Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    113s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2024, 01:55

General

  • Target

    4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26N.exe

  • Size

    5.5MB

  • MD5

    431d07331d554406e5ece39efef63100

  • SHA1

    7190b3f9486cc3006b3c87a1bd768a5075ce3fec

  • SHA256

    4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26

  • SHA512

    c84547e0db3633f732b9475a2b4cc7e458360ce2034d87742c79026920b968ce3821f5bff655817c2b0c39712fb55c3ad38dd1622a039a37cb3c84916cf9db23

  • SSDEEP

    98304:DC7U3dqe+9pmBPp7nR13PAtvCALzOvfHLBCeKd/YXCvk4E2OTGIT8z3TiSyq5sFS:cYdL+0BnRWJnOvfEfd/kN72OT7Az3uSR

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://property-imper.sbs

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26N.exe
    "C:\Users\Admin\AppData\Local\Temp\4f5f1c9889431cc75be53e961faaf2ffa52248389edcdb2ceeba9eea2b698a26N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g5d02.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g5d02.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1V43U5.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1V43U5.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3212
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1540
          • C:\Users\Admin\AppData\Local\Temp\1010844001\4862f7d5ff.exe
            "C:\Users\Admin\AppData\Local\Temp\1010844001\4862f7d5ff.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4304
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 1720
              6⤵
              • Program crash
              PID:4676
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 1732
              6⤵
              • Program crash
              PID:4092
          • C:\Users\Admin\AppData\Local\Temp\1010845001\ac69a1a299.exe
            "C:\Users\Admin\AppData\Local\Temp\1010845001\ac69a1a299.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3944
          • C:\Users\Admin\AppData\Local\Temp\1010846001\c439c3579c.exe
            "C:\Users\Admin\AppData\Local\Temp\1010846001\c439c3579c.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4104
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3452
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:232
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3796
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4780
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4632
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4580
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                7⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1520
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2072 -parentBuildID 20240401114208 -prefsHandle 1996 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f86965c6-3d27-4667-9d36-f4068725852a} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" gpu
                  8⤵
                    PID:2676
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2504 -parentBuildID 20240401114208 -prefsHandle 2480 -prefMapHandle 2476 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3b4f65a-d568-40d8-bdd4-e77df07718fa} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" socket
                    8⤵
                      PID:4160
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3128 -childID 1 -isForBrowser -prefsHandle 2876 -prefMapHandle 3352 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {460ee1b7-eb3b-4837-97ba-66b266b0fa02} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" tab
                      8⤵
                        PID:2736
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3656 -childID 2 -isForBrowser -prefsHandle 2996 -prefMapHandle 2700 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0efb5473-9c74-41a1-ad23-f6e315bafdbc} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" tab
                        8⤵
                          PID:380
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4828 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4816 -prefMapHandle 4808 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6af671c1-7f72-4a8b-a3b9-e4eedfc78bd1} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" utility
                          8⤵
                          • Checks processor information in registry
                          PID:6088
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4712 -childID 3 -isForBrowser -prefsHandle 5344 -prefMapHandle 5348 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d73179e-975a-4d2e-ae2e-5158ca65d415} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" tab
                          8⤵
                            PID:6948
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5472 -childID 4 -isForBrowser -prefsHandle 5480 -prefMapHandle 5484 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {844e5edf-391e-462b-a85b-0b1c5aab2471} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" tab
                            8⤵
                              PID:6964
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5688 -childID 5 -isForBrowser -prefsHandle 5648 -prefMapHandle 5456 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {961cf87a-3ab8-45d8-b74d-178d0312535a} 1520 "\\.\pipe\gecko-crash-server-pipe.1520" tab
                              8⤵
                                PID:6976
                        • C:\Users\Admin\AppData\Local\Temp\1010847001\e365d6c64c.exe
                          "C:\Users\Admin\AppData\Local\Temp\1010847001\e365d6c64c.exe"
                          5⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5132
                        • C:\Users\Admin\AppData\Local\Temp\1010848001\deba0aa887.exe
                          "C:\Users\Admin\AppData\Local\Temp\1010848001\deba0aa887.exe"
                          5⤵
                          • Enumerates VirtualBox registry keys
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5656
                        • C:\Users\Admin\AppData\Local\Temp\1010849001\824c892181.exe
                          "C:\Users\Admin\AppData\Local\Temp\1010849001\824c892181.exe"
                          5⤵
                          • Enumerates VirtualBox registry keys
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:6300
                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2e5481.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2e5481.exe
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2136
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 1740
                        4⤵
                        • Program crash
                        PID:3432
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3c65X.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3c65X.exe
                    2⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4260
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2136 -ip 2136
                  1⤵
                    PID:3680
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4304 -ip 4304
                    1⤵
                      PID:5064
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4304 -ip 4304
                      1⤵
                        PID:2940
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:6116
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:6720

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json.tmp

                        Filesize

                        24KB

                        MD5

                        41dcc221ee4a1830d48f68c076e90ac3

                        SHA1

                        57e1b6cc6f8c43cce22fd99170c2543fb4fe9fb7

                        SHA256

                        061a7fe43a6d65f94481be99f7f75c34381a4acf7afde5c954fa770143fc1602

                        SHA512

                        917d2a4cdbdceda413a3233582eacd2a630c6eeba1b7521ae3ca965d82c81908a50111c4c356a74c96ced0e096324711597e486c94a8438831b74f5d5ddb9a37

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                        Filesize

                        13KB

                        MD5

                        25c135ee56d1cde8ef43a57f9626ec39

                        SHA1

                        2d8a73a8d6c5e38b33102c35a3a057c39cd2c937

                        SHA256

                        fd91f6197706ca4f9392f6835a74a3b887148eb256590cf45ccbd77e8d2ec19d

                        SHA512

                        b7d27fdf0259b07964d670e95ef134907270a7bcd9ea2557fa358d9198ff244b0c2a70a291b0c4bf448e2b3ed07a7cece7c863c51b72c361a9ec48351943899e

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                        Filesize

                        13KB

                        MD5

                        280f2692fe898e635bd2df917d52a49b

                        SHA1

                        6cb4300e8b957b17a1c0a6bfc2946bbc30ff5f62

                        SHA256

                        83b3333a9c1eb1030bde13e9f55323af78d7f3d58179bfa9cf7500efb75f7030

                        SHA512

                        eaa87d9e78c984b10de9a9857ed0079be4b0246904dce3b59662267d8711b86bc2aab783901165c44fcb6f8a1f8009b0d12e16f59d7ca7306bd1fb7919d1cf82

                      • C:\Users\Admin\AppData\Local\Temp\1010844001\4862f7d5ff.exe

                        Filesize

                        1.8MB

                        MD5

                        6d0ed690b55469a36f4d8dd63dc1a849

                        SHA1

                        3af3bdf9c80a8465ad712e848049a44fc45f9048

                        SHA256

                        91f71afd4b057e2158dcc39103f2f0d5b2dee1d4de548cd7f5d21af079eb6e08

                        SHA512

                        183ea9c36764e5c57d29cc65aa3102d76d9b7376eb116db47f8b352acf9928a7a6f2dd782125e518b4e1831b4186a2f232d93b1e2efd46ce4355c57e32f6568d

                      • C:\Users\Admin\AppData\Local\Temp\1010845001\ac69a1a299.exe

                        Filesize

                        1.7MB

                        MD5

                        a3f571eb536a49139b4623a2b9c3163b

                        SHA1

                        73b9dcc58d5689f14e235145c91a0746945f2f5f

                        SHA256

                        b1a60185968b2a49858789a9b868794509446fbe89b3edc037880ffa8bb5838a

                        SHA512

                        903c39b06ee797cabff03a3440439ea7844cd3b5ed7aa909f72424065f68efdf0abb9cd530a91310ee70684836d6f143895b9d5e795447aa17b1aee832a8b412

                      • C:\Users\Admin\AppData\Local\Temp\1010846001\c439c3579c.exe

                        Filesize

                        900KB

                        MD5

                        de59b05525ad5db28f660aec4be8b308

                        SHA1

                        a0e74f8a682bda0d6a568b99a94395c3020803fc

                        SHA256

                        a2d5e85a2f427898a8da82531dd0ee247eb6ced7dd677ea987eb1df03b00e72c

                        SHA512

                        a6cce45ee3a60319e527d0a51d6b129bc06f7fed4bd954e9f0d2f553a1f7513bbd26af326eb27a9f704b8fffa5f7904aa7d5e247477e25a514c5673f2a54af45

                      • C:\Users\Admin\AppData\Local\Temp\1010847001\e365d6c64c.exe

                        Filesize

                        2.7MB

                        MD5

                        3067cb25365e797d56b69fc5b1705978

                        SHA1

                        e8943c8d923d835dedc8f251b3ae26c2ad54479a

                        SHA256

                        d506f842541eef8c371031ea20d86124636de572903c44e086e8e96404e34a20

                        SHA512

                        d69f85c50a454aceb8f03092704128837487106f9a57b50d1045cb49dda650bee77d0be9fc6d7709eace32ebcb4f081023794c7b997bfdd6b879c0a8746869b6

                      • C:\Users\Admin\AppData\Local\Temp\1010848001\deba0aa887.exe

                        Filesize

                        4.2MB

                        MD5

                        c94feb7d4fe260f53cc227b9833c6b7e

                        SHA1

                        8d1f50a705256b9b8b688ed385799ed297ca0138

                        SHA256

                        9926ea0046fd1472946e4db23cd38e22ceecb5dd384ed91fc105a6c4d266ca1d

                        SHA512

                        fe606f2006ba996ca9afda8b42c89e297106541ced3b2cef15689c6e2a361b69cd2275fa21ba333031befc5321f7c463e935da0ee7a18b07d12ec4f24d191ce6

                      • C:\Users\Admin\AppData\Local\Temp\1010849001\824c892181.exe

                        Filesize

                        4.3MB

                        MD5

                        a3b6fc75e9332e814f8068fc74937028

                        SHA1

                        aacf898df6cdc6b7da5d97b7a5728108a1551a18

                        SHA256

                        a28d11a71ff174f3f011ec4b94d0c67c6c07a367f165347ad02d7004dae27a26

                        SHA512

                        3d5db5aab7952acb8bcdf670a4eaa14b606b6518219ba15ab6bc5f2c9b5feb2d0acf3c5146751965d33f5cb93bd87048f2e5f4e3928aa3358143cc682ac0bc84

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3c65X.exe

                        Filesize

                        1.7MB

                        MD5

                        6ae8d6dbe0f7340866c08c3f7b65978a

                        SHA1

                        b1afeaa2019c2df5c0be69191ed9c91ba0af72cd

                        SHA256

                        425637dfc7232d7373898820b23226d268bf36496b766b5e367a06855864549f

                        SHA512

                        b813ff37f5d50473cc7c874eb35656c1faee5fb21e3f67c235c68553aab7769d87021c1c70efc2259470ce7a2f9399191d7b73c0ccf20bceb2b6946bc5e34961

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g5d02.exe

                        Filesize

                        3.7MB

                        MD5

                        c457d150c3d465d46178d421dc715bb5

                        SHA1

                        3a381660d7910b044aab768b036c025b9780676a

                        SHA256

                        bd77b7a6d25abc25e8e95e37f50b2cc36d5a0bb669086aef8bf88a31eba7cf35

                        SHA512

                        5128a23b3c72466409daa285f51e938c48a7ee48d979be80f03c1815376fbec73d75da15ff513792336f15eb7fbdd868933de08bafedcffcd9538945ce13b623

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1V43U5.exe

                        Filesize

                        1.8MB

                        MD5

                        9efe8b10651e453ec4ac8f1c92658faa

                        SHA1

                        67df7b838ba3c0dd1048b631fceed24ffc3015ca

                        SHA256

                        69740625c8837f120cc04135a3e1149cef098c3b1b94eb578cf8d5f5bae41cf0

                        SHA512

                        6a7aef13e737156c3d6fc0d4ab1d8c4d2aeb4fd831c91d0b26a2329983471d526834cbd0b6983531be015364947b520031f2e5537f4d69c2251e871ef57b942f

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2e5481.exe

                        Filesize

                        1.8MB

                        MD5

                        6f817d33d580eb1b17c7159cd9e48c6e

                        SHA1

                        71bbb2928b40734b668e2c834f7b99f77400c8cf

                        SHA256

                        89bdff74d8814a4bf1441de3727d2cc526aa12574aea8bf45cc0441e3b6dd6d8

                        SHA512

                        688ec59c4eeb6d6945621aef2c4bd8a46c966b91b739099fe88c495129d18ca7a3587852a9ceb0e25955d50a6eaca3b690a04fd57e73ad23337b1adcb1ba97fb

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                        Filesize

                        479KB

                        MD5

                        09372174e83dbbf696ee732fd2e875bb

                        SHA1

                        ba360186ba650a769f9303f48b7200fb5eaccee1

                        SHA256

                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                        SHA512

                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                        Filesize

                        13.8MB

                        MD5

                        0a8747a2ac9ac08ae9508f36c6d75692

                        SHA1

                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                        SHA256

                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                        SHA512

                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                        Filesize

                        6KB

                        MD5

                        1c730e4a710bb510299428f8fef03416

                        SHA1

                        040c8c4577354b529873a277b76609bc17bf0362

                        SHA256

                        a2c5034d5c81f845e47a741e5ea84a03ebe66d89712fedc0950803138a055dd6

                        SHA512

                        526079b51a42e667f9159b820d77efe28cc4b21243265fef7d639a163bf4b33471ced848030633d94d419d290759ae83b7c24ed913c489337d75b4701de39f0e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                        Filesize

                        18KB

                        MD5

                        4672238f52bf7970432d375d562c028b

                        SHA1

                        70865e459af433f831a39a6cc02dd342ff6ebf3c

                        SHA256

                        d5a4539aa16eee7cbe03f2c6e1cd6d2e0a68c3671cdbe184a4f714ef3ba9b199

                        SHA512

                        da2f6a9d62c09e6ab0d4cb7ed36f9b9fa62b58c920e7a4e3d2a9ba51897e612150ae2cdb4406bd5e4a25fef8aa769fa3ff77b73868d4b60e748cccbc7aa08a02

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                        Filesize

                        8KB

                        MD5

                        5e87064b7ccfbf926d3a90b7bc4b78f6

                        SHA1

                        1f33991f2adcfe4f466821ace22ef09cce12635b

                        SHA256

                        ab85bb9a9abfc67d5efa230563b7ce8a27198381a5e55695e22b191719355cc5

                        SHA512

                        4d8ae88ee10fecea00affacfc4eb81187abdd4e52c76d8cc2f0a7499d3c297c3c1553436387c256589fe5aebfabc087ab1b6a22b656fdb9e7eeb00cd751095a9

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                        Filesize

                        12KB

                        MD5

                        8d977f2e3511e1d7b208d86be9f1bf07

                        SHA1

                        52d655ae3fabdbe2059dd98b11b720747b16392e

                        SHA256

                        1459bd20196c3993533be27287f693cc22ad082012a62bc80660de4cbdd9c261

                        SHA512

                        c46abec6da2505959f205e5ba8d34802f4557981d38bf8c4a8eb62dc095dabf9353f2d426b50c222ec2a147396bd0a794429fff8b4500e59af74f689dce909b5

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        23KB

                        MD5

                        4d9d258052fc0267f70bc2e6a4212e90

                        SHA1

                        20273edf3dc64fb352d0cadcafd5a3005755f1b6

                        SHA256

                        4de0ef216798a5a6e81753ba1bbfe89738216258f90d9148d32964333976f31d

                        SHA512

                        fc0878ffac9f4c72c18585a77648d3ecefad29380b5719acb7b3800ff587702f40f8de3e04669421e25fee9d41bfb7ba71ee6c4de173fb0e56ceb30b3c9e7595

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        22KB

                        MD5

                        6ee746c55cc02cacabdae420d29dc6d5

                        SHA1

                        d5eb2fe1212fceb1c7bc1df6c2262eec639ac9af

                        SHA256

                        840c6c75d55bd665f5cb6c04a935bb5fce54904e2e6774990d9114b0471b469a

                        SHA512

                        9b7a02a30d888cac4d9df90ca4a46077cf2b36c872acd37b737513b42fc7531afd8c65a8ae705f67cb9caee6cdf65f1412bfe2774eb019a5c1df9097d77eebf8

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        32KB

                        MD5

                        c067ec58bfe80d464e0ede6b63abe622

                        SHA1

                        5253a234626dd343f419972d53a26e8e4181323f

                        SHA256

                        0a4eea30d0c05e8a4662802cb346ab5fbc54565d41b69cf79953166f597d5c0a

                        SHA512

                        6929356a3fb991e3abfb3471e34563ae43d27f50d7f73ee2cc35d0efaddab192e5ba388eafbd795fb22ba7f07f4dccf2312ce020a80a206c357c7a395d8a848f

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        31KB

                        MD5

                        9a081f510b70cbb321dd0b356d32daf3

                        SHA1

                        0d985160e85bcc4a3e237c7e3aacd6d499db65b5

                        SHA256

                        362b8486f4cc3fe62a0a63f3cfe4d21c0523437edae1d31858852eb0e20862a6

                        SHA512

                        c43dee1cb818cc228af0d3babe4cc69860684d990d246006f85f4574512bf6c0149461323cff704dbcc6f1a784ad1ebf4d952422589d70160573e2a8c40395d5

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        21KB

                        MD5

                        3d5b9bfc85bdb538cc1f470e128b6be3

                        SHA1

                        cd513c3b42935aabef651655768440c34dfc8ecb

                        SHA256

                        b1559a0050ff3ca9bab76d267bd5f0f467bc4db4afcbc978ebd883dca79c9444

                        SHA512

                        3c265471375c0af1e7e06ca573bf1a1970591f8b4a85cd8d2f8e5babbdc27cb7e3594848f3596000cfbbd51b52b5c999630ff61355e712b6ab86a8723fe27298

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        32KB

                        MD5

                        93b7a39aeb8217102ec4ba029a543a7a

                        SHA1

                        147e87f3499164f27d1613c4217f131843173af6

                        SHA256

                        c74f1f2af7efc5e729302230dd78018875cfa464f1aece9332861b5cca01c56a

                        SHA512

                        7e34790b1860f51606095e217ee22414b26f63e2aabaea2821a67e5b29cac19a9dff4ba19f04def4ea96f06dab45b5cceed61888716e39f290206b112d9c092b

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        32KB

                        MD5

                        a5225a8a52e094e5730990e74ba38382

                        SHA1

                        37051aed77960043701ea6b9043f1142a57d99a0

                        SHA256

                        261c8a4af7ee898419394cef57d8d8fd1b5d7ab78dcb134f8e7548ae6ee61ba7

                        SHA512

                        f92e8f3fceeed8e9756826d994ab66cc5e62690f293c28f30a615c386df18a406018c9ce0b94c98e37085538c80c2b5011f33a6ca53b4b23c214ce30435b6179

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        22KB

                        MD5

                        e62ab78e7eaedd5a50935301db96f5d6

                        SHA1

                        01b3f4edd792c65cec2cc575f6d043c786958b50

                        SHA256

                        6adfd1de3827a7e3bd2ba517ebd37b74e3f448c33450ce1f79edf661eee32fd4

                        SHA512

                        a791af41e9586d6f3aa186a38456115602cc37a2e71ec73fe015d71a2175656bedf45345e5dd6885957065829180b7d5271dea433e2bcd4b1c026414d328cdfc

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\68030415-c0db-4d9d-86ec-3afe798d30ee

                        Filesize

                        982B

                        MD5

                        4c7ee2279558be3fd6ea6005a711b0d3

                        SHA1

                        8b76d5e7f7dfe044a9ccb976613c6f763c4c4865

                        SHA256

                        1eab78f04b87c6413bf0e2b5f63e671f70f21a70a29c2191c397ff333d253aa7

                        SHA512

                        3966165028bc5f96398cda3a9d96d0da4999afb5fc0d3d4e537f6bad8475493cc984c11ae9607c704306028f5816441e9ad9c5b01fd9bebfd8a3b556400bc236

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\911c7ffe-d230-4b35-b7e8-c8722f08982c

                        Filesize

                        659B

                        MD5

                        0a709f5bae2338ae0df474b40a051c0a

                        SHA1

                        30973c6b0bfff3408ff460322dfb76a62591b495

                        SHA256

                        07f9ab91900df650020dbcf08b1016cc7201313e815a9365459551d000744164

                        SHA512

                        3ac1dec7a2e707d207cdbd00c039e301a4807861e6dc6008f6b3d31d9ac17c39550f14115a6f56e3e2b49cc127faf3dd858dbb3079d33c82e875561e896d5a18

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                        Filesize

                        1.1MB

                        MD5

                        842039753bf41fa5e11b3a1383061a87

                        SHA1

                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                        SHA256

                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                        SHA512

                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                        Filesize

                        116B

                        MD5

                        2a461e9eb87fd1955cea740a3444ee7a

                        SHA1

                        b10755914c713f5a4677494dbe8a686ed458c3c5

                        SHA256

                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                        SHA512

                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                        Filesize

                        372B

                        MD5

                        bf957ad58b55f64219ab3f793e374316

                        SHA1

                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                        SHA256

                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                        SHA512

                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                        Filesize

                        17.8MB

                        MD5

                        daf7ef3acccab478aaa7d6dc1c60f865

                        SHA1

                        f8246162b97ce4a945feced27b6ea114366ff2ad

                        SHA256

                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                        SHA512

                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                        Filesize

                        10KB

                        MD5

                        df2f60f2272ba95a2a709c59a69fa242

                        SHA1

                        49745921d20f6271fdcbd8491ed44df579bf7af9

                        SHA256

                        149227b1732b2f810141e0afd626e86c7e128c1f97a7354d3224bb30834676f0

                        SHA512

                        37e06d8fe7483b2319e5506b0b87f82e995cb613a250a9c96287b7bf55d704fdc30484f4158e8a0f8a84df6b59503c3a06f9bbb3d3dbe47220c03f7c0f1c139e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                        Filesize

                        12KB

                        MD5

                        316cadc507c201b41500c534926adec5

                        SHA1

                        6bfcecd9c7338e41384cd7ad1f3d2c96d98bdb5d

                        SHA256

                        3d9bf309ab0b414f844660fb89a4677a6f1c79828a3b9d8a0a1311a806c12476

                        SHA512

                        85afa4ebfb09f62c3d23b8cbef9f5687098177e6ea2e5057651dff4a9defc307240185e99cb614b619204210fad2c82ab290a6779c21338cf76c69b0ddc7f843

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                        Filesize

                        15KB

                        MD5

                        5d0082d3bf55aea075a00427a7621097

                        SHA1

                        c65ae8d4570eb39eb8495604ba52483c4210eadd

                        SHA256

                        0521d258d6e67ba44efffd1a146863b1c9e294afcbd720ef937d5d413720eb6e

                        SHA512

                        66297107f4ec27906f13e162fc33d4d8e7ab88248ba815bfbed45df6368d86708ffe3179b2483dd54fbd66a345a7b6145dc5fde3aac396844d592e98083114eb

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs.js

                        Filesize

                        11KB

                        MD5

                        28e8759dd11cc47532ce2098e6e60a7a

                        SHA1

                        c53cfaf303454d467c1d26f071eb2fa94d4af900

                        SHA256

                        53980c530f52f9a8c2a3a9a7d5bd105331e6169e352d0af41acac73522ae4341

                        SHA512

                        ee68b3895db9266c1fd559538a939c1366c3d70b0255c676973c72470b5001ea9615954c6743a06d64fdcbf7e444bba03bf31bff0409a04d8133b2a352ec7123

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs.js

                        Filesize

                        14KB

                        MD5

                        319f47527fd5265df98d9a63d2adad30

                        SHA1

                        6fa432ec30c0993a09cbf9d8e516f4fb44aee71d

                        SHA256

                        a8d4846c47fd348c571d0099e9737a65fe99f348924e9fd052aaf59613a09c34

                        SHA512

                        b22e2c116ab13d59e170e96035becae28b81533bdb1fc0dcc3197659a94c816c939cf0e0a9b0dab55df7d1e4711305afdd77fff612b2010aba30a77b90965c93

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                        Filesize

                        2.1MB

                        MD5

                        ec5582bb3174c248dbd4f9bb3a1372c9

                        SHA1

                        f00fdb8e4da86468c73498e473fba5c2f0553305

                        SHA256

                        6d654981e7b1a33725c4f94b08295c2ed04dfb4ba3a7e82a362c1fa9ca83c5b6

                        SHA512

                        66a2200bd4bdbe2adeed5dfa9c9c2a0b6609329f0efa4562275e63cc2e35e613d019095047076dbda16fa573607ab147a9222c0e852cec6a372909816d901617

                      • memory/1540-812-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1540-3040-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1540-3048-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1540-3047-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1540-3043-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1540-67-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1540-853-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1540-77-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1540-3033-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1540-2646-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1540-1527-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1540-30-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/1540-878-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/2136-36-0x0000000000A20000-0x0000000000EC6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/2136-37-0x0000000000A20000-0x0000000000EC6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/3212-15-0x00000000779F4000-0x00000000779F6000-memory.dmp

                        Filesize

                        8KB

                      • memory/3212-17-0x0000000000BC0000-0x000000000106D000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/3212-18-0x0000000000BC0000-0x000000000106D000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/3212-16-0x0000000000BC1000-0x0000000000BEF000-memory.dmp

                        Filesize

                        184KB

                      • memory/3212-32-0x0000000000BC0000-0x000000000106D000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/3212-14-0x0000000000BC0000-0x000000000106D000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/3944-76-0x00000000006E0000-0x0000000000D74000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/3944-75-0x00000000006E0000-0x0000000000D74000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/4260-40-0x0000000000CD0000-0x0000000001362000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/4260-42-0x0000000000CD0000-0x0000000001362000-memory.dmp

                        Filesize

                        6.6MB

                      • memory/4304-58-0x00000000005F0000-0x0000000000A98000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/4304-97-0x00000000005F0000-0x0000000000A98000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/5132-806-0x0000000000910000-0x0000000000BC2000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/5132-805-0x0000000000910000-0x0000000000BC2000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/5132-771-0x0000000000910000-0x0000000000BC2000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/5132-848-0x0000000000910000-0x0000000000BC2000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/5132-852-0x0000000000910000-0x0000000000BC2000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/5656-860-0x00000000004D0000-0x000000000115A000-memory.dmp

                        Filesize

                        12.5MB

                      • memory/5656-859-0x00000000004D0000-0x000000000115A000-memory.dmp

                        Filesize

                        12.5MB

                      • memory/5656-858-0x00000000004D0000-0x000000000115A000-memory.dmp

                        Filesize

                        12.5MB

                      • memory/5656-839-0x00000000004D0000-0x000000000115A000-memory.dmp

                        Filesize

                        12.5MB

                      • memory/6116-863-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/6300-1222-0x0000000000E80000-0x0000000001B1D000-memory.dmp

                        Filesize

                        12.6MB

                      • memory/6300-880-0x0000000000E80000-0x0000000001B1D000-memory.dmp

                        Filesize

                        12.6MB

                      • memory/6720-3045-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB

                      • memory/6720-3046-0x0000000000D40000-0x00000000011ED000-memory.dmp

                        Filesize

                        4.7MB