB

            MD5

            ed730387fdcd684b756601b863c47417

            SHA1

            c49ed6d0d46facf4ceaeb21f5d6bfdf9e3587fde

            SHA256

            9cbc29696ad2d582e251bf9c4be5cce618753fa43551d2474e1ae5cc5e1245e5

            SHA512

            e32df727799d33922c6e92f94a7bdb0bc2772d6a6636d15e285d94d3ae4661062e5bc89ec3546b76ec853398f88d972f461327ef687f89093acf1096560d5c3f

          • C:\Program Files\Bandicam\RegVulkanLayer.bat

            Filesize

            118B

            MD5

            b35e7d846a436bf1bc48b53125176f0b

            SHA1

            6e859c9374441da33fb404bff2041bbb6b068f23

            SHA256

            8198189537e866909dbeb383bb3ce43fec3351fe85ca8ddc8e9955193054f808

            SHA512

            00644acf7e72887e4dcc3e29a83362f17fd3f5338d640b0f85407f8ed173f4f3763e2a6e85dca3fdbad2495b90c3aa1761859bdfe539231b250e93ba504a56e2

          • C:\Program Files\Bandicam\WINSPOOL.DRV

            Filesize

            24KB

            MD5

            1164b2b5b087b3b1fd6fe2175de42dd7

            SHA1

            8d8216f14e421c9c482621e2089d3c799cd5e403

            SHA256

            19b78ef90cd2edeba6f20dae20388bee456def192654e91f7f875a21f2125715

            SHA512

            6f0bd82726dbe7cf945ee400c062ef461bf364750a02c90695e83a7af73f5cb95251c7d8eef10479171180d59f970e68231e82c83c0f13275b0a6958d57755e6

          • C:\Program Files\Bandicam\bdcam.exe

            Filesize

            10.6MB

            MD5

            1b45c4367f70735a26b3ea80b58d0464

            SHA1

            9c96763ad410de6e1852fefbbd8cf91c2b4466a9

            SHA256

            590cd167b24ebff4d306542edd107c4b28c9d14bd58b45998e5c61483e897900

            SHA512

            d485a74575a7260d3f14dfd02d2b2eb4a40aebc705175d8408f9bd48158fe1f5df852879319fc8d128661700e4048b2e3337db4343e323afdd1c699479c34b59

          • C:\Program Files\Bandicam\bdcamvk32.dll

            Filesize

            1.5MB

            MD5

            94a3cf774f72b40e4ea39ce61f56b4a6

            SHA1

            cb66b592c57b74b5e8056d0218697613eafc6b93

            SHA256

            369c3da2f17f0c6cdf4823d7fffe64fb724ccd81e2f56dd372f1e561a1be11ad

            SHA512

            fd018e28b345a9a99c836001012fd7eb2779847bcb62cfd4ab1adc5e5b79d7d36e8051b8c0f60c6b56c1b5cfe6f608c462642967d35ed8e53706f38b14a556c2

          • C:\Program Files\Bandicam\bdcap64.dll

            Filesize

            20.8MB

            MD5

            bda866df2c387c8b1f1f5baa9beaeb57

            SHA1

            9de5041e3e7a0704c9eb39aa63750fb043985717

            SHA256

            53060b1821f2b4324c11001b4c261ea9f588a51ed2047fb584c5e8b63325dc49

            SHA512

            cf97a766fcab75abbd75e30d19e2834d72143920e0d95c7cef6173862bf9c7a224ad35f6ab83fcd4ebcbba5abe0d137d1281da6b6cd978d8e6b1292f2b5afb8c

          • C:\Program Files\Bandicam\data\language.dat

            Filesize

            97KB

            MD5

            1a2907234b069c1e52ad296bceb630f0

            SHA1

            202f189aa148ab080225c6fb351b5e664847f8ea

            SHA256

            789704bfc14da7326bb4756b7339026d8915914905e821d57a69804b11a27bf0

            SHA512

            27a8b36ccf0353cb0fc41d1b41f0c66cfe7c41e95a79918498051c1c70b08d9a76ca0c9ca3f5361bf12a5f26be919766a84831ed4171690ab545f68c88612c85

          • C:\Program Files\Bandicam\data\skin.dat

            Filesize

            886KB

            MD5

            e020c3f9b91880a95737067280f5fc70

            SHA1

            26461fb5a67a6ace4d9d149211375e8778f9bbc3

            SHA256

            07e15d0d98e35f2141028ec172131f209737fa04b6cfe51b36ff625a4a1b6c99

            SHA512

            6447f6a795056fe5352b982183c628ff935a082f2c391eb2c4cff04cf6b915691c848799f6dc9d74841e9b999fd04bc8b161d8be09d09aedee19da1914862bb2

          • C:\Program Files\Bandicam\lang\English.ini

            Filesize

            135KB

            MD5

            b48f94b768e4cdfc2998504572a2922c

            SHA1

            03cb83b25fc05cd9d546a6fa95efec1ab768a075

            SHA256

            2450bcab52f43dc0188a5ebab0f508901a072bf0f1888b9186a2894c12442285

            SHA512

            8cbaa4fc1e21db5756d026e52650ff95085677d2f99fe3b137df3bbe7d4b379cc9d8f1cf2b4447e569d44fdacb7db739ef7470f47df7ccbbcf66537b8ede2e67

          • C:\Program Files\Bandicam\lrepacks.net.url

            Filesize

            46B

            MD5

            a3e882ff3bb88149928c0ec217845610

            SHA1

            b715d6d507be647ac179b26b063238935eefea50

            SHA256

            b03184eb33c2263ef0f029bae3ea21255c07b2dcff833b179a66addf752784c1

            SHA512

            8184c650f35061c45b0f09f5d92286aacd2e7060d849adc27aedecbd1fb2991623322981ffe7ff1027e83291c696c98ff5f24d31283be96a9d2701649a248c0a

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            e62cecc351ddac1cfd49977f0422e847

            SHA1

            f4820b67abd735efd4e1ed433d449a4f0829b426

            SHA256

            ed99218344c028c4e5d3d8330596a96765940c4a51f5e7a9ab01514e4f86d29f

            SHA512

            9f838a9425683c72b8694555eb5abd15eeac984d54202f5b689a4fb6dec496bc2d122deba8431c3c8ea26c4fae025cf031c7df9bcd6fb8a2a1399b28267860b0

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            badad34d587d9e38dd195e924657c0df

            SHA1

            07e1ffa6e54c18e1fec5de1f46c9dc88ec03b1da

            SHA256

            34bf242ca04f610d6c33ccd2b1069cc0854b91b6361f365a7dc5702dc3d9c799

            SHA512

            3cd3cd7fbca9e1a37d3b9ba18f0901e85bc5b1c2795a8a1b8a3e586e975d8f90567a074366065bb544312930f8a3f76dce5e6f925fa7974785cd2ebd9855f2e7

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            df0865f32b029c89cec753d16ff663b7

            SHA1

            7e54d0ba105059269473c15a792e6dca992db608

            SHA256

            55426ccc6b9cb74b32c46e1137c1d953721711005506a422b84e673f8aeee10d

            SHA512

            999850a04806c6ba2145404c8e80a1042ab42a4c0dfdf520580597ce0cb4490110cde4c2d03091dd02147ab5e2e33e0108ee17422b5967ba28c49a0be5b37b37

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            830ef35dc6405df1a3b94aec81125751

            SHA1

            df20e9a816ea66f2d066215ca7926b8267f8bbb1

            SHA256

            94d445f387e977939e65ec95ce70f3dfd99bf589b5474b1878514f86bf2970aa

            SHA512

            b8cf91638bc4eb832d1e9ef8b7e62df6d4636dc2f647864dbc64f600dfe94b6a31dd3f061afb562cca05409a3eae508dadafbe551d185de73ce529338ecac91b

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            03e014f03c6d4c6f31a55ab5967ebf09

            SHA1

            660525a9a7315f8d8b1956126d30bc2d21c86d0e

            SHA256

            ead9d372463112bfec95696f9cf5af0ef8da1ad1961e9422960fd3ac24a341c5

            SHA512

            5df55cb1803929fe60adc1bfa1f11dd1790ac8a5c63aff6628413d7b5d770510c4ebb42a4d919658383f5f77b1a66e72f2129a4b2e6c6f2df93e555e56ca89e8

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            31336719a85866c51d93530ecbcde82c

            SHA1

            f9639e8d1261c160b645e3b8a2290cdd88f9946a

            SHA256

            19186b0a52c372da5a1e9dba6550d14bffc6228747bf29e6f6389ffcbab7340e

            SHA512

            f7b5f674f88dbafb6d939ebbeda4a3237555d995ce31484d182b5b78435b7d91b4f5d6154d5d69bee7a2a69a7b13dddc48c2c7351278cf2b53143da4bac36f2d

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            f077904e096d4a686c7670bfa3c65504

            SHA1

            4a7ddc76557f32c6adc373a23da9d868c2416aaa

            SHA256

            fc7abfedf084bd6d8c86a29ea9d62170b1df11f152edc17a38f76ff199aefff5

            SHA512

            b3ae9a4741589084eee50bb2961f0345b3634e3dcbad612118b1f1e13b47b1fc9414eaa882568db2adbfe214572126e3e398152bb13a05fd7efeebde70fc45bd

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            3107c8215295357c876aa9bc456871dd

            SHA1

            37cfc7a83ee019ab28447cca4a7ff48059d201e0

            SHA256

            b3a82b28c450612de53a03676eb987f199fd0f4f3b6eabefd842ae26d924d995

            SHA512

            4b3f52a54490b03048203ef3983fe7e733f1b3950b9ef360c18bb6b521878e717e0ac36ef4202b773357d3be343e30a3c58d5496b7226d88fff121d3ad414466

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            0084d8ad08fa0f9b0b474b9f96238c3b

            SHA1

            8f01e74b13f04178717ffb600e66d8bdfbef2031

            SHA256

            10cd0d969af1cd7ee6f7fb4cd98927c3483d82bc322eb3c0f78569134d92250f

            SHA512

            b812a2ce6d2615c58b807c7d6ee29482f2bb2874522eb1833de231d0a2d65e15fd9d383e6f1e3d43227e09ec386717c03ddfee83335b72874b994b0e22704df8

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            36740c5903cec9483aedbb355acf6fe3

            SHA1

            c6cb63fb41539a8885fed2b85b1d635786611409

            SHA256

            b6eb2f8fa4a2dc2e8c55e5222d968643b7ee6a5340a9e6d8bade064f955945e4

            SHA512

            cb5bd8d4c06485bca778bcb6e8cc1afd5f188b5f0d84b2a4e280a9a3307b1f26d141d53f18d64d97fcfebc2a0bd354b59c41e2103a4eebadb58d53abd9e378f1

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            0c0f4312aeab490358d84ccc99e2dcad

            SHA1

            c34abecaa0c5a6a9c363df9daf84b59e602e7498

            SHA256

            0d0efe7d06d2c4a45f81d12802c7c3803a2b66afb10c17f14c60d88f9ddb9134

            SHA512

            9b1a72be3c48e58bfbca91035bae4147959584c77ed8c7bdefa4a9db742df335389eb4157519c1aafdd9bae357a5c6e62337ea1946097414dc518ed6ab40aac8

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            1a1606d24a48b93a68215de168697c46

            SHA1

            e5e0e1bf8558e553ba315824c3baaa218694fd9d

            SHA256

            b70aa42c002cae240db61e0d350f05ac1165d6999fef2c889cb7f79e317d57dd

            SHA512

            83d63ecc64f1c673a2fea90b8059450c09a5b76ad146e20ad18a9e851c42dd6ed315bcc8332585877882361b23068cb00676c6641dfa18407ae1addb72e5d56a

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            531cf80d9d16e334d78463be86655f16

            SHA1

            71e56b27443589ab7a1dcb11e853d61ea94a45ce

            SHA256

            0ffab47e32dbfbc84d37f412026a89e4aba981598ac99b2d294d1aa0efc7a087

            SHA512

            7b8973c5eaa33310090d2156ab6e20194c12a773a61a5c029eb11b0bfed33947efc14e4382197471859be0df7c09217662432068e26a39ca8986b5785d41b52f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            32dcb0136c2af09259ca93bf2ce431e9

            SHA1

            ed4faa7e66ae0b5205fda9d210ecf8528377d42b

            SHA256

            27c6203404f589f91160d7ddcf72dfdf000208de583b7d4588f3459e4f363d5c

            SHA512

            868b4ee5d1fa97ca9b57966eb70d7932763fbe0d1756b528ad4b2bd0e43a3f4adfcee8133fe10c91c939ae1cf33aae61d463ff544621b1278ca1c09e00d0b687

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            ae1a4777038c69f7a8eb5601aa7cdd4a

            SHA1

            1f8721977edf8ca641be46c2d7286788552d404a

            SHA256

            b068f7ddba778b9485079b4de31874130867eaa9bf7b488e24bae7db3ca35557

            SHA512

            b9a33bbafd9e443d8cac7edbb7a15b498503713408d6131e755548a3defdb54ec1b52cf27db0643cefde7b6501ec59d430ac1d7121518eba24b026676a52df67

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            b5af89fcff7b1faf17fae2f3372cd166

            SHA1

            9047c624be247852f01d0d2a317b9977ec46d570

            SHA256

            d64c716c4ec973d8f86810d1cc7e884d9731cd030596adaa7eee9d9eed68d92c

            SHA512

            6c1c3fdcece8fc04e20de7794e998c893494eef95b43162b5dc89e0dc03cfc486e90091c4c7419205ef1491b72f2e76acc24cb01f89b024c2a98ea9cdf0951f4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            c1d9b73d9121abf52e73a4abadcfb28f

            SHA1

            b8d414b3e65cc6cc61ae2fbf67b69874cf3688e7

            SHA256

            ec2f569f1b6823911b5d6b61254ad90bc42e038c0985e765825d89de5ca78a4f

            SHA512

            245c227293ccf543635ada6f26bca104f470a2c6d0feab05282f1346ac5277c899bf59a61c7e5b04bec8ac4faf0922f135138636275e01938cae9b6c4d039258

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            7ad764a42559fe0301e1af84841cc2f8

            SHA1

            154adb5daf8e29315e272a23769c4cf12a07d05a

            SHA256

            a342baf63ec89c458bb95db18c850976571baaa4e78a09ac302b1267b82232f6

            SHA512

            9c26b5fdf1b3224f5a7ffd28ddba94767b2caadcfd1cd4435ce33be9f399917b418264c4cfe7ae76a09ac67d72aca8989b80042c682b68bc48ef978449c4615b

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            b5d01050ac2bba4af4e663063efb2aa8

            SHA1

            0bea3fa0bf19c97ce27398fc7a1b66b78b229327

            SHA256

            6b91e5fd379d8928e490f7332521ef240fba9a7cdaff1a23a50b8522053f5ef8

            SHA512

            2a83d76f4788f93e5b3de3750f76413a93f86297a076d96a278773a444be5eb61c5fcc004595bde7795217dd9861be1c07b4ae379961c9589a1ee43f0f9a7adf

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\NH3HD9GK\lrepacks[1].xml

            Filesize

            176B

            MD5

            910aeec1b1ca8473538390d05e50760f

            SHA1

            2d7025b2339c82d2f0998c0001a83139d7ddbd18

            SHA256

            b706fe277094435b2d1754b1d91a6c03abcc6a62f3f88b7300e3de6ae158c7fe

            SHA512

            8db77860499b59dec802828e22d2ded37f56da197d1e054fe3c802c84d0a21541ed8548f873d75b44ae9527bb74826cdb2296ed8e7a89e492c6d77ed4f988eed

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\NH3HD9GK\lrepacks[1].xml

            Filesize

            357B

            MD5

            e4130b8d5053b0369cd64911ee0b0523

            SHA1

            883ae8dded8915b995077b4792b48be03dd87b15

            SHA256

            93235a2a7635b7a7e4546cf73127ca49e9fa0815cae9b1083bfee915e1f86319

            SHA512

            da52d87b7c0bcc28b55befdf852b44df2009cfcd1fbad4f4a07dfab102750af1b517b9b3fc7fb8b8ba6477e3344cc028aabcd820cdf1d5d51baef083b38e9152

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\pzrzu69\imagestore.dat

            Filesize

            968B

            MD5

            adcf2e5c6065c8290827759c9444ae87

            SHA1

            f423646b3e5a46e97ed2347a62cd9be2fb58312e

            SHA256

            1bfb172ee52c408a712febaca5aa5bd1c2effdb0591a2d7724e4bf9baf161d13

            SHA512

            7c1c83f53928fdd1c0169021d1d5ba607cadd17e763e0c6cb2a54fd6bde8bce431f3944321f5189b5e2a9899cfe47cfc4767cade1829d46ee5fb182aba4143d2

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\fa-brands-400[1].eot

            Filesize

            131KB

            MD5

            05c475fabceebae1f9d40ba6711cb41a

            SHA1

            a99a03f1c2d33c85c7b3cc8cb36c77a1a0514ac2

            SHA256

            1741e902d0609045ca692234a56220b97db5dd9cd42b7a474b407e4a2469bc3e

            SHA512

            dcf1be37b8cde9cd6a2bdbd23ca52f5cab946f25fc51e7dce02fc1dd9d263db1a043409e060801f177c9feff822ea1073b9913eca46e772a3f2b43c95b47147e

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\fa-light-300[1].eot

            Filesize

            481KB

            MD5

            a624ea3f4dd832cb54ea41286ded8fc3

            SHA1

            0acf0008a482418f68518e53fa3369d9e2ac6b34

            SHA256

            a3044338a2c6d0b78be05b2cd06afe87a407237c7195a4343749fddc077d1776

            SHA512

            c69b6ba7e7eaeb1018c7f7fd70bcf6200f95e6b1cf217c512ef7f0c135fbe1960c76708921034949c1722e8196f697e612ade40830ecc5b9d8653c5fb4af2832

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8B420DKQ\favicon-32x32[1].png

            Filesize

            792B

            MD5

            d4b7557dc08ee86a49060415550c273a

            SHA1

            9b04d63bc47731d4fecc46a551329ceb4574e6cf

            SHA256

            199b63c561e370692187ad3011fd3a339f544ede0438b4db2574a002e9904560

            SHA512

            b5e173cf381fab9cb2603b331b8473b813a608587304a433afb2b412f7786d161605963f7fb6311b6d159741de6c31277326042c9393d928ad05410570c90379

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDDDRHWK\fa-regular-400[1].eot

            Filesize

            443KB

            MD5

            fde04f8e6967b818c6fb3338d8b366d3

            SHA1

            e5f8b9b64c63a7d5153c7f238f237ee1e9e10052

            SHA256

            d1acd8ecef6503303684610722a43a3d958035d003aa49fb58d0165fd6cd9f8f

            SHA512

            042ace8eb675615aaded6ce16a187024bcfa11fc8bd71a7766c47eda080ef96fa95a42c87704ee07525a78399f1ba730df7861adeff44d38b98b20562a22a951

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDDDRHWK\fa-solid-900[1].eot

            Filesize

            378KB

            MD5

            6c207a7b79c06c76e915eb8f30e51d8a

            SHA1

            88a2213dfe8815e292d1d790074e9480402f7bba

            SHA256

            5c717ef54d31b15a859b4b1dc83ad8c14da100a25ae1beb288172e78655c1193

            SHA512

            aba5b8461f796546efc0493d11890cf3f6f71969f7904a70b2164e8cbcc3a4ca74769e7be5c23b86c888c45478163f66ed8e26fb98ada1053b777f28ddc45b2c

          • C:\Users\Admin\AppData\Local\Temp\Cab209D.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Local\Temp\Tar209E.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • C:\Users\Admin\AppData\Local\Temp\is-KI63R.tmp\bcact.bat

            Filesize

            56B

            MD5

            c60a7036e1ef463ae33c97741e9c943b

            SHA1

            2e9070b38494c9935e5af23c99cb2591cd70ae9e

            SHA256

            b1da5dbb4382c318b6f0ecdcabff42bde79d6c4a8251bf9f9f74992c55ed0d64

            SHA512

            62a8923ca7d25d2cd0e480d98181352a5523b9798c396c7e2e76eeed9c9264207ffbe4407d35de7e80960d4c3c57ba1beabee988fc9982b1a409a0a4d5dc41ce

          • C:\Users\Admin\AppData\Local\Temp\is-KI63R.tmp\bcact.exe

            Filesize

            53KB

            MD5

            193a72eb7344762a0e5e56e28241f58f

            SHA1

            44faa243fff2b51b186497ee2525a85e59430aba

            SHA256

            1d4f413d06e98ab977da26809d16b4cac3c17bf50242d0770c3344ff8a2ceb83

            SHA512

            50244f5245000d1f9e01ceb89c903f9f881c698c3d07f9686db12cc14fc7b0897c560c9d2a8852b6b565b445dc083f2dcf1479448f7c13565cf5c9dfa98c4ff3

          • C:\Users\Admin\AppData\Local\Temp\~DF03BA493FFFB311C6.TMP

            Filesize

            20KB

            MD5

            cc2c7b1d8006cc83b429c78875f5782e

            SHA1

            77870e6111003f9305d904a42b3d77dbd897f537

            SHA256

            c43b6c692874db8e72a2add0f8a9cd8596ecbce0d76e7c787fbfd782278af2f1

            SHA512

            b33eee9968a5ab02ac79df0e05bb8a7b8837948f9469a3fb522fa69325c07c530a76df710af27c1db20a1130cc8007324fbf6476f63e3befa5e794f686536d4b

          • \Program Files\Bandicam\bdcamvk64.dll

            Filesize

            1.9MB

            MD5

            a69cb04f795eff309f62b701c49a4296

            SHA1

            10251d146239380281018f17054ee9d840629a8f

            SHA256

            5a85e3729cedd4040dfde9479eb6331cc7a5a62780ee0007925d9e2e28200093

            SHA512

            d4ab56d72b9b74e1058819f278ab049e3ed3d813c90354155a7a851b0c1a220e34dd08d95a0a401ee808320562561920bda685bb955f33543b4813c4d26d2c87

          • \Program Files\Bandicam\bdfix.exe

            Filesize

            3.5MB

            MD5

            5b17929a8c7f1629deeba24bb7b829c2

            SHA1

            ae4faab0876d87e22aa988815f115869ae7afaea

            SHA256

            d4b3b48710d9ff9dfa0b213ef88bf40898438db38a505bd785df412c5859a72d

            SHA512

            bcabc65a9ea5f9fe46bacfd11a6b74a7ac54e9b74703578c39f131132869f5a1baa861393be8684d4b34ee9c1d62197f938c386291e65aa9e838734ed1bcb705

          • \Program Files\Bandicam\unins000.exe

            Filesize

            922KB

            MD5

            85452d1d5a4e2783e8f5e9a711cba382

            SHA1

            2782f702f435fb01e88af9529ee7721465f66c50

            SHA256

            b61ff8aa0e98dbb8338ea0593d3ff3af48f78e24ffbac79b89b1f774d2fae340

            SHA512

            049008081f8876b56e01e644eac231b8f847fc2f5b081b44e9251f0c018673679ef0ef80a8e7cc3ad83839aff76b9fed1e1c6914108b4c767baba3062bc87a04

          • \Users\Admin\AppData\Local\Temp\is-334VF.tmp\Bandicam 7.1.3.2456.tmp

            Filesize

            912KB

            MD5

            feb8284d9af91d2b30c6c1496d7396b6

            SHA1

            9309b3941896535c093a27606ed1aff0b58da7b9

            SHA256

            c43118d4d3fe00df5ed43d712540698526aaa91593c1f19ce51b24edf9785098

            SHA512

            9a821bc3c350f94621f1befb188d256c6027785ec666ca5bc83ab7ccebed64a5cfc809ba8d4d91a26c20fb08a2b4fb97f11b111b0dc1d0f89a1030e4f38068e7

          • \Users\Admin\AppData\Local\Temp\is-KI63R.tmp\ISTask.dll

            Filesize

            66KB

            MD5

            86a1311d51c00b278cb7f27796ea442e

            SHA1

            ac08ac9d08f8f5380e2a9a65f4117862aa861a19

            SHA256

            e916bdf232744e00cbd8d608168a019c9f41a68a7e8390aa48cfb525276c483d

            SHA512

            129e4b8dd2665bcfc5e72b4585343c51127b5d027dbb0234291e7a197baeca1bab5ed074e65e5e8c969ee01f9f65cc52c9993037416de9bfff2f872e5aeba7ec

          • \Users\Admin\AppData\Local\Temp\is-KI63R.tmp\VclStylesInno.dll

            Filesize

            3.0MB

            MD5

            b0ca93ceb050a2feff0b19e65072bbb5

            SHA1

            7ebbbbe2d2acd8fd516f824338d254a33b69f08d

            SHA256

            0e93313f42084d804b9ac4be53d844e549cfcaf19e6f276a3b0f82f01b9b2246

            SHA512

            37242423e62af30179906660c6dbbadca3dc2ba9e562f84315a69f3114765bc08e88321632843dbd78ba1728f8d1ce54a4edfa3b96a9d13e540aee895ae2d8e2

          • \Users\Admin\AppData\Local\Temp\is-KI63R.tmp\_isetup\_shfoldr.dll

            Filesize

            22KB

            MD5

            92dc6ef532fbb4a5c3201469a5b5eb63

            SHA1

            3e89ff837147c16b4e41c30d6c796374e0b8e62c

            SHA256

            9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

            SHA512

            9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

          • \Windows\System32\vcomp140.dll

            Filesize

            176KB

            MD5

            cb14f3a1cbbad7bfc0a4746d53e43d84

            SHA1

            98222694d5ad2aae1b44612f57b74bedf223d9ed

            SHA256

            f33d7393bd27de380d29a3fe55b05b9ebada56355dbcd939d9deb477305387ca

            SHA512

            e35a46ecf5e5c81faf83dd1c33f699387ed4a43561441537829140b2bc7069843b53d7b25c902e9e2f977134c4e83718585e9cbea7e1b378408d6952978adbd2

          • memory/376-2-0x0000000000401000-0x000000000040B000-memory.dmp

            Filesize

            40KB

          • memory/376-0-0x0000000000400000-0x0000000000417000-memory.dmp

            Filesize

            92KB

          • memory/2324-1691-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB

          • memory/2324-1688-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB

          • memory/2324-1687-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB

          • memory/2340-84-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-79-0x0000000002030000-0x0000000002031000-memory.dmp

            Filesize

            4KB

          • memory/2340-58-0x0000000001F80000-0x0000000001F81000-memory.dmp

            Filesize

            4KB

          • memory/2340-57-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-55-0x0000000000670000-0x0000000000671000-memory.dmp

            Filesize

            4KB

          • memory/2340-54-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-53-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-51-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-50-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-48-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-47-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-46-0x0000000000600000-0x0000000000601000-memory.dmp

            Filesize

            4KB

          • memory/2340-45-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-42-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-90-0x0000000000400000-0x00000000004F7000-memory.dmp

            Filesize

            988KB

          • memory/2340-89-0x0000000000400000-0x00000000004F7000-memory.dmp

            Filesize

            988KB

          • memory/2340-91-0x0000000000400000-0x00000000004F7000-memory.dmp

            Filesize

            988KB

          • memory/2340-88-0x0000000000400000-0x00000000004F7000-memory.dmp

            Filesize

            988KB

          • memory/2340-87-0x0000000000400000-0x00000000004F7000-memory.dmp

            Filesize

            988KB

          • memory/2340-94-0x0000000000400000-0x00000000004F7000-memory.dmp

            Filesize

            988KB

          • memory/2340-99-0x0000000000400000-0x00000000004F7000-memory.dmp

            Filesize

            988KB

          • memory/2340-60-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-61-0x0000000001F90000-0x0000000001F91000-memory.dmp

            Filesize

            4KB

          • memory/2340-64-0x0000000001FA0000-0x0000000001FA1000-memory.dmp

            Filesize

            4KB

          • memory/2340-65-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-63-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-66-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-67-0x0000000001FF0000-0x0000000001FF1000-memory.dmp

            Filesize

            4KB

          • memory/2340-68-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-69-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-70-0x0000000002000000-0x0000000002001000-memory.dmp

            Filesize

            4KB

          • memory/2340-71-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-415-0x0000000000400000-0x00000000004F7000-memory.dmp

            Filesize

            988KB

          • memory/2340-72-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-74-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-75-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-76-0x0000000002020000-0x0000000002021000-memory.dmp

            Filesize

            4KB

          • memory/2340-77-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-78-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-59-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-80-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-81-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-82-0x0000000007A00000-0x0000000007A01000-memory.dmp

            Filesize

            4KB

          • memory/2340-83-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-73-0x0000000002010000-0x0000000002011000-memory.dmp

            Filesize

            4KB

          • memory/2340-62-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-56-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-52-0x0000000000620000-0x0000000000621000-memory.dmp

            Filesize

            4KB

          • memory/2340-49-0x0000000000610000-0x0000000000611000-memory.dmp

            Filesize

            4KB

          • memory/2340-44-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-43-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2340-23-0x00000000075A0000-0x00000000078BA000-memory.dmp

            Filesize

            3.1MB

          • memory/2340-26-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-27-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-8-0x0000000000400000-0x00000000004F7000-memory.dmp

            Filesize

            988KB

          • memory/2340-19-0x00000000002C0000-0x00000000002D6000-memory.dmp

            Filesize

            88KB

          • memory/2340-25-0x0000000000310000-0x0000000000311000-memory.dmp

            Filesize

            4KB

          • memory/2340-28-0x0000000000320000-0x0000000000321000-memory.dmp

            Filesize

            4KB

          • memory/2340-29-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-30-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-32-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-33-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-31-0x0000000000330000-0x0000000000331000-memory.dmp

            Filesize

            4KB

          • memory/2340-34-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2340-38-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-41-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-35-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-36-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-37-0x00000000003D0000-0x00000000003D1000-memory.dmp

            Filesize

            4KB

          • memory/2340-39-0x00000000078C0000-0x0000000007A00000-memory.dmp

            Filesize

            1.2MB

          • memory/2340-40-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2620-1236-0x0000000000230000-0x000000000023A000-memory.dmp

            Filesize

            40KB

          • memory/2620-1237-0x0000000000230000-0x000000000023A000-memory.dmp

            Filesize

            40KB

          • memory/2620-1238-0x0000000000230000-0x000000000023A000-memory.dmp

            Filesize

            40KB

          • memory/2620-1239-0x0000000000230000-0x000000000023A000-memory.dmp

            Filesize

            40KB

          • memory/2620-1225-0x0000000000230000-0x000000000023A000-memory.dmp

            Filesize

            40KB

          • memory/2620-1226-0x0000000000230000-0x000000000023A000-memory.dmp

            Filesize

            40KB

          • memory/2620-1227-0x0000000000230000-0x000000000023A000-memory.dmp

            Filesize

            40KB

          • memory/2620-1228-0x0000000000230000-0x000000000023A000-memory.dmp

            Filesize

            40KB