Analysis

  • max time kernel
    114s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 06:44

General

  • Target

    cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da.exe

  • Size

    5.5MB

  • MD5

    7f28f09f0ce053b30fa0b990989f997e

  • SHA1

    6f19928954931b86e8127c5873d2d7b31ea8a136

  • SHA256

    cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da

  • SHA512

    6ea74de43ecd20f8b1893c18f4482302bda10479e04c1c51811fc171f171487c3f06e19101bbd5d0659d83586807c1d7321683b59365ebc8f192c7763521e03c

  • SSDEEP

    98304:i8cPAgkZ99LhHXx1IrQguPcuORR3qujPy2N5IIwOiIDIRB9oBPzR4N9kBSghfyUt:UPAXRLhHMl5uORR3qCjZwOi9vu7R4Dgj

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://scriptyprefej.store

https://navygenerayk.store

https://founpiuer.store

https://necklacedmny.store

https://thumbystriw.store

https://fadehairucw.store

https://crisiwarny.store

https://presticitpo.store

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://peepburry828.sbs/api

https://processhol.sbs/api

https://p10tgrace.sbs/api

https://3xp3cts1aim.sbs/api

https://p3ar11fter.sbs/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da.exe
    "C:\Users\Admin\AppData\Local\Temp\cc350f283ce4871e62c8102decd5a0b723b521dab3f7a7e9b5ce6ef7e5b029da.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W4C59.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W4C59.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1A08r6.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1A08r6.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4740
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1872
          • C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe
            "C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4588
          • C:\Users\Admin\AppData\Local\Temp\1007341001\087c858045.exe
            "C:\Users\Admin\AppData\Local\Temp\1007341001\087c858045.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2764
          • C:\Users\Admin\AppData\Local\Temp\1007342001\36b2575ce7.exe
            "C:\Users\Admin\AppData\Local\Temp\1007342001\36b2575ce7.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1488
          • C:\Users\Admin\AppData\Local\Temp\1007343001\dc8e8a4de2.exe
            "C:\Users\Admin\AppData\Local\Temp\1007343001\dc8e8a4de2.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2172
          • C:\Users\Admin\AppData\Local\Temp\1007344001\81e7f28188.exe
            "C:\Users\Admin\AppData\Local\Temp\1007344001\81e7f28188.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1800
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1292
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3176
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4084
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3332
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4380
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1684
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                7⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:1208
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c221cf2a-29d4-4bd4-ad7b-4417f46d60a6} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" gpu
                  8⤵
                    PID:3224
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2500 -parentBuildID 20240401114208 -prefsHandle 2492 -prefMapHandle 2488 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {949e0aaa-4fda-4721-b8c7-5c2570e8ec69} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" socket
                    8⤵
                      PID:3128
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3076 -childID 1 -isForBrowser -prefsHandle 3080 -prefMapHandle 3160 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4bf8f0ab-1092-40bd-b323-c2006f81ea19} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" tab
                      8⤵
                        PID:3408
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4236 -childID 2 -isForBrowser -prefsHandle 4228 -prefMapHandle 4116 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a3ddfd1-93e9-40a2-816e-5ebf2e61dc65} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" tab
                        8⤵
                          PID:1536
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4864 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4860 -prefMapHandle 4856 -prefsLen 29144 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd720594-cfe7-4299-99da-cc44613d3f4b} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" utility
                          8⤵
                          • Checks processor information in registry
                          PID:5828
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5124 -childID 3 -isForBrowser -prefsHandle 4860 -prefMapHandle 5100 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {392f9b11-f3c2-4441-8d87-382352ed3e37} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" tab
                          8⤵
                            PID:7400
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5188 -childID 4 -isForBrowser -prefsHandle 5180 -prefMapHandle 5176 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4968ec4a-cf2b-4c73-8510-0f261514efb1} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" tab
                            8⤵
                              PID:7416
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5456 -childID 5 -isForBrowser -prefsHandle 5328 -prefMapHandle 5344 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d9b3cd0b-36b1-4c58-9607-6484d5a28fbd} 1208 "\\.\pipe\gecko-crash-server-pipe.1208" tab
                              8⤵
                                PID:7464
                        • C:\Users\Admin\AppData\Local\Temp\1007345001\be9903da27.exe
                          "C:\Users\Admin\AppData\Local\Temp\1007345001\be9903da27.exe"
                          5⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1528
                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2i5625.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2i5625.exe
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1236
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3d40g.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3d40g.exe
                    2⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Loads dropped DLL
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:540
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3d40g.exe" & del "C:\ProgramData\*.dll"" & exit
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:4036
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout /t 5
                        4⤵
                        • System Location Discovery: System Language Discovery
                        • Delays execution with timeout.exe
                        PID:4004
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5216
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5236

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\ProgramData\chrome.dll

                  Filesize

                  676KB

                  MD5

                  eda18948a989176f4eebb175ce806255

                  SHA1

                  ff22a3d5f5fb705137f233c36622c79eab995897

                  SHA256

                  81a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4

                  SHA512

                  160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json

                  Filesize

                  27KB

                  MD5

                  efe6b94ac10493be0a1b5b56d7729d43

                  SHA1

                  3fc44b843f18c23aa8181d5992ad43d61db714af

                  SHA256

                  63397bce7246a5fac9c11d2badcbb35da19ffeca7f238c2e14470aad02244663

                  SHA512

                  68b8552b1728329f548a965972f20029e30d757ec96c5f992aff3debdd70bdeac6b408700f0a16031e35dc98aa91f11abfb04fc05374badd7649a929a29353a8

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                  Filesize

                  13KB

                  MD5

                  263eee79d4338b16f4eac53ab37d1308

                  SHA1

                  b4f009c21d4d1b4a42e07fdc2a496c1ffd019c8e

                  SHA256

                  4c928139a9a788219c352860f4be7b3978df396bd347fd638532e7c25d95f35d

                  SHA512

                  d16bff418c8e82fb930bda895bd2c67e7161e9387cc15e4ef47082a96962c517c4d1fcb9b0335337822aeb9cc38c8eefc0d3ace4b5aee8d5e65e254d85cd578d

                • C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe

                  Filesize

                  1.8MB

                  MD5

                  86a5d7f66a6aa908260e684c97079ef3

                  SHA1

                  cc3beab7c38ee4a341bce58937eb8433e4b30990

                  SHA256

                  b4c6b9f9f3bd55090817a9a10fec28be0db3d90578f6c1cc89a9cce3363a2f91

                  SHA512

                  bb5087e5729cf2ad204de2259c93ff77fa051212759aae0cd67530211409c205f0bec6cc2eac855fb35515af6fb444f6c1d2c1a42abc6aa4d4d455f1665c62de

                • C:\Users\Admin\AppData\Local\Temp\1007341001\087c858045.exe

                  Filesize

                  4.2MB

                  MD5

                  ddc37e97b7f6f293fd3249dde8626b60

                  SHA1

                  4408410263886ec4e02dc3eea37f8c89c361db49

                  SHA256

                  1e54e10e7d664fbe488c896545d9a706551f83c1b765ef96d9e511850b256039

                  SHA512

                  5743a4eb15854402873ec8fb8dfdd9fb5cc94a45f958180beb8678e24a726b1e35a6fc38055abc3ea17ef86975650d53e7d7dc5419747b191e680b80868f4366

                • C:\Users\Admin\AppData\Local\Temp\1007342001\36b2575ce7.exe

                  Filesize

                  1.8MB

                  MD5

                  0052b3199e0f2d283c8589e137f861b9

                  SHA1

                  890e0ec166ff2a4bc5815a6cdb7db006c1dbed3f

                  SHA256

                  29fc9219bf04bc8af576e3e972b250dca95c518b912ef2e4b97b2253f876447a

                  SHA512

                  4d19391bc8ee0072e4aee9c45d5d748ca87c648b1b006116b17ea2c62e04316ef9e0aed2a3e96e695bebba038498ba7e5754a4fa169cb2d36a4e8b4943c4851c

                • C:\Users\Admin\AppData\Local\Temp\1007343001\dc8e8a4de2.exe

                  Filesize

                  1.7MB

                  MD5

                  97de1d3cfa763a50d7195d5bd0c3594c

                  SHA1

                  3429706674f3a675e916097140d46b4e75706367

                  SHA256

                  90070e4b5115c14092fc257bb696d71025d6da274a339913d9f66da915dada16

                  SHA512

                  ab16e913bed783d50c3fa0f3a385c71cb5e197d0c3b3facfe45821ad0ee52c78879b2fccb587967c87488eca4accc587a2825ecd5c8e340a7f5030e5736feb63

                • C:\Users\Admin\AppData\Local\Temp\1007344001\81e7f28188.exe

                  Filesize

                  900KB

                  MD5

                  8497a1a62a06f49fb7da020a2ac7cb51

                  SHA1

                  08f097ad043bc698a4a8a142587edcab55bb4a9c

                  SHA256

                  437ffdd5f9fd171113b2e13401b127b21d2c8f95d47feb897cabd9d4a04bf437

                  SHA512

                  e2bb47cd34330337b1620c1e853ab6397b42335bbecec45513080eea0c2c575b96aed521a29285e33b60f4ac6a6e91866e4ab1f5d2a31adae9062c3a77214cad

                • C:\Users\Admin\AppData\Local\Temp\1007345001\be9903da27.exe

                  Filesize

                  2.7MB

                  MD5

                  9ac8445cce2c068f85de4e97c38041a1

                  SHA1

                  31f85847064c2181505e9e8b0cb018f480ffadb0

                  SHA256

                  2a06994be891b47d92c40b83e4b33ec355b587bbd00c7c49c2ae266f1e06c621

                  SHA512

                  6d3a6893269032921bb643188644ce7af79603ced800dce380a42d150948063393d92a2c055dd6707e156346047714408e8ae2964117548a5002826c08771183

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3d40g.exe

                  Filesize

                  2.0MB

                  MD5

                  63364970c363a97db9a7537d028dfd38

                  SHA1

                  49e87e6a9f730c1352f1144f9165c13ba2e59e10

                  SHA256

                  b0720ccaae74e2f41641172ae0d35cf6264d1f3f8ba0abe471af12a0aa96db11

                  SHA512

                  239d553ec7ae23aab2ffe86777ac9b9fdd128c86bae55dd49c55384d7e947942f79d5dc382adfe15ddb6b0a87c49cdc0793d159b1e3dd877f044b95713baa3a6

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W4C59.exe

                  Filesize

                  3.4MB

                  MD5

                  c9f4c0c855a968638d1ddd47e8e7a65e

                  SHA1

                  6c4b44412d6c7fef7e60be10251d7268ffc6cea3

                  SHA256

                  e3a1b845d5c2f2c444a11df2eb9fa4ef87217accea64da04993fed012b13e874

                  SHA512

                  924f75c70b9bc493751a20acd3849a821a87d95d7d3f84eb12645091c9323ae1d961bc17f2f4b380d485226bac7191fedb5f2b52fa0feb3f29790ebd7955ffad

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1A08r6.exe

                  Filesize

                  3.1MB

                  MD5

                  3f5ea966cf748b7e3f6e69970dba2207

                  SHA1

                  aaaaab07a74f4645b82911f6c9718f6c595e489d

                  SHA256

                  64db5764d5c5860de63696cc96e86c6bc4fc0803c9541eac656b4e5673c39e13

                  SHA512

                  d9285751a7fe1cabb22ce3d40be85c2644d894c2f8bc3ca4b750a70486a11433d46a7be8ba7317d55aa6572c6283e07035c3040886a75e64cfe727be60fe2fe8

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2i5625.exe

                  Filesize

                  3.0MB

                  MD5

                  834e58d1789b7d59c88578530fc6b452

                  SHA1

                  31350b2ec4937c1d8d2d186becefa8e4a4ab1314

                  SHA256

                  ffbb393aec8fb88bc1161e44be4a2a574d35cd96b7c853f7f884b7b1e36cf08a

                  SHA512

                  8d17a96f1c0842536a53725359f03fd1bc72644a132f02e45583adef388b01f75d07b1a95886c98ee140c3b639bbfbee6c2769b241cb3f6026c214825901796a

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                  Filesize

                  479KB

                  MD5

                  09372174e83dbbf696ee732fd2e875bb

                  SHA1

                  ba360186ba650a769f9303f48b7200fb5eaccee1

                  SHA256

                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                  SHA512

                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                  Filesize

                  13.8MB

                  MD5

                  0a8747a2ac9ac08ae9508f36c6d75692

                  SHA1

                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                  SHA256

                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                  SHA512

                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                  Filesize

                  6KB

                  MD5

                  ca3d7b8eaa8cc9dc1bd0445cf3a52bb8

                  SHA1

                  84635596867e1fa1262877b95b99829621c34f17

                  SHA256

                  275e794dcb3aab84da1cf1902ff6283aeef53610c5e0d97c91af98e613c87aba

                  SHA512

                  b49193adecd6787c821e4e268fa6bc27d98345bb66952253f7e2124b65bddbb3f32c2131b9198ed6047b493c185ec0fd0e547a2ee74e96a9ab5ef9d3b00e5c5e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                  Filesize

                  7KB

                  MD5

                  ddffac493b275a700141f83a37f9b237

                  SHA1

                  d99e267fe8d18c1a92041cd298192c4e9c134f82

                  SHA256

                  741580842635d05b89288e0ce698b0b16aff4d3abf43fb516b670bfd1eccd18f

                  SHA512

                  59ed6d9a2cf309d89996e397a24a52563005141cca9c4074aa077a88565cb212e2ce08552db7b94d6c3afa00b8ab95c3f0489db3512672554e4f768a5d23b1b0

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin

                  Filesize

                  10KB

                  MD5

                  bf49d0b142fe0d0c4ea2b2de80484f4e

                  SHA1

                  fa0ad37744e90b3c08cc5f70d932eb1f5e388bfc

                  SHA256

                  b882b75785801c9008177a60fa9a1c3ab0b089dc1b40f7ee7726afd25846c140

                  SHA512

                  378acf3e671336b8539e5ab98a881bc176ea37d4654cc3c90d80c5277e8f416e850974b80bbcd1acfc3a58ea94dff457283f0b826d19088610c0265ab711c92d

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  15KB

                  MD5

                  26531a77b335fb600d779011c222a198

                  SHA1

                  716413303072e365abd9edf8f37974e4173ba125

                  SHA256

                  004df6c1765515b6498567f05bf0df5224b634f59dc6a7e93dfb24ecfaa8e8c4

                  SHA512

                  66e964c4a4ceeaeb12cdef2c72e8d6748e9fd266c24416fb2f4f32ad20885c9c70ac2e691c0f4004439ec7ec643c43f0ffcc5a54841dd7c6a910267e56a06bbb

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  15KB

                  MD5

                  645319521bb4f6bcb764a4690054aa5f

                  SHA1

                  844da7157dc26afab56a727daf9900cee174cb38

                  SHA256

                  dd3f79f3a575304d771d4168e574545598265866ceb9117b75dfba9c333324b8

                  SHA512

                  73b9f57ab50ab35ff7bb026b24fa55c89f9267521f433e7f863885ee403e12735674cea916468a712830e75dee227318115dbe5e3acf10c1b9fa28ecaf0f1b6f

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  23KB

                  MD5

                  f77fb3e1ded4063a49511384c8215aae

                  SHA1

                  25ab414317c2b44801d9003ef946c91d54f3c104

                  SHA256

                  046db6122a1328dc2ccefa465eb8fca57133316b5e20f3157a4f17c3b91fdcbf

                  SHA512

                  84a514f6cf64c2b4bedbe5361779dea5084a310b0f12a304b838216052bf202264b2d805943d184f4cee7709459172a18671997249dc95945e153c57a9dbb26e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  6KB

                  MD5

                  86fed8233e392db1792081da57116c8e

                  SHA1

                  5094541b1856af06c060eb69406ed2680723256f

                  SHA256

                  2b2f4d372a86ba9c651e08ae35e3b48cc768571d932480ed54f49cd0f61714d1

                  SHA512

                  69be0d148e565af810b5be4192367cff0424b3dd3a3f8a0efdf57424e00e6c3ae5926f7dd1918a9237cf88d9780a3cafb2bf21f5493f85f0ab8befd03f41ecca

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  15KB

                  MD5

                  91f56b31a47c3233278ad4f55ff40574

                  SHA1

                  e80c09c43794d58bf65a2ca782814c0c47849db4

                  SHA256

                  6842e75f40550de023372ed2c9575e98a98b40ad22b4dc939c7cf52698b68d82

                  SHA512

                  1e709477382056d3278f632bb9da2e4fb5efdc82b328c76b195408664eb646bbba544e7735ab40dea808ef4c22cd079dade3708675934bfe0c66d023e73a24a1

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  6KB

                  MD5

                  f046c0f46d8a57234a147436b4d6bee1

                  SHA1

                  4888fad80715dca8e9c6ca3b5163af51103d5ab1

                  SHA256

                  cb7d3659a0ef5eb7b9495cc3bd5e6c883664173d9063348548485b92f572132d

                  SHA512

                  50af663cbdbc4a400b95cf86b01517253ec37075e5e220ab63f3fcac87087960f1c144c0943cf3ac10eba3ac39bc1165f5ad69bd66662dcc6b10445f706f88f2

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  6KB

                  MD5

                  128b81f32c5c6858fcc0b3950cc6ab65

                  SHA1

                  ae8e7d47af539eabb7d288850d789ec0907ccd4c

                  SHA256

                  ba3acae9292d8bc9e522152eb3f86e775d5a41c35dffb5e18f9a0ed46a55bc37

                  SHA512

                  847b109cdad6d6f1a0417ec45c90ca1c8bf69c37d3d969445ab48bee8054ad2ced5e4126e8adfc4a8f6f0cba1712e176653dacb5716915704f3b557c00ae1de7

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  6KB

                  MD5

                  aa8804d39854a8e4926b3fc89501e8b7

                  SHA1

                  e32d97a43324948b3b4b952f8c6cc9d9b9fdf5b7

                  SHA256

                  670a96a7797fc7d9f2a36d6e2bf691951fdccf94450778bff3e188b01c877a38

                  SHA512

                  d0af5ae2a2043b060f3658ef1cfadd41fe7d8c1cbc5e2cf961bb17164c28f097fa609b53ce4c8d319c53674a7527c057e9437a25958d253c6f2f818394c9ed8d

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  6KB

                  MD5

                  4e18b1e4aafbe3c6884a9547d00d05f8

                  SHA1

                  022d2a1c7e28f7b07555ec67c98dee6fb5df48ea

                  SHA256

                  46a9c34b4216ad6d8a7a0df1fbce03b6cc95ec62de92d1d1cf56029985494f73

                  SHA512

                  099f82a95ff4ceb40bec6b4537fe0a575b35279ea99d1c51ba83ae2bea764d59973cee9bbe1c01ec7cc6f74c9cd09bab2bb600ba5f30f8953ba6d7254d1e56d6

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  15KB

                  MD5

                  4b22569638680af699d4c906979b4f4e

                  SHA1

                  19d25c17bd0aecbe196bfa4a77dbb5cf0c5ebbc7

                  SHA256

                  624a12129ccdcc008192c791591a2181e504057eaad668adac8a58937567c35d

                  SHA512

                  b336b260daab99c86e99874ac404bb41dd265046a95a67c629d520b487afd9e7af1ebe1f5f8d931a50ba739982a3ec4d963e23c60c2139c41048f0112166273c

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\906fef5f-fb6c-4fcf-bfcb-2ffda8c604fc

                  Filesize

                  25KB

                  MD5

                  dcb21185b5030b20998e633eec6df54d

                  SHA1

                  9b098e295b52de1cf5e37d32cf173f4acb6b9fc2

                  SHA256

                  37eb626c94cb92a7f927529ee0044ca1439020f092741cedcbd6c7457682e414

                  SHA512

                  ac280c087c096d0a38e7985ac3f66546e7a7520daca640c97ecb72c1937d2829d7140a5335e918e9595e560b725dce2ccae0ef05098b5aa1d5af5edee02779b5

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\9a710813-ff5e-4e5d-b811-cdf96dce5227

                  Filesize

                  982B

                  MD5

                  4308ea3159b0b35850abf23cb452139c

                  SHA1

                  e1875f25f5c60443565fb3d30d426f0bd63303d0

                  SHA256

                  95b8638d51395f1771d2a984e9983e34e12bf05aeb003d0d528482e872ac3ac6

                  SHA512

                  843ca173d18087f71d1ada0b5a707ca08da596acbc3cc4321dbd8756ccf3dc2318c3df895cd412b3d73f1b08640b74824b7cb04455302ad52a10058acfb2635a

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\b5f00602-6fd8-49f1-8051-4cadb274446e

                  Filesize

                  671B

                  MD5

                  297ebe06a407679435a7ed1dae127e1e

                  SHA1

                  c47a84d0d695225a2a36761ca37bc367eb9f1a6e

                  SHA256

                  7e33d45c2ffa8aeb619b64baccb1d8a9f924441ffa1ffc30b95242d48fb215f1

                  SHA512

                  8e6f6216223d18d94fb05d46d05962a8bd25c3c1f8288082f5c3d08900087e9f09643951ae8d3ddc76adcc20cb9a5abfa531b1de751a79a2acbc5a7a26dabff8

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                  Filesize

                  1.1MB

                  MD5

                  842039753bf41fa5e11b3a1383061a87

                  SHA1

                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                  SHA256

                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                  SHA512

                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                  Filesize

                  116B

                  MD5

                  2a461e9eb87fd1955cea740a3444ee7a

                  SHA1

                  b10755914c713f5a4677494dbe8a686ed458c3c5

                  SHA256

                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                  SHA512

                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                  Filesize

                  372B

                  MD5

                  bf957ad58b55f64219ab3f793e374316

                  SHA1

                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                  SHA256

                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                  SHA512

                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                  Filesize

                  17.8MB

                  MD5

                  daf7ef3acccab478aaa7d6dc1c60f865

                  SHA1

                  f8246162b97ce4a945feced27b6ea114366ff2ad

                  SHA256

                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                  SHA512

                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                  Filesize

                  11KB

                  MD5

                  dab5bccc021eefd7a8abe38b39d8e061

                  SHA1

                  deddef73ea23cf29fdf15ccfeba05661a9d09eaa

                  SHA256

                  f1e1934d1640676df6936713416796a619bbbb171aa63524c59e70009e962800

                  SHA512

                  d1a4dca6f5b6c9b4622e7d16cf50f909c5ad578596fe93ead6e306dffe88befa600dc12a2f9ba72f56e448bc89bf1b4fc821d12ac84729248015d69ab531fe75

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                  Filesize

                  16KB

                  MD5

                  8f30b31e40c276a03cf586b6abc6648f

                  SHA1

                  2acaff0af67d5837ec4377994af48a1078877002

                  SHA256

                  2484dd079355f1030d2c32b33171ee8d7d3ca21c478ae769131470772230f119

                  SHA512

                  8935f65c9c978578bd16e17a1c2ad02bd27f1206443d2c1e2b1e53e6aa642e169523ca0951bf00a2f9e358f57ba74b0455e099e0812801808ed9ac45cfb7fd1c

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs-1.js

                  Filesize

                  11KB

                  MD5

                  2f60f7749d4469806f3319f27cb6505d

                  SHA1

                  f80b9fcfc5df5dc3ed7ea5a78017d16957274ae5

                  SHA256

                  e5f04fdc5fa51d661bddfd88aa2fd762ba3ee701422e84976aafb6fca4ccea45

                  SHA512

                  fa020aa4d7e87c1d466d47643ca064df50b5769190af7ccbcfb52c093f52c114851ae9a171366c4dbbeedeb59ce1928256c7df57123ca8939499101ee6b17e67

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\prefs.js

                  Filesize

                  10KB

                  MD5

                  4748b36ec7aa8d24e5dd5d6d2beddaf1

                  SHA1

                  e387e98f3b9cf54adf7e92c67d45374101c960b9

                  SHA256

                  f9b4ce869a84c4b8562f3e763e499931c6c05ee4ee1b24e4dbbd1037a59af41f

                  SHA512

                  73380eb3a5aff5e8ff806cc2d5bd37f2a978309e3b62bdbf477e7b435815a41cfaefb7eb2ea58207077ea0992dc2ea3771242a1b0d531ea6ee47625c50d9632c

                • memory/540-65-0x0000000000EA0000-0x00000000015D0000-memory.dmp

                  Filesize

                  7.2MB

                • memory/540-41-0x0000000000EA0000-0x00000000015D0000-memory.dmp

                  Filesize

                  7.2MB

                • memory/1236-38-0x0000000000BE0000-0x0000000000EEC000-memory.dmp

                  Filesize

                  3.0MB

                • memory/1236-37-0x0000000000BE0000-0x0000000000EEC000-memory.dmp

                  Filesize

                  3.0MB

                • memory/1488-103-0x0000000000810000-0x0000000000CB3000-memory.dmp

                  Filesize

                  4.6MB

                • memory/1488-124-0x0000000000810000-0x0000000000CB3000-memory.dmp

                  Filesize

                  4.6MB

                • memory/1528-169-0x0000000000DD0000-0x0000000001086000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1528-915-0x0000000000DD0000-0x0000000001086000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1528-918-0x0000000000DD0000-0x0000000001086000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1528-168-0x0000000000DD0000-0x0000000001086000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1528-163-0x0000000000DD0000-0x0000000001086000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1872-1634-0x0000000000FD0000-0x00000000012F0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1872-925-0x0000000000FD0000-0x00000000012F0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1872-68-0x0000000000FD0000-0x00000000012F0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1872-849-0x0000000000FD0000-0x00000000012F0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1872-2511-0x0000000000FD0000-0x00000000012F0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1872-69-0x0000000000FD0000-0x00000000012F0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1872-30-0x0000000000FD0000-0x00000000012F0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1872-3153-0x0000000000FD0000-0x00000000012F0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1872-3143-0x0000000000FD0000-0x00000000012F0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1872-120-0x0000000000FD0000-0x00000000012F0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1872-3148-0x0000000000FD0000-0x00000000012F0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1872-3157-0x0000000000FD0000-0x00000000012F0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/1872-1033-0x0000000000FD0000-0x00000000012F0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/2172-122-0x0000000000E90000-0x0000000001535000-memory.dmp

                  Filesize

                  6.6MB

                • memory/2172-119-0x0000000000E90000-0x0000000001535000-memory.dmp

                  Filesize

                  6.6MB

                • memory/2764-926-0x0000000000BA0000-0x0000000001723000-memory.dmp

                  Filesize

                  11.5MB

                • memory/2764-85-0x0000000000BA0000-0x0000000001723000-memory.dmp

                  Filesize

                  11.5MB

                • memory/2764-2600-0x0000000000BA0000-0x0000000001723000-memory.dmp

                  Filesize

                  11.5MB

                • memory/2764-1067-0x0000000000BA0000-0x0000000001723000-memory.dmp

                  Filesize

                  11.5MB

                • memory/2764-3149-0x0000000000BA0000-0x0000000001723000-memory.dmp

                  Filesize

                  11.5MB

                • memory/2764-901-0x0000000000BA0000-0x0000000001723000-memory.dmp

                  Filesize

                  11.5MB

                • memory/2764-3158-0x0000000000BA0000-0x0000000001723000-memory.dmp

                  Filesize

                  11.5MB

                • memory/2764-3154-0x0000000000BA0000-0x0000000001723000-memory.dmp

                  Filesize

                  11.5MB

                • memory/2764-3144-0x0000000000BA0000-0x0000000001723000-memory.dmp

                  Filesize

                  11.5MB

                • memory/2764-134-0x0000000000BA0000-0x0000000001723000-memory.dmp

                  Filesize

                  11.5MB

                • memory/2764-125-0x0000000000BA0000-0x0000000001723000-memory.dmp

                  Filesize

                  11.5MB

                • memory/2764-1721-0x0000000000BA0000-0x0000000001723000-memory.dmp

                  Filesize

                  11.5MB

                • memory/4588-67-0x00000000000C0000-0x000000000056D000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4588-87-0x00000000000C0000-0x000000000056D000-memory.dmp

                  Filesize

                  4.7MB

                • memory/4740-32-0x00000000002B0000-0x00000000005D0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4740-14-0x00000000002B0000-0x00000000005D0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4740-15-0x00000000771B4000-0x00000000771B6000-memory.dmp

                  Filesize

                  8KB

                • memory/4740-17-0x00000000002B0000-0x00000000005D0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4740-16-0x00000000002B1000-0x0000000000319000-memory.dmp

                  Filesize

                  416KB

                • memory/4740-18-0x00000000002B0000-0x00000000005D0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4740-33-0x00000000002B1000-0x0000000000319000-memory.dmp

                  Filesize

                  416KB

                • memory/5216-928-0x0000000000FD0000-0x00000000012F0000-memory.dmp

                  Filesize

                  3.1MB

                • memory/5236-3156-0x0000000000FD0000-0x00000000012F0000-memory.dmp

                  Filesize

                  3.1MB