Analysis

  • max time kernel
    287s
  • max time network
    295s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2024 04:41

General

  • Target

    03102024_0441_x.exe

  • Size

    1.5MB

  • MD5

    ecf3199706ba49d6bb45b0e34a310a80

  • SHA1

    777c33cac377231d97a0e0b710b6ba44840d2548

  • SHA256

    866e2794cc1ae74f3b18b3cfd3e98edea83f6eaf2bf3121f88df4caf2f2e0fd1

  • SHA512

    d6965a55bacc37350175f9000b4537cce571840f6e2922c7b826744567cb63a203fc7bd6c50b1b70ec73a5be0fe14fef62118d1b0ef007782ea51e41a37e7871

  • SSDEEP

    24576:SMPbnR3IqWwQ16oEMN22K+mEZ+JNP+jK37K3evi91e:SMl49tRYjde+v93Fa9

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    s82.gocheapweb.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    london@1759

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 61 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 35 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\03102024_0441_x.exe
    "C:\Users\Admin\AppData\Local\Temp\03102024_0441_x.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3972
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\lxsyrsiW.cmd" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2584
      • C:\Windows\SysWOW64\esentutl.exe
        C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
        3⤵
          PID:3312
        • C:\Windows\SysWOW64\esentutl.exe
          C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          PID:2588
        • C:\Users\Public\alpha.pif
          C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5000
        • C:\Users\Public\alpha.pif
          C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1424
        • C:\Users\Public\alpha.pif
          C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2344
          • C:\Users\Public\xpha.pif
            C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3648
        • C:\Windows \SysWOW64\per.exe
          "C:\\Windows \\SysWOW64\\per.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:3736
          • C:\Windows\SYSTEM32\esentutl.exe
            esentutl /y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe /d C:\\Users\\Public\\pha.pif /o
            4⤵
              PID:324
            • C:\Users\Public\pha.pif
              C:\\Users\\Public\\pha.pif -WindowStyle hidden -Command Add-MpPreference -ExclusionExtension '.exe','bat','.pif'
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1188
          • C:\Users\Public\alpha.pif
            C:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:60
          • C:\Users\Public\alpha.pif
            C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW64
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:116
          • C:\Users\Public\alpha.pif
            C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2580
        • C:\Windows\SysWOW64\esentutl.exe
          C:\\Windows\\System32\\esentutl.exe /y C:\Users\Admin\AppData\Local\Temp\03102024_0441_x.exe /d C:\\Users\\Public\\Libraries\\Wisrysxl.PIF /o
          2⤵
            PID:1616
          • C:\Users\Public\Libraries\lxsyrsiW.pif
            C:\Users\Public\Libraries\lxsyrsiW.pif
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1760
            • C:\Users\Admin\AppData\Local\Temp\neworigin.exe
              "C:\Users\Admin\AppData\Local\Temp\neworigin.exe"
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2344
            • C:\Users\Admin\AppData\Local\Temp\server_BTC.exe
              "C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"
              3⤵
              • Checks computer location settings
              • Drops startup file
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1964
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3668
              • C:\Windows\SysWOW64\schtasks.exe
                "schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 04:47 /du 23:59 /sc daily /ri 1 /f
                4⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:4524
              • C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe
                "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"
                4⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious use of AdjustPrivilegeToken
                PID:4492
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA284.tmp.cmd""
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1848
                • C:\Windows\SysWOW64\timeout.exe
                  timeout 6
                  5⤵
                  • System Location Discovery: System Language Discovery
                  • Delays execution with timeout.exe
                  PID:4176
        • C:\Windows\System32\alg.exe
          C:\Windows\System32\alg.exe
          1⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Suspicious use of AdjustPrivilegeToken
          PID:3428
        • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
          C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
          1⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3400
        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
          1⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3736
        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
          1⤵
          • Executes dropped EXE
          PID:3196
        • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
          "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
          1⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:2784
        • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
          "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
          1⤵
          • Executes dropped EXE
          PID:3488
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
          1⤵
            PID:1624
          • C:\Windows\system32\fxssvc.exe
            C:\Windows\system32\fxssvc.exe
            1⤵
            • Executes dropped EXE
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:3164
          • C:\Windows\System32\msdtc.exe
            C:\Windows\System32\msdtc.exe
            1⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Drops file in Windows directory
            PID:3580
          • C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
            C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
            1⤵
            • Executes dropped EXE
            PID:2836
          • C:\Windows\SysWow64\perfhost.exe
            C:\Windows\SysWow64\perfhost.exe
            1⤵
            • Executes dropped EXE
            PID:4796
          • C:\Windows\system32\locator.exe
            C:\Windows\system32\locator.exe
            1⤵
            • Executes dropped EXE
            PID:1008
          • C:\Windows\System32\SensorDataService.exe
            C:\Windows\System32\SensorDataService.exe
            1⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            PID:2792
          • C:\Windows\System32\snmptrap.exe
            C:\Windows\System32\snmptrap.exe
            1⤵
            • Executes dropped EXE
            PID:3076
          • C:\Windows\system32\spectrum.exe
            C:\Windows\system32\spectrum.exe
            1⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            PID:2936
          • C:\Windows\System32\OpenSSH\ssh-agent.exe
            C:\Windows\System32\OpenSSH\ssh-agent.exe
            1⤵
            • Executes dropped EXE
            PID:4448
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc
            1⤵
              PID:2524
            • C:\Windows\system32\TieringEngineService.exe
              C:\Windows\system32\TieringEngineService.exe
              1⤵
              • Executes dropped EXE
              • Checks processor information in registry
              • Suspicious use of AdjustPrivilegeToken
              PID:3924
            • C:\Windows\system32\AgentService.exe
              C:\Windows\system32\AgentService.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:4832
            • C:\Windows\System32\vds.exe
              C:\Windows\System32\vds.exe
              1⤵
              • Executes dropped EXE
              PID:412
            • C:\Windows\system32\vssvc.exe
              C:\Windows\system32\vssvc.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2324
            • C:\Windows\system32\wbengine.exe
              "C:\Windows\system32\wbengine.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:3656
            • C:\Windows\system32\wbem\WmiApSrv.exe
              C:\Windows\system32\wbem\WmiApSrv.exe
              1⤵
              • Executes dropped EXE
              PID:4328
            • C:\Windows\system32\SearchIndexer.exe
              C:\Windows\system32\SearchIndexer.exe /Embedding
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:3972
              • C:\Windows\system32\SearchProtocolHost.exe
                "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                2⤵
                • Modifies data under HKEY_USERS
                PID:2880
              • C:\Windows\system32\SearchFilterHost.exe
                "C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 896
                2⤵
                • Modifies data under HKEY_USERS
                PID:928

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

              Filesize

              2.1MB

              MD5

              12ade46a467dd7e04d8f98e39d762588

              SHA1

              642a607764a455f148dbc611764551af39d409b6

              SHA256

              defa0ee72da6d179b8522c118ed066ce5a4bcd97f274bdaa6d237f80df83b74d

              SHA512

              649fe6c49d2b3dae6002a441eae81de8af8747d12a9a947bd6ed1722e533bb48263bc9602f4747080a1d95cd749a33fd0d2b2dec752a32ee17f7fc34e2abdb30

            • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

              Filesize

              1.3MB

              MD5

              bbfdc31b757499027b9400b64077f654

              SHA1

              38481c476c4a1f0dbf2359db5f4273767d7c8fdf

              SHA256

              b00b3bc70e3e3fae603c2f7efc854ac75e733a891120fc55a7d2119bdb44a7de

              SHA512

              b71cb8d0fb5e4a58c4138ac62cf8f7869a92a3a1079f9f106ffb79fc5a80164119934862572e1ebd0f09641d48276b7a043df5914cec8d415e08744c98a31429

            • C:\Program Files\7-Zip\7z.exe

              Filesize

              1.6MB

              MD5

              108a26a556f131a272631ae72af0bed3

              SHA1

              489d9cf64fda2c2b7b2ecbd2ca31581fb312c2bd

              SHA256

              d510101c661ff17a548d8b1d3b341a658210ffe2830841751c89a9277566372e

              SHA512

              309b67b914885c1959e3f75c9db7567e0da045cca95c33e5e1e5682f8276fac63b5b53480da19271797ee2d7e5dfc1db4798d7bda6b7e539e38f3e68038a7853

            • C:\Program Files\7-Zip\7zFM.exe

              Filesize

              1.5MB

              MD5

              ac558e5cbbc6a3e7df83924871226966

              SHA1

              8d76f0ea0f2f84e49eecb0a00e14a697b8c294cb

              SHA256

              e7dcc63b5f610ffc574e1d0c28495d5273727f9421012557780fbb9e4d2e62cc

              SHA512

              855e7a40e6c084c5e5824ed90afe65bd35e458af0b9b17c1740f185087726cec8da340717e791fc958d0e9084bb7ac9b4e2378072b34e9e3bdaacf538792de86

            • C:\Program Files\7-Zip\7zG.exe

              Filesize

              1.2MB

              MD5

              898a8064ead82fa95c1581783be8c51f

              SHA1

              0be895c95b246e04adc868fe9190d72aa6b8e6b7

              SHA256

              b8cf2bfdc5d5ef3f05c3c1dfb2fa31130c06799329390d506bc08f09bc26fe5e

              SHA512

              13309bc2096176dfa8a418110a71aa7f29b4c0e15460a15f132c51a0199ef2e4de9e923f51786274df47b5e51815d06c0cbace69e45bae7fabd916dca72ab35e

            • C:\Program Files\7-Zip\Uninstall.exe

              Filesize

              1.1MB

              MD5

              1994285daea92b5deb61b6f11846b6c5

              SHA1

              3e537c9bd6d1a2eceb58d25d512e635e0edd547f

              SHA256

              4817184ec4f96544f4960b532c078e0e04d9fd1bdbf9aaac0a098db0ccb15d6f

              SHA512

              9343d2131b1874b012cb3267c0be4ce2ffaf882a0287ac4f5ffb4bfac4f4566a68965c5bc3c1cf08743bb4fa405f4b621c6ec00273fdc72be388ffe882695fd9

            • C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe

              Filesize

              1.3MB

              MD5

              4b97c5739f1270342a028f551b840682

              SHA1

              d1876c2ab94a4757080ffedd3037dc2db9d1dcec

              SHA256

              2442ba9b6ed19c13aff90ad77a1fbdfe8a220e18513a417d2632629786d010bd

              SHA512

              df3ea043302113c83049a3a6f3bdb842aae6c66f604ad18d52d5e844b212ab4902429301492fab3fd97a2453571328e30ae5ec53f64cd33d3db047f383131bac

            • C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe

              Filesize

              4.6MB

              MD5

              801a3eaaa62bde7f0a6b481b3f91d051

              SHA1

              b4ee9a29a28e69685c53c76f0b7831773c6b9aee

              SHA256

              573e2e63128f2cc4d425e947dac3a14a7f258fea42468e6d96bfbab6360bd1ef

              SHA512

              208ced32132756f21b33e6aa489352b1013444411eaba867642f4d51acbab2e3ad8181230d96e8a13eca0d9c992e235f4a4496a3fbcccd7ab9f0e251a4c0498b

            • C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe

              Filesize

              1.4MB

              MD5

              11b2dde6aa2046de446fec61e1f6d8b9

              SHA1

              cbac4737b56d5eee5127db4e959bec16d6c11b46

              SHA256

              99692876c389e82ea63b6a5778325173dd05eb88cda2ee443dc03647c8b3053a

              SHA512

              7d304652b4534df4950f844ed168a9b3c252a6f9bf244b4d040e54c023949479ecf58227845a06ca1fed5b7483aa26a4fab9b91a0643e73434221a4836a7b42f

            • C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe

              Filesize

              24.0MB

              MD5

              54c51e9fda6988772d631bd7c330a252

              SHA1

              0cc09f09eadc049558f76d77f0da5c563a432a70

              SHA256

              68327f296da18a5d877c4d5a0d22962f8948e5942983cd8fcd994de1736ecfe6

              SHA512

              fa1cc60db713e16c3dc0a3bbdadaa407faf0699ca4742b58010f619c7a4c08e887b8bc7f017b79d8b1d3b99cd24e5c36652364efed32f3bd6f63437e16b65bfa

            • C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe

              Filesize

              2.7MB

              MD5

              d73d5abe8ab7d5cd5711a58019c26c98

              SHA1

              e6a1ba8e85239f7ef0290c83224e27e69fce7f1e

              SHA256

              eaa5539dca903e8d832ec863110aba23628c60bd777a31bad56ff5d8a4ef24e5

              SHA512

              cb777fea822a18be84f3bab33af990eae575bc572fe9e0c289d87342fd6789a5348abdb74ea7fe3e902a0720c7b43aeb6313aeee433612f5dfcd7b37bde8bf51

            • C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE

              Filesize

              1.1MB

              MD5

              b72206dd0f4245c19ead6d1c83112236

              SHA1

              db45042d54293d12c80175596a30e971585e0fd3

              SHA256

              47b9f1c28a599bd8c7b2aec0d54b5a0251c8b446b20c468b74cffbf95d27bb79

              SHA512

              6fc7c8a5c48daafecf4e99d1e9c0fe2e5eb1cf8c8d77ca2cd5f4b4e4bce3e67613f4a734fed1911a0b1616d83acc61474d4816b8ce221c6f84f04ae98f9ba2ef

            • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

              Filesize

              1.3MB

              MD5

              11add220f5c5fa4086f1d01711cb0f19

              SHA1

              1210402dcc0c40a0344316f8f2d48a47f057cad1

              SHA256

              0d923b81e1cae1491a8b6c1d1963086c1253209c28a7e7a071d5d374428ad5ab

              SHA512

              99146f70bf05157b415a0506cf21392ba68bc22bbe4fed90aef0c79baa0adb6cd64a336d3f17d5e93f2d6f4d6afbb9b1cb3faf1f55064880dde6a6ee59344340

            • C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe

              Filesize

              1.2MB

              MD5

              b7cdb648d6314c38dd981f3f0dbc8cbf

              SHA1

              23bf7981f64773c1671a75a2e5f96f45f5a05dd9

              SHA256

              1974273e9d4b9e15bcbfdd41dfdc706bf97ba76d5f5238584b14e0066610016f

              SHA512

              8173d261b0759d7e52948e44c5c32ed37303ae50289e0bca2b021d60222c45c011e95e25c15d4523b3e024b7f019a6153f923069cfaa4291dc88800ef320c949

            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe

              Filesize

              4.6MB

              MD5

              1bbade26851bada317b82ab894c7d075

              SHA1

              8d4708a120a05daf68707f55cf8881c3bbcc87de

              SHA256

              b44ae20bbb8287a0ccc7d520505bf2a32c20108ece0b28ce94624cf3df319740

              SHA512

              a1d5d2f5c3301c050cb04a69baa507e2810551cf58892c05ff30183f518ba13b86b4b9d0bc9ddde22efa4a042d3b473f55d160fa4795e8d082c0d305c7203764

            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe

              Filesize

              4.6MB

              MD5

              2e68e43eeea61c440201eaee6081b023

              SHA1

              4b0c0d1e758319e5bbcb2732da1cb6d2703c989c

              SHA256

              90daabcf8e08b30e824d2dcc0f7c338cf78f635623746effc427c7878bb08081

              SHA512

              09a60fa02ada1ecde4b35f905da959c7bab4ae6ee7ec6cc02655dc5cd93abbe676b17dc637cd95affb0b813361c814ceab011dea55c1a4df4ba5ad7d3c6adcc3

            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe

              Filesize

              1.9MB

              MD5

              a3b0cc430fae25d6c0f5316b399bf7b8

              SHA1

              8597c1e6a471a3451c1a59fac40a6c52fd2b27b0

              SHA256

              4a1e604da8ede0d0bbbff85027b11f0ac6e14e766baee610cd8fba3e718f04ff

              SHA512

              9b8a90cd6a4a764c7201b2d95e85b152884a361a4f23f50e55b3401a17b77bd4df7a7d1e9c3d34bcef868f40493b3039666d265f0b2081a35a05db157917884e

            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

              Filesize

              2.1MB

              MD5

              394ca89a15917d71059b9126b86f489b

              SHA1

              3b579f1a39b019d66b5d0c0bb036b3500a85b4f7

              SHA256

              7374f9bb9e8f8bd655bc7971e9852def5738465fdbc75e685dd8b675584a0dbe

              SHA512

              3a76850debee4a72804fff88a63876215aa6ea40b8cb32ea5133a54556d6f194f2851d01322a9e19d7a491c59c0ef0ca89daaf5724d5d4928772fc24b6083324

            • C:\Program Files\dotnet\dotnet.exe

              Filesize

              1.2MB

              MD5

              20660726a986047b6ebdff6cb9105cb3

              SHA1

              a0aa09f4bd1b59296bfe70624b4ef91e1835313d

              SHA256

              20ff3c384a03bf36b9a3c7b6b492b58e2acaeb5ab0bcd292403cb9ac0bb20100

              SHA512

              d9b314346b32abc8694d55fcd03a825cae1e0070a8227c77b7d3ee2456207ff5114ae8876447913bc2c284ef3dc18fa93894dc3190ed363f5321a30f0b56bc37

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              0f13082b013951ad684562cb7d222fef

              SHA1

              0fe0681a61c6833e45a48f1d2a7839b6371ceeb2

              SHA256

              1b6c25a294b4249c2e29eebd2ea472fbb121d5ceb55bf46308cdd1495a74a6d2

              SHA512

              0795a0cb169efcefe93b5d4654fe7df907103bd6dbfa67b3df16b4ca8c9a8ab277e5963cb95c481fe7ceb3c18eae264023dc9102ed8f4b6b0adc79243da9317c

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rxnccyiw.nwt.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\neworigin.exe

              Filesize

              244KB

              MD5

              d6a4cf0966d24c1ea836ba9a899751e5

              SHA1

              392d68c000137b8039155df6bb331d643909e7e7

              SHA256

              dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b

              SHA512

              9fa7aa65b4a0414596d8fd3e7d75a09740a5a6c3db8262f00cb66cd4c8b43d17658c42179422ae0127913deb854db7ed02621d0eeb8ddff1fac221a8e0d1ca35

            • C:\Users\Admin\AppData\Local\Temp\server_BTC.exe

              Filesize

              226KB

              MD5

              50d015016f20da0905fd5b37d7834823

              SHA1

              6c39c84acf3616a12ae179715a3369c4e3543541

              SHA256

              36fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5

              SHA512

              55f639006a137732b2fa0527cd1be24b58f5df387ce6aa6b8dd47d1419566f87c95fc1a6b99383e8bd0bcba06cc39ad7b32556496e46d7220c6a7b6d8390f7fc

            • C:\Users\Admin\AppData\Local\Temp\tmpA284.tmp.cmd

              Filesize

              162B

              MD5

              aca7ca095c04139ac76e1e79b1f28fa1

              SHA1

              e7704499ebb22a5ce47dc72c3a46e1b6588d5933

              SHA256

              44b4d34108862c47e8bf5c1b13bc406edb6ebb2c3e5c7d3ae8f63d0b1b38db53

              SHA512

              131b6a7729bdabef8adde295847c4db44ae00b687effce1d95a05e6acc86fe31e4c8bdf9bb1aac179fe130ed792bc17b7af283d0f8fa4500e8aa2f4f0fa8f9e1

            • C:\Users\Public\Libraries\lxsyrsiW.cmd

              Filesize

              60KB

              MD5

              b87f096cbc25570329e2bb59fee57580

              SHA1

              d281d1bf37b4fb46f90973afc65eece3908532b2

              SHA256

              d08ccc9b1e3acc205fe754bad8416964e9711815e9ceed5e6af73d8e9035ec9e

              SHA512

              72901adde38f50cf6d74743c0a546c0fea8b1cd4a18449048a0758a7593a176fc33aad1ebfd955775eefc2b30532bcc18e4f2964b3731b668dd87d94405951f7

            • C:\Users\Public\Libraries\lxsyrsiW.pif

              Filesize

              66KB

              MD5

              c116d3604ceafe7057d77ff27552c215

              SHA1

              452b14432fb5758b46f2897aeccd89f7c82a727d

              SHA256

              7bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301

              SHA512

              9202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6

            • C:\Users\Public\alpha.pif

              Filesize

              231KB

              MD5

              d0fce3afa6aa1d58ce9fa336cc2b675b

              SHA1

              4048488de6ba4bfef9edf103755519f1f762668f

              SHA256

              4d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22

              SHA512

              80e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2

            • C:\Users\Public\pha.pif

              Filesize

              442KB

              MD5

              04029e121a0cfa5991749937dd22a1d9

              SHA1

              f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

              SHA256

              9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

              SHA512

              6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

            • C:\Users\Public\xpha.pif

              Filesize

              18KB

              MD5

              b3624dd758ccecf93a1226cef252ca12

              SHA1

              fcf4dad8c4ad101504b1bf47cbbddbac36b558a7

              SHA256

              4aaa74f294c15aeb37ada8185d0dead58bd87276a01a814abc0c4b40545bf2ef

              SHA512

              c613d18511b00fa25fc7b1bdde10d96debb42a99b5aaab9e9826538d0e229085bb371f0197f6b1086c4f9c605f01e71287ffc5442f701a95d67c232a5f031838

            • C:\Windows \SysWOW64\NETUTILS.dll

              Filesize

              115KB

              MD5

              6d23fe871b2064c6d13580a5745f23cb

              SHA1

              50e113c0e2269cf7972466a828822803537a8f6e

              SHA256

              c835f2a1234b62ab7684694af378f62770903d07d6fdfbe3a371509e2b4ccc67

              SHA512

              1244be1ab0a9cabc0eb02249d4b083939e3f088ebda4b58dc03c61618fce56f27a3f58cfd74d39fb06010db7515520307766c16815f6700507a0371d03765e1a

            • C:\Windows \SysWOW64\per.exe

              Filesize

              94KB

              MD5

              869640d0a3f838694ab4dfea9e2f544d

              SHA1

              bdc42b280446ba53624ff23f314aadb861566832

              SHA256

              0db4d3ffdb96d13cf3b427af8be66d985728c55ae254e4b67d287797e4c0b323

              SHA512

              6e775cfb350415434b18427d5ff79b930ed3b0b3fc3466bc195a796c95661d4696f2d662dd0e020c3a6c3419c2734468b1d7546712ecec868d2bbfd2bc2468a7

            • C:\Windows\SysWOW64\perfhost.exe

              Filesize

              1.1MB

              MD5

              5f3f6e70e4d4c6ae2039fafa677b6592

              SHA1

              c151d1119f4aa588f34076dbc694c743bd305764

              SHA256

              d19936f79e76baf885a4a4849d9c2b417d9d41efe0dcee225a750bad7b555b07

              SHA512

              a5e4713a18824cef9466d8c417e08fece5e040f2c0392dab9ad6cbde1b98316d82bef6deb0abad33cc4907795f9030b20b2cb9642c16f1f48410f2baf9f58cac

            • C:\Windows\System32\AgentService.exe

              Filesize

              1.7MB

              MD5

              29f418863351263f7f6b697faccec896

              SHA1

              c80b8560eb2990b986c80ffdf4cbb1471485f849

              SHA256

              71457ea660b43f33d04d7621d512d092ee37b4883625000561b675ee938ba26c

              SHA512

              3902304350d66f177d8e8f37460b747f5973478583c405d3c23489f876b483bf815ccf0f3f8492217e0e00e8fb42a034d66d8e6133362afb7bbf300de67a6cc6

            • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

              Filesize

              1.2MB

              MD5

              8956af45ae6aa0b8ca36dcb6249c49e4

              SHA1

              6ac9f8703b6a46757f4b57b6862f1ee91f2f136b

              SHA256

              9f183197c0f0ce03bf0daf6ca017c75da4837362ee028c2efa117a42faafd469

              SHA512

              8d11660030bbb0031e31b713d2c305339003341615144fbbb520960d26d47d30e5984e80de8b687e39aedf981a0e72ca1eb21718c3709ea6024f3d51eae3ea46

            • C:\Windows\System32\FXSSVC.exe

              Filesize

              1.2MB

              MD5

              d3eb66bc22f3c69486eb6565bd14aa8b

              SHA1

              9e48bd1b17cbe77645dabd1628957bc4bf483a7d

              SHA256

              c03592ddfabf24895bab66b41ab24c2e6827f99b05be082847beb6947e3b5304

              SHA512

              7775226bfd82cf2dc10f979538a83d14c6ba14e5ee5d9bd449a0d8ba764a2d9572c18f170bd0db21c6d06ad59afa1aac5286f79362d0b20d8c66149bbd3f8e62

            • C:\Windows\System32\Locator.exe

              Filesize

              1.1MB

              MD5

              a78cffdfc89e60fa29b7c0a9208159dd

              SHA1

              7dcd59e0dd958bb77122df59f539d1b5ba65a6a3

              SHA256

              c0e63faa4b409fef96116612df318a4f68dd13bc0dd01ed16025695c4da934a3

              SHA512

              a83fbfc6639f7ced61a858528c9ffd30c0ae67108a812af2865eb98bcd161a04016194b40e4fc7e6b95f59bafc85c58e57a8ad9279f28e932db941f43e499c52

            • C:\Windows\System32\OpenSSH\ssh-agent.exe

              Filesize

              1.4MB

              MD5

              f53e3abad8cf9992dabd6b58aa7a79cc

              SHA1

              9f88590dca9cda7e3cada96e26dba75630ebc22b

              SHA256

              90b37057b7725f4c4e1053da571253771ea6bd9110d8694c75cddd802b559e71

              SHA512

              5238359a0ada59a540e9a1af98e3036877fd9bec97261386499c4bdd133a2d07ddc6e15f0bebfb7cebf5a2a18507b837baa6da533a2d6710b45bd91f3a942c9b

            • C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe

              Filesize

              1.2MB

              MD5

              777f9219a01b8760a3cb80b9e131d721

              SHA1

              af087ab86e7adbd92533ab0f6674290ce41114db

              SHA256

              abe8a8afae4a1c30524b7525d37f377808b01e597baea0f46a21464c26f16e03

              SHA512

              8cad48c5e92da9134d8d0f63cb9106a844f060b2d7c7eb54ff28cd8ae957c3224eb6979eea418f5afd4b3a4daaf6f44c0a3df96f47391091857393c3019c4eb2

            • C:\Windows\System32\SearchIndexer.exe

              Filesize

              1.4MB

              MD5

              b963b75d1042fcb7a4b48d07c406fe8a

              SHA1

              506570327f226f6aabac1e98bd36f05bf36fefd9

              SHA256

              62f0f7cf8dfae26c0158ac8a6956362623ea5bed1c2fb1902d141abd170d03b2

              SHA512

              b6dc75e8feded9e9c3a2b10c4568ee3a523e42d490110b91bf087bbe27b6b3fbe04a909b45298282e5514d6441b8a8b708be91943b8da53159ab79bf591684f7

            • C:\Windows\System32\SensorDataService.exe

              Filesize

              1.8MB

              MD5

              54d248634634c8eb30fa26371fc55649

              SHA1

              f5c0e1b38fe3cf7b9047f5a28c57b4c8bda16443

              SHA256

              cbb9be51f4b13893b3b9f3ab0b61a73bd582f3abb6a02a3636060890d36e1f05

              SHA512

              3e1ade1d2d7d51c6735357d1f96a53916f3cbab997c9429be8e59dc7cf6686dbb74fec4b38a2401925b218ebe3d336d7727b1c90f5ec477805df459f4a173a95

            • C:\Windows\System32\Spectrum.exe

              Filesize

              1.4MB

              MD5

              b1f560de5962c44b46e7ffef88b69bf6

              SHA1

              bdf04b2eba9235b5a93c2488c45432641bd2d71d

              SHA256

              a17e34edb271639523be0f3cf25f0d77045a1323af6e210fed732db387301c55

              SHA512

              10c1b1f3a16d28dca8353a424b2e27781192ba7ddec9c86e62034aeac27b538f469868e5895538f05ab0976bcbe9329667010fb73e47e2f6f23cccb233d7ce55

            • C:\Windows\System32\TieringEngineService.exe

              Filesize

              1.4MB

              MD5

              84eb17aac2c7c52355068db12a5b9b0c

              SHA1

              107eb5654145b9068b336ba38dfe85b4607f773e

              SHA256

              0d0e80461f878fe09bf1ce26e934a8a14161faca6720cade3d75ad59edb881e3

              SHA512

              b07f98fbb40f418bfff481048cc2004c5a135aeb7d9c33b2310fda1b4c562dc1696a52869c29f840ed475adb6b110d4c865676abce162ef741fd1fcbf9ef5505

            • C:\Windows\System32\VSSVC.exe

              Filesize

              2.0MB

              MD5

              a12390a2b490790fd8b7b3c279f1f619

              SHA1

              c220cc26c0c06c05cf08b6433cc6bc0191b46ea4

              SHA256

              b217f51dc9cdd27342dc90aa454154cf86ef11b2297a6d08df4e4f32ddd53f40

              SHA512

              b706ed7bf4150b6e67e5820abebe6ef5148766252f3cfbfc5cae3e42a813c05ba7f7de2af23e10a57df2a013e71b338898c97c9bac3854178f429068112dd6c6

            • C:\Windows\System32\alg.exe

              Filesize

              1.2MB

              MD5

              5487ae4014549db20ecb373fd459cfc5

              SHA1

              dfa9eb215861e3834811b4406818d53ffa0adc59

              SHA256

              0ff69bf14b0001d25a1a3745464735e263a8f7f5a11bd8a8040e76abbcc080e0

              SHA512

              fd47f4d6421dd8b9726615fbbc663a5a57b048e13f66df6e84cec1adb9d348d1ba57b42a5233568f7a36546a1cb21c3e30ee13aa3a2018ad16eaef75d3bb550b

            • C:\Windows\System32\msdtc.exe

              Filesize

              1.2MB

              MD5

              1a07990ab2d300ff7b825b152f12cc3f

              SHA1

              71cd78ac63a15d6551e111de0def457d74a3afae

              SHA256

              d3ec135dabe13a88a781d96c484c76612f601d3d7bd5307f44b10eef088fb754

              SHA512

              753d2c1087e769a3dd456b4cb49991d69e9784f9ae77191336800ccceb77e7bbf58824a6b7cfdc8ce1e59584f13cbc4f79c5f3cf4cd4a9e2d84de03567b59c2f

            • C:\Windows\System32\snmptrap.exe

              Filesize

              1.1MB

              MD5

              46a625425a749c407646378128900bf6

              SHA1

              ae09da5d54b0d8aa00bae544016155b2e50b0e5a

              SHA256

              7baedc6b7f3aac6b582dbf9c04eb88c05e6710d60bb1308c46508ff00afc7775

              SHA512

              ddf2e5d7d14a9beceea4aa85c09923b150105425ba55b89e3ba79c69d7467cc4fa83c57f9def18360512e6588e9bcbbe8a4551609aec0149162d7271bb560f95

            • C:\Windows\System32\vds.exe

              Filesize

              1.3MB

              MD5

              c1236ef89d3bb4251e948a4be8c9f4fe

              SHA1

              45ec11b9bd8495636c6f2b8ea6852d957d2408f7

              SHA256

              8f6a00a6147f15c53bdbdd8fce6b8641526d55d3b7ee2fbc0266ed99a4d4b33b

              SHA512

              3b5dd4fa1b077c541140c4a46aca2e0553fd01149ec1d8ee7368e9b9695a5f423c27e7c1544f3651bc06a3e56072f93151207179fd535881d5dce4c68056ddaa

            • C:\Windows\System32\wbem\WmiApSrv.exe

              Filesize

              1.3MB

              MD5

              e5d9842ab7e1f13390a82868bd63d877

              SHA1

              a780bcbd32aa8aaa7426f19161151dd6bd634800

              SHA256

              e9a6459fe9dac0141cdf5a0f3938a37f7cb5c7fbd246b2004bf51b20ffeec3a1

              SHA512

              295c9df43cfe4da63a84e9059f3961eec51168566fadc41b0af169ca9f0b2ce4e02cd66b78bb786e8caf0cd8c54baeb2a2da98284ed33d0b4426e600102be3fc

            • C:\Windows\System32\wbengine.exe

              Filesize

              2.1MB

              MD5

              5d154ae68a9a10e9aeb9969e5cd1ea87

              SHA1

              d13d0c6f427a11ab71c131cd0d116b9d9a869f6f

              SHA256

              dab0c9ee5aaa8f3a679a8f6245bbdc32eaef8c3ae2f791415f9676a93b28a1b7

              SHA512

              5386d054d2da2dcbcc802877946daaa7640db57e14ddda2348761768e6c351bd4d601ef37d85af26233ad5e6503dd7da9f264f866765eb3bcca62c384eb1f0d9

            • C:\Windows\system32\AppVClient.exe

              Filesize

              1.3MB

              MD5

              c495552375bd938ee414015b392d3512

              SHA1

              4b859d1c3e7f6aa0dde6b052ab7bba8778be35ea

              SHA256

              c03c7e4136f56ac1b7b0b0ae2e8415278958bec03e10bbbead3d558835690544

              SHA512

              f7487bb709b578505745182787b818e63497d1e35c37a7dc0ed287ca3dc65c771f20b663ba9fbc7b23693484eb67fdad88755bbd60f19f6b51533af1f05d32eb

            • memory/412-1186-0x0000000140000000-0x0000000140147000-memory.dmp

              Filesize

              1.3MB

            • memory/412-1055-0x0000000140000000-0x0000000140147000-memory.dmp

              Filesize

              1.3MB

            • memory/1008-1090-0x0000000140000000-0x000000014011B000-memory.dmp

              Filesize

              1.1MB

            • memory/1008-972-0x0000000140000000-0x000000014011B000-memory.dmp

              Filesize

              1.1MB

            • memory/1188-321-0x000001D9EEEF0000-0x000001D9EEF12000-memory.dmp

              Filesize

              136KB

            • memory/1760-547-0x0000000000400000-0x000000000058E000-memory.dmp

              Filesize

              1.6MB

            • memory/1964-663-0x0000000005BF0000-0x0000000006194000-memory.dmp

              Filesize

              5.6MB

            • memory/1964-674-0x0000000005720000-0x00000000057B2000-memory.dmp

              Filesize

              584KB

            • memory/1964-652-0x0000000000E20000-0x0000000000E5E000-memory.dmp

              Filesize

              248KB

            • memory/2324-1067-0x0000000140000000-0x00000001401FC000-memory.dmp

              Filesize

              2.0MB

            • memory/2324-1187-0x0000000140000000-0x00000001401FC000-memory.dmp

              Filesize

              2.0MB

            • memory/2344-676-0x0000000005580000-0x00000000055E6000-memory.dmp

              Filesize

              408KB

            • memory/2344-889-0x0000000006B40000-0x0000000006BDC000-memory.dmp

              Filesize

              624KB

            • memory/2344-888-0x0000000006A50000-0x0000000006AA0000-memory.dmp

              Filesize

              320KB

            • memory/2344-664-0x0000000000AF0000-0x0000000000B34000-memory.dmp

              Filesize

              272KB

            • memory/2784-692-0x0000000140000000-0x0000000140155000-memory.dmp

              Filesize

              1.3MB

            • memory/2784-686-0x0000000140000000-0x0000000140155000-memory.dmp

              Filesize

              1.3MB

            • memory/2792-1191-0x0000000140000000-0x00000001401D7000-memory.dmp

              Filesize

              1.8MB

            • memory/2792-1103-0x0000000140000000-0x00000001401D7000-memory.dmp

              Filesize

              1.8MB

            • memory/2792-983-0x0000000140000000-0x00000001401D7000-memory.dmp

              Filesize

              1.8MB

            • memory/2836-955-0x0000000140000000-0x0000000140131000-memory.dmp

              Filesize

              1.2MB

            • memory/2836-1066-0x0000000140000000-0x0000000140131000-memory.dmp

              Filesize

              1.2MB

            • memory/2936-1165-0x0000000140000000-0x0000000140169000-memory.dmp

              Filesize

              1.4MB

            • memory/2936-1006-0x0000000140000000-0x0000000140169000-memory.dmp

              Filesize

              1.4MB

            • memory/3076-995-0x0000000140000000-0x000000014011C000-memory.dmp

              Filesize

              1.1MB

            • memory/3076-1162-0x0000000140000000-0x000000014011C000-memory.dmp

              Filesize

              1.1MB

            • memory/3164-941-0x0000000140000000-0x0000000140135000-memory.dmp

              Filesize

              1.2MB

            • memory/3164-928-0x0000000140000000-0x0000000140135000-memory.dmp

              Filesize

              1.2MB

            • memory/3196-921-0x0000000140000000-0x000000014022B000-memory.dmp

              Filesize

              2.2MB

            • memory/3196-675-0x0000000140000000-0x000000014022B000-memory.dmp

              Filesize

              2.2MB

            • memory/3400-662-0x0000000140000000-0x000000014012F000-memory.dmp

              Filesize

              1.2MB

            • memory/3428-589-0x0000000140000000-0x0000000140130000-memory.dmp

              Filesize

              1.2MB

            • memory/3428-919-0x0000000140000000-0x0000000140130000-memory.dmp

              Filesize

              1.2MB

            • memory/3488-922-0x0000000140000000-0x0000000140155000-memory.dmp

              Filesize

              1.3MB

            • memory/3488-702-0x0000000140000000-0x0000000140155000-memory.dmp

              Filesize

              1.3MB

            • memory/3580-1054-0x0000000140000000-0x000000014013F000-memory.dmp

              Filesize

              1.2MB

            • memory/3580-943-0x0000000140000000-0x000000014013F000-memory.dmp

              Filesize

              1.2MB

            • memory/3656-1085-0x0000000140000000-0x0000000140216000-memory.dmp

              Filesize

              2.1MB

            • memory/3656-1188-0x0000000140000000-0x0000000140216000-memory.dmp

              Filesize

              2.1MB

            • memory/3668-842-0x0000000002970000-0x00000000029A6000-memory.dmp

              Filesize

              216KB

            • memory/3668-856-0x0000000005C00000-0x0000000005C66000-memory.dmp

              Filesize

              408KB

            • memory/3668-905-0x00000000075C0000-0x00000000075DA000-memory.dmp

              Filesize

              104KB

            • memory/3668-904-0x0000000007C00000-0x000000000827A000-memory.dmp

              Filesize

              6.5MB

            • memory/3668-903-0x0000000007490000-0x0000000007533000-memory.dmp

              Filesize

              652KB

            • memory/3668-902-0x0000000006860000-0x000000000687E000-memory.dmp

              Filesize

              120KB

            • memory/3668-916-0x00000000078E0000-0x00000000078E8000-memory.dmp

              Filesize

              32KB

            • memory/3668-915-0x0000000007900000-0x000000000791A000-memory.dmp

              Filesize

              104KB

            • memory/3668-853-0x00000000054D0000-0x0000000005AF8000-memory.dmp

              Filesize

              6.2MB

            • memory/3668-914-0x0000000007800000-0x0000000007814000-memory.dmp

              Filesize

              80KB

            • memory/3668-855-0x0000000005350000-0x0000000005372000-memory.dmp

              Filesize

              136KB

            • memory/3668-906-0x0000000007630000-0x000000000763A000-memory.dmp

              Filesize

              40KB

            • memory/3668-866-0x0000000005EE0000-0x0000000006234000-memory.dmp

              Filesize

              3.3MB

            • memory/3668-913-0x00000000077F0000-0x00000000077FE000-memory.dmp

              Filesize

              56KB

            • memory/3668-868-0x0000000006290000-0x00000000062AE000-memory.dmp

              Filesize

              120KB

            • memory/3668-869-0x00000000062E0000-0x000000000632C000-memory.dmp

              Filesize

              304KB

            • memory/3668-908-0x00000000077C0000-0x00000000077D1000-memory.dmp

              Filesize

              68KB

            • memory/3668-907-0x0000000007840000-0x00000000078D6000-memory.dmp

              Filesize

              600KB

            • memory/3668-891-0x0000000070470000-0x00000000704BC000-memory.dmp

              Filesize

              304KB

            • memory/3668-890-0x0000000007250000-0x0000000007282000-memory.dmp

              Filesize

              200KB

            • memory/3736-920-0x0000000140000000-0x0000000140234000-memory.dmp

              Filesize

              2.2MB

            • memory/3736-650-0x0000000140000000-0x0000000140234000-memory.dmp

              Filesize

              2.2MB

            • memory/3924-1037-0x0000000140000000-0x0000000140168000-memory.dmp

              Filesize

              1.4MB

            • memory/3924-1185-0x0000000140000000-0x0000000140168000-memory.dmp

              Filesize

              1.4MB

            • memory/3972-41-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-48-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-26-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-1193-0x0000000140000000-0x0000000140179000-memory.dmp

              Filesize

              1.5MB

            • memory/3972-54-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-24-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-9-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-18-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-36-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-22-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-34-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-17-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-59-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-33-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-0-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

              Filesize

              4KB

            • memory/3972-29-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-32-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-31-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-16-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-35-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-8-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-37-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-38-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-39-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-30-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-40-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-15-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-42-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-27-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-43-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-10-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-45-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-19-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-46-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-1-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-2-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-47-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-28-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-14-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-49-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-25-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-51-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-52-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-20-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-23-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-53-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-11-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-55-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-56-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-1104-0x0000000140000000-0x0000000140179000-memory.dmp

              Filesize

              1.5MB

            • memory/3972-12-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-57-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-58-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-60-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-61-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-62-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-63-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-64-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-65-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-66-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-50-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-44-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-13-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-7-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/3972-4-0x0000000000400000-0x0000000000592000-memory.dmp

              Filesize

              1.6MB

            • memory/3972-5-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

              Filesize

              4KB

            • memory/3972-21-0x0000000002E20000-0x0000000003E20000-memory.dmp

              Filesize

              16.0MB

            • memory/4328-1091-0x0000000140000000-0x000000014014C000-memory.dmp

              Filesize

              1.3MB

            • memory/4328-1192-0x0000000140000000-0x000000014014C000-memory.dmp

              Filesize

              1.3MB

            • memory/4448-1166-0x0000000140000000-0x0000000140188000-memory.dmp

              Filesize

              1.5MB

            • memory/4448-1017-0x0000000140000000-0x0000000140188000-memory.dmp

              Filesize

              1.5MB

            • memory/4492-912-0x0000000006010000-0x000000000601A000-memory.dmp

              Filesize

              40KB

            • memory/4796-1078-0x0000000000400000-0x000000000051D000-memory.dmp

              Filesize

              1.1MB

            • memory/4796-969-0x0000000000400000-0x000000000051D000-memory.dmp

              Filesize

              1.1MB

            • memory/4832-1052-0x0000000140000000-0x00000001401C0000-memory.dmp

              Filesize

              1.8MB

            • memory/4832-1048-0x0000000140000000-0x00000001401C0000-memory.dmp

              Filesize

              1.8MB