Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 16:56

General

  • Target

    4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe

  • Size

    1.8MB

  • MD5

    6e62c424734a15da271aeb9057391fa4

  • SHA1

    14c50350a560be190aa3caf909dbc31e502f382b

  • SHA256

    4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f

  • SHA512

    09f9d9f03504fad822d6ca0affcdb21acfa4f4be1100a4e79f1f3d1b767dbc03a4cc95e677d99eaf316ec6e712f144d2d1ca46fdf1972b6c1c987869db4a5819

  • SSDEEP

    24576:ffDq11zp2lwp22w+IUezEIFIrI7mWY566oY1cZgGMRPQee+6MqLmhX+ZyFZZw8DX:DMzp2qNw+Li+rMSLPGMqeSMDhVZw8Dk

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • XMRig Miner payload 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 24 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 8 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 35 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe
    "C:\Users\Admin\AppData\Local\Temp\4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2924
      • C:\Users\Admin\AppData\Local\Temp\1011308001\NK4PJqi.exe
        "C:\Users\Admin\AppData\Local\Temp\1011308001\NK4PJqi.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1812
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 656
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:4804
      • C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe
        "C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4688
        • C:\Windows\system32\attrib.exe
          attrib +H +S C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
          4⤵
          • Views/modifies file attributes
          PID:4728
        • C:\Windows\system32\attrib.exe
          attrib +H C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
          4⤵
          • Views/modifies file attributes
          PID:4736
        • C:\Windows\system32\schtasks.exe
          schtasks /f /CREATE /TN "MicrosoftEdgeUpdateTaskMachineCoreSC" /TR "C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe" /SC MINUTE
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4764
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell ping 127.0.0.1; del DU1zDwm.exe
          4⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4780
          • C:\Windows\system32\PING.EXE
            "C:\Windows\system32\PING.EXE" 127.0.0.1
            5⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:4984
      • C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe
        "C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5048
        • C:\Windows\system32\cmd.exe
          "cmd" /c wmic path win32_videocontroller get caption
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2232
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic path win32_videocontroller get caption
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1496
        • C:\Windows\system32\dxdiag.exe
          "dxdiag" /t C:\Users\Admin\AppData\Local\Temp\dxdiag.txt
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1672
          • C:\Windows\SysWOW64\dxdiag.exe
            "C:\Windows\SysWOW64\dxdiag.exe" /t C:\Users\Admin\AppData\Local\Temp\dxdiag.txt
            5⤵
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2292
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 5048 -s 1556
          4⤵
            PID:876
        • C:\Users\Admin\AppData\Local\Temp\1011357001\20f7c57d3e.exe
          "C:\Users\Admin\AppData\Local\Temp\1011357001\20f7c57d3e.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2672
        • C:\Users\Admin\AppData\Local\Temp\1011358001\1afa212366.exe
          "C:\Users\Admin\AppData\Local\Temp\1011358001\1afa212366.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:1916
        • C:\Users\Admin\AppData\Local\Temp\1011359001\c4eb24b751.exe
          "C:\Users\Admin\AppData\Local\Temp\1011359001\c4eb24b751.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3372
        • C:\Users\Admin\AppData\Local\Temp\1011360001\916dd51227.exe
          "C:\Users\Admin\AppData\Local\Temp\1011360001\916dd51227.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:3724
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3768
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3828
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3884
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3928
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3976
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:4036
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:4044
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4044.0.1176397670\1164700798" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1152 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {103d9613-c16c-4a4f-a331-6d8236754baf} 4044 "\\.\pipe\gecko-crash-server-pipe.4044" 1304 103d8b58 gpu
                  6⤵
                    PID:4232
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4044.1.1737733174\2095180619" -parentBuildID 20221007134813 -prefsHandle 1504 -prefMapHandle 1500 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {641eeed8-c056-4fb2-9321-32926b716754} 4044 "\\.\pipe\gecko-crash-server-pipe.4044" 1520 d74e58 socket
                    6⤵
                      PID:4344
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4044.2.115177975\385729496" -childID 1 -isForBrowser -prefsHandle 2072 -prefMapHandle 1892 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc84f6a0-6cf3-4e2b-9f45-c452b38b1264} 4044 "\\.\pipe\gecko-crash-server-pipe.4044" 2084 1036d058 tab
                      6⤵
                        PID:1240
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4044.3.276415511\302708660" -childID 2 -isForBrowser -prefsHandle 2900 -prefMapHandle 2896 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {30d20f04-4518-4586-8ef9-a4b17551c19f} 4044 "\\.\pipe\gecko-crash-server-pipe.4044" 2920 d64258 tab
                        6⤵
                          PID:4624
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4044.4.1732737941\544219500" -childID 3 -isForBrowser -prefsHandle 3812 -prefMapHandle 3816 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {24616538-355d-4b29-b8da-430666ad5e85} 4044 "\\.\pipe\gecko-crash-server-pipe.4044" 3800 1ba6c858 tab
                          6⤵
                            PID:4260
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4044.5.1069377583\242249923" -childID 4 -isForBrowser -prefsHandle 3920 -prefMapHandle 3924 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c3ca7a3d-f12a-4cdb-9ea7-7a7172ea9433} 4044 "\\.\pipe\gecko-crash-server-pipe.4044" 3908 1e437858 tab
                            6⤵
                              PID:4408
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4044.6.210456500\117597663" -childID 5 -isForBrowser -prefsHandle 4084 -prefMapHandle 4088 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 596 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f2dfa9a-0505-4253-bba6-1863890a41e9} 4044 "\\.\pipe\gecko-crash-server-pipe.4044" 4068 1e434858 tab
                              6⤵
                                PID:4476
                        • C:\Users\Admin\AppData\Local\Temp\1011361001\2757ec8910.exe
                          "C:\Users\Admin\AppData\Local\Temp\1011361001\2757ec8910.exe"
                          3⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3604
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {EB5AC77F-DB70-4FAD-883B-5F0158847B03} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]
                      1⤵
                      • Loads dropped DLL
                      • Suspicious use of WriteProcessMemory
                      PID:2516
                      • C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                        C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of WriteProcessMemory
                        PID:3076
                        • C:\Windows\explorer.exe
                          explorer.exe
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          PID:1792
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                          3⤵
                          • Drops file in System32 directory
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3416
                          • C:\Windows\system32\PING.EXE
                            "C:\Windows\system32\PING.EXE" 127.1.0.1
                            4⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:4452
                      • C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                        C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4720
                        • C:\Windows\explorer.exe
                          explorer.exe
                          3⤵
                            PID:4840
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                            3⤵
                            • Drops file in System32 directory
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4296
                            • C:\Windows\system32\PING.EXE
                              "C:\Windows\system32\PING.EXE" 127.1.0.1
                              4⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:1276
                        • C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                          C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:1912
                          • C:\Windows\explorer.exe
                            explorer.exe
                            3⤵
                              PID:1848
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                              3⤵
                              • Drops file in System32 directory
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1084
                              • C:\Windows\system32\PING.EXE
                                "C:\Windows\system32\PING.EXE" 127.1.0.1
                                4⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:4196

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\39GEHZPO\download[1].htm

                          Filesize

                          1B

                          MD5

                          cfcd208495d565ef66e7dff9f98764da

                          SHA1

                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                          SHA256

                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                          SHA512

                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\activity-stream.discovery_stream.json.tmp

                          Filesize

                          24KB

                          MD5

                          9099e8814100207043a30b36ffc2bbe7

                          SHA1

                          76e0572b06dbc7e6db6726def3c583eba1f44d21

                          SHA256

                          d818a059820fd4ebccda08bbcea32f1b3a0b381d7645073bf2e120106192d081

                          SHA512

                          284313ad5815175d9e2f992574a74b3289cea28b311e71727fb6a01363bc1076091c24c2e7267f41f49cb6790ee88b1496baf3dc90c46ad06214977172bff75c

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                          Filesize

                          13KB

                          MD5

                          f99b4984bd93547ff4ab09d35b9ed6d5

                          SHA1

                          73bf4d313cb094bb6ead04460da9547106794007

                          SHA256

                          402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069

                          SHA512

                          cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759

                        • C:\Users\Admin\AppData\Local\Temp\1011308001\NK4PJqi.exe

                          Filesize

                          1.5MB

                          MD5

                          03933b44701e2688a19b6fe5980526b7

                          SHA1

                          456f586dffa20cc847b3a1f86c2fc958e9cea325

                          SHA256

                          04510f9d11f433e48517273b05f3f800d73c16bca0b2b4a9afdaf3612550239e

                          SHA512

                          bb1e6d2e1ffc8ab728295ac07512db3f6a08e0c7f9ec70e65ec75591bb9f697781d0df2096d7f9fc9a4b60b62d427acef46bd9105d713a84f91d33db3bec5d96

                        • C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe

                          Filesize

                          2.2MB

                          MD5

                          4c64aec6c5d6a5c50d80decb119b3c78

                          SHA1

                          bc97a13e661537be68863667480829e12187a1d7

                          SHA256

                          75c7692c0f989e63e14c27b4fb7d25f93760068a4ca4e90fa636715432915253

                          SHA512

                          9054e3c8306999fe851b563a826ca7a87c4ba78c900cd3b445f436e8406f581e5c3437971a1f1dea3f5132c16a1b36c2dd09f2c97800d28e7157bd7dc3ac3e76

                        • C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe

                          Filesize

                          560KB

                          MD5

                          197feb829312be2d9505c1492b6ddd16

                          SHA1

                          4e521c36e4fd6c7755d93f8281cc028a980b0979

                          SHA256

                          2a08227ca39953cd8f967682f4f101f8debdc323b63b37aa1e9ddc38b9009a12

                          SHA512

                          fa9b18fb32f2892a4844fcf3d29823c1375daca8b3c46ce2dd048e3b11ff2ba2acf6ef73c38e57d16712e75304c8961cf7f2dee4213dc10798f645f9d59c8cb9

                        • C:\Users\Admin\AppData\Local\Temp\1011357001\20f7c57d3e.exe

                          Filesize

                          1.9MB

                          MD5

                          972aeaccbec56da479e178a53d3b24ff

                          SHA1

                          af7d676bf5c59c2ac6cfaaaaad067ed34090e675

                          SHA256

                          c4a071a267dabdb052c37972911874070424f210cd7f3aa6e33cf4e08efbd87d

                          SHA512

                          53599df300461312f499a4c8ef303724d74417b5d26a9cf189a35dcf6a76d0aa686c8341af6e50c35182d769c2223407cf9076878fbaf52e0f6c2933dff319e1

                        • C:\Users\Admin\AppData\Local\Temp\1011358001\1afa212366.exe

                          Filesize

                          1.8MB

                          MD5

                          b3e050ed821da21358b0ede9caaa0072

                          SHA1

                          0cf01c23e9cbbe1439e9ed775e84ff8dfe801c80

                          SHA256

                          0312a298b39354700296f5ab5647989d876219e199092fa78229c1280a06cee0

                          SHA512

                          3c09a26a84d2b5fec4c0e9bfc65bae503888a4cfa10017a2539970dcdcac05536717cbb65942746dd0eb84d26743f7ad470261d52accc2900ee9f4f7602f20ba

                        • C:\Users\Admin\AppData\Local\Temp\1011359001\c4eb24b751.exe

                          Filesize

                          1.7MB

                          MD5

                          9387e037e8c807c8447c95073b13b0a6

                          SHA1

                          5e954c6df3299b5857f00ce05c710aa35aa185b4

                          SHA256

                          db04aa6bb0f101f37ab6a726f553ebc59f5b45a44f8e60c78f09c678fa47ad9e

                          SHA512

                          ec11b76ef4604833b4aaf696d666f674445dcf6cae86ff903c780e6f4ebb5c7703388d032618bff69abe502459ef99f696ba2759f346ba79cb85cff2ad70dd54

                        • C:\Users\Admin\AppData\Local\Temp\1011360001\916dd51227.exe

                          Filesize

                          947KB

                          MD5

                          41389a16e01cec68238b31986d5a0c14

                          SHA1

                          32047c6fde259dcb4ad6a0d89de7341ff32084b8

                          SHA256

                          5963ea20d6c1b8712092547a62280ffe4e83f0768841f8d18bdaaa097250ed94

                          SHA512

                          ea2eaccfc7d907c7741b3e0efab559a77e42ed04446f0f05fa457902d5fbd35b531f3f08db1c4e831c48bbc9baa6a900a0d211c6d8fd84420ec1a9f5a84a77be

                        • C:\Users\Admin\AppData\Local\Temp\1011361001\2757ec8910.exe

                          Filesize

                          2.6MB

                          MD5

                          23d8fedbfa886da9a9da6074862df31e

                          SHA1

                          605e9b0ed6a4706a8e6b0af909dfd0caefee23eb

                          SHA256

                          83e05c86c86df81686dea5838d918c70a12026639b80dda9c93f6492442dd408

                          SHA512

                          b1b5d5cc05f7a08d9fb9293eb5885cfed349d590184ad38b415e05f5cff874c3591365a9c21405ff0941fe41c9c1dc580b89dece15f3174d7e99d72514151c0c

                        • C:\Users\Admin\AppData\Local\Temp\Cab4644.tmp

                          Filesize

                          70KB

                          MD5

                          49aebf8cbd62d92ac215b2923fb1b9f5

                          SHA1

                          1723be06719828dda65ad804298d0431f6aff976

                          SHA256

                          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                          SHA512

                          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                        • C:\Users\Admin\AppData\Local\Temp\Tar46F2.tmp

                          Filesize

                          181KB

                          MD5

                          4ea6026cf93ec6338144661bf1202cd1

                          SHA1

                          a1dec9044f750ad887935a01430bf49322fbdcb7

                          SHA256

                          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                          SHA512

                          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                          Filesize

                          1.8MB

                          MD5

                          6e62c424734a15da271aeb9057391fa4

                          SHA1

                          14c50350a560be190aa3caf909dbc31e502f382b

                          SHA256

                          4c14758090f62a06c099a1345ae3fb03b317e5d0370b3d4a5422996087111a3f

                          SHA512

                          09f9d9f03504fad822d6ca0affcdb21acfa4f4be1100a4e79f1f3d1b767dbc03a4cc95e677d99eaf316ec6e712f144d2d1ca46fdf1972b6c1c987869db4a5819

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          442KB

                          MD5

                          85430baed3398695717b0263807cf97c

                          SHA1

                          fffbee923cea216f50fce5d54219a188a5100f41

                          SHA256

                          a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                          SHA512

                          06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                          Filesize

                          8.0MB

                          MD5

                          a01c5ecd6108350ae23d2cddf0e77c17

                          SHA1

                          c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                          SHA256

                          345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                          SHA512

                          b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                          Filesize

                          7KB

                          MD5

                          7960924f4d431c7798cd97c2eb1b499a

                          SHA1

                          950dbd7b89fa159fe1a819cd0cee6ff5fe7eb537

                          SHA256

                          80d358309fbd604391b6ae661111af6ff35b7a7f694d92d3f5f1d4a24eb4d315

                          SHA512

                          517875ae34cf5978e4bbc247f35e8658ed89b6b864c11183fe263331846073e4f70a6b990fde0ac2f32d12037a141ea4c19f189cf658e665fd3555eeab40039c

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                          Filesize

                          7KB

                          MD5

                          4f633b8678838feb3419cbe9e5bf6ce7

                          SHA1

                          b9835147aa31d93c99ac355972fdd478b6de3e12

                          SHA256

                          67d2e5b0ddc2f7df7779556e44fe5889d47ac6f53acaf7b1a07d5b4953ce13cc

                          SHA512

                          00b3c864eff00a96296b0a12354549f7080f0cb36468b60826b6e5ef5d48b959a4857dcaac74583fba63516f718fd5182dd7ec69d0f346dd24acf59a8a2b2cd6

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          2KB

                          MD5

                          45382653ad866f592e60b2b0f57c6463

                          SHA1

                          971a7dbb8822970234ed727b9b5699524782bed4

                          SHA256

                          ee0c8c50a61c8b732914d7b403cebd25c95fc0971e8e39b505cb44b9b2caa2aa

                          SHA512

                          7548c1dbc9cc8aa4b5409d0dd1c528093f3acab9934ea53fbec1151d33af5cf421f65b04a6120e6e1910717a3c99fade3cd109fb507175d76d7b4fe0281481bb

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\5aff99d9-debb-4abc-89fc-563574f980c4

                          Filesize

                          11KB

                          MD5

                          de90fde584cbde5f34fcf18c5ef83df6

                          SHA1

                          bbf28c3973991af1e313a2bfc6e16ee86c8110f6

                          SHA256

                          4812c5bf104fb43472a3cdc204e6c4214bd603533821878b4a9d3f6402cd20d6

                          SHA512

                          b8f10b87d5eacfcd5295cbce24293e00d9de55d0f564245780f285155396f8435f73250ab1466a3674c97ed67e233c6f0a57764ae91f3eabc1b2321b882ceb8f

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\8009c589-08ba-4b1c-af30-2db83b093cc0

                          Filesize

                          745B

                          MD5

                          0da2a58a49770f364a06fc86f2d575ca

                          SHA1

                          f56c07075228ab1f956eeadefba0a84398f67ea2

                          SHA256

                          93fced7a2fa04535af4f5a7a06d7b26d4961a3f6f578aff3cc8ff0e28c7050d2

                          SHA512

                          500c763e9faa04d39846f5d152d77949779fe70b47d98544e2a8489c28d022d3c39cd8251a8ba155432642af0e33df260f694da227260504edc4e093c044109d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                          Filesize

                          997KB

                          MD5

                          fe3355639648c417e8307c6d051e3e37

                          SHA1

                          f54602d4b4778da21bc97c7238fc66aa68c8ee34

                          SHA256

                          1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                          SHA512

                          8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                          Filesize

                          116B

                          MD5

                          3d33cdc0b3d281e67dd52e14435dd04f

                          SHA1

                          4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                          SHA256

                          f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                          SHA512

                          a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                          Filesize

                          479B

                          MD5

                          49ddb419d96dceb9069018535fb2e2fc

                          SHA1

                          62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                          SHA256

                          2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                          SHA512

                          48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                          Filesize

                          372B

                          MD5

                          8be33af717bb1b67fbd61c3f4b807e9e

                          SHA1

                          7cf17656d174d951957ff36810e874a134dd49e0

                          SHA256

                          e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                          SHA512

                          6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                          Filesize

                          11.8MB

                          MD5

                          33bf7b0439480effb9fb212efce87b13

                          SHA1

                          cee50f2745edc6dc291887b6075ca64d716f495a

                          SHA256

                          8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                          SHA512

                          d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                          Filesize

                          1KB

                          MD5

                          688bed3676d2104e7f17ae1cd2c59404

                          SHA1

                          952b2cdf783ac72fcb98338723e9afd38d47ad8e

                          SHA256

                          33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                          SHA512

                          7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                          Filesize

                          1KB

                          MD5

                          937326fead5fd401f6cca9118bd9ade9

                          SHA1

                          4526a57d4ae14ed29b37632c72aef3c408189d91

                          SHA256

                          68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                          SHA512

                          b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs-1.js

                          Filesize

                          6KB

                          MD5

                          c59109914fba50a64e699a9ee60e6b1d

                          SHA1

                          f70ce3777dde6a8058bac4e9a50ced9b50434fbf

                          SHA256

                          a95d2bbf7d1ef8f0c032acb267348e17e3ef16f0235f535fbfaa4783e876026a

                          SHA512

                          72776c19e558f8b44d384cd66c4afa71f39b410919b4f9630ba28eb160583accac5da616149ae3600a096999bb2cb40df20bf271d44694ff39a9555c0463de50

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs-1.js

                          Filesize

                          7KB

                          MD5

                          6e294c6c770b862b06b083481f33c2b7

                          SHA1

                          5face5ad2e4a53bde92deff4ff01eb488c36bbdd

                          SHA256

                          3c8c745f89ec019922fe499c163c2dff836621db4564ca8eef5ebee24cad68cc

                          SHA512

                          a23980b4a610f66773f5f93d96290047798bcbfcd2cce19a911e18d888a5311e5f64108510dc3db8ccecb626c69be304998d8af4ed377437f2e36bf20467db06

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs-1.js

                          Filesize

                          7KB

                          MD5

                          2f7f95776116010f25e8f1400b6fdadd

                          SHA1

                          e325e9a44ae5a92218550bf1855ff76e3f967519

                          SHA256

                          033a0ab2181714ca3294ef0fdf5be755b53f8af8aaef72a908a472be72e6e7db

                          SHA512

                          ba27034db852f6f978327e7d061d102755efd0fa03e1649bc5d23acfa5a04a06bce187693dcdc7aab76aec5fce8b395f8b36ba8f0670e0a7a96aa5427e766e52

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\sessionstore-backups\recovery.jsonlz4

                          Filesize

                          4KB

                          MD5

                          cce994ff22104943857059d93a78d700

                          SHA1

                          d9a50c82b815cde278cd8d075e0c0ffcf2e36dc2

                          SHA256

                          19208d3532083bc69df1ed0c7112199dcf67b20e44953452757ffdbba39e0fb1

                          SHA512

                          789ad90ea0d62ea124ef05dc749a2a6f415897d3b3323d903dab029284be3bea218c938af39dd856a6c2b5c103f3d8ed719cef6ff65178fd7df8d5d0184e19e2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                          Filesize

                          184KB

                          MD5

                          3dc733f51b6c47c0e57ae7035b9abacf

                          SHA1

                          d4c28a6f9d4bae9e297440a46726a2cb3e2504ba

                          SHA256

                          aafa700fb884f14becaf86a0eb9df79dfa15885b2ebe11cabe5f48a3a5d9e0e1

                          SHA512

                          e02670f6fa626a21ad150e0e0e589ba9f1f7a1fb921dc28f4117dc0a30a337b9c9b165dd0a30da864fe4dbdf130372e846648792a0bcf5aad4e8d28118101067

                        • \Users\Admin\AppData\Local\Temp\dFsD8F7wGdJ4ww8\Y-Cleaner.exe

                          Filesize

                          1.4MB

                          MD5

                          a8cf5621811f7fac55cfe8cb3fa6b9f6

                          SHA1

                          121356839e8138a03141f5f5856936a85bd2a474

                          SHA256

                          614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c

                          SHA512

                          4479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd

                        • memory/1084-1813-0x000000001B5C0000-0x000000001B8A2000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/1084-1814-0x0000000002810000-0x0000000002818000-memory.dmp

                          Filesize

                          32KB

                        • memory/1812-73-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-55-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-61-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-59-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-57-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-53-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-51-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-49-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-47-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-97-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-95-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-45-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-67-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-42-0x0000000000E00000-0x0000000000F8C000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/1812-1223-0x0000000000AC0000-0x0000000000B0C000-memory.dmp

                          Filesize

                          304KB

                        • memory/1812-1222-0x0000000005380000-0x0000000005436000-memory.dmp

                          Filesize

                          728KB

                        • memory/1812-1225-0x0000000000B60000-0x0000000000BB4000-memory.dmp

                          Filesize

                          336KB

                        • memory/1812-43-0x0000000004E00000-0x0000000004F44000-memory.dmp

                          Filesize

                          1.3MB

                        • memory/1812-69-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-77-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-44-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-71-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-75-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-65-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-105-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-63-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-103-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-101-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-99-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-93-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-91-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-89-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-87-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-85-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-83-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-81-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1812-79-0x0000000004E00000-0x0000000004F3F000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1916-1406-0x0000000000A60000-0x0000000000F01000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/1916-1647-0x0000000000A60000-0x0000000000F01000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/1916-1363-0x0000000000A60000-0x0000000000F01000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/1920-5-0x0000000000C40000-0x00000000010F4000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/1920-0-0x0000000000C40000-0x00000000010F4000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/1920-1-0x0000000077680000-0x0000000077682000-memory.dmp

                          Filesize

                          8KB

                        • memory/1920-2-0x0000000000C41000-0x0000000000C6F000-memory.dmp

                          Filesize

                          184KB

                        • memory/1920-3-0x0000000000C40000-0x00000000010F4000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/1920-17-0x0000000000C40000-0x00000000010F4000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/1920-20-0x0000000006B10000-0x0000000006FC4000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/1920-19-0x0000000006B10000-0x0000000006FC4000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2292-1309-0x00000000030A0000-0x00000000030FC000-memory.dmp

                          Filesize

                          368KB

                        • memory/2292-1310-0x00000000030A0000-0x00000000030FC000-memory.dmp

                          Filesize

                          368KB

                        • memory/2292-1336-0x0000000000450000-0x000000000045A000-memory.dmp

                          Filesize

                          40KB

                        • memory/2292-1367-0x0000000000EE0000-0x0000000000F0A000-memory.dmp

                          Filesize

                          168KB

                        • memory/2292-1366-0x00000000030A0000-0x00000000030FC000-memory.dmp

                          Filesize

                          368KB

                        • memory/2292-1365-0x00000000030A0000-0x00000000030FC000-memory.dmp

                          Filesize

                          368KB

                        • memory/2292-1368-0x0000000000EE0000-0x0000000000F0A000-memory.dmp

                          Filesize

                          168KB

                        • memory/2292-1337-0x0000000000450000-0x000000000045A000-memory.dmp

                          Filesize

                          40KB

                        • memory/2292-1308-0x00000000030A0000-0x00000000030FC000-memory.dmp

                          Filesize

                          368KB

                        • memory/2292-1306-0x00000000006C0000-0x00000000006CA000-memory.dmp

                          Filesize

                          40KB

                        • memory/2292-1307-0x00000000006C0000-0x00000000006CA000-memory.dmp

                          Filesize

                          40KB

                        • memory/2292-1340-0x00000000006C0000-0x00000000006CA000-memory.dmp

                          Filesize

                          40KB

                        • memory/2292-1341-0x00000000030A0000-0x00000000030FC000-memory.dmp

                          Filesize

                          368KB

                        • memory/2292-1364-0x00000000030A0000-0x00000000030FC000-memory.dmp

                          Filesize

                          368KB

                        • memory/2292-1311-0x00000000030A0000-0x00000000030FC000-memory.dmp

                          Filesize

                          368KB

                        • memory/2292-1289-0x0000000000450000-0x000000000045A000-memory.dmp

                          Filesize

                          40KB

                        • memory/2672-1335-0x0000000000400000-0x0000000000C82000-memory.dmp

                          Filesize

                          8.5MB

                        • memory/2672-1379-0x0000000000400000-0x0000000000C82000-memory.dmp

                          Filesize

                          8.5MB

                        • memory/2672-1674-0x0000000000400000-0x0000000000C82000-memory.dmp

                          Filesize

                          8.5MB

                        • memory/2924-23-0x0000000000C80000-0x0000000001134000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2924-1656-0x0000000006650000-0x00000000068FC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/2924-1404-0x0000000006C70000-0x0000000007111000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/2924-1221-0x0000000000C80000-0x0000000001134000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2924-1224-0x0000000000C80000-0x0000000001134000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2924-1405-0x0000000006C70000-0x0000000007111000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/2924-1362-0x0000000006C70000-0x0000000007111000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/2924-1360-0x0000000006C70000-0x0000000007111000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/2924-1334-0x0000000006C70000-0x00000000074F2000-memory.dmp

                          Filesize

                          8.5MB

                        • memory/2924-22-0x0000000000C81000-0x0000000000CAF000-memory.dmp

                          Filesize

                          184KB

                        • memory/2924-1597-0x0000000006650000-0x00000000068FC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/2924-1397-0x0000000006C70000-0x00000000072F5000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/2924-1333-0x0000000006C70000-0x00000000074F2000-memory.dmp

                          Filesize

                          8.5MB

                        • memory/2924-21-0x0000000000C80000-0x0000000001134000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2924-27-0x0000000000C80000-0x0000000001134000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2924-1378-0x0000000006C70000-0x00000000074F2000-memory.dmp

                          Filesize

                          8.5MB

                        • memory/2924-1439-0x0000000006C70000-0x00000000072F5000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/2924-24-0x0000000000C80000-0x0000000001134000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2924-26-0x0000000000C80000-0x0000000001134000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/2924-1396-0x0000000006C70000-0x00000000072F5000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/3372-1399-0x0000000000BC0000-0x0000000001245000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/3372-1401-0x0000000000BC0000-0x0000000001245000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/3416-1294-0x000000001B7F0000-0x000000001BAD2000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/3416-1295-0x0000000002340000-0x0000000002348000-memory.dmp

                          Filesize

                          32KB

                        • memory/3604-1601-0x0000000001150000-0x00000000013FC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/3604-1666-0x0000000001150000-0x00000000013FC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/3604-1662-0x0000000001150000-0x00000000013FC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/3604-1600-0x0000000001150000-0x00000000013FC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/3604-1598-0x0000000001150000-0x00000000013FC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4296-1780-0x000000001B650000-0x000000001B932000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/4296-1781-0x0000000002350000-0x0000000002358000-memory.dmp

                          Filesize

                          32KB

                        • memory/4780-1254-0x0000000001D70000-0x0000000001D78000-memory.dmp

                          Filesize

                          32KB

                        • memory/4780-1253-0x000000001B5B0000-0x000000001B892000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/5048-1272-0x00000000005D0000-0x00000000005D8000-memory.dmp

                          Filesize

                          32KB

                        • memory/5048-1271-0x00000000005B0000-0x00000000005BA000-memory.dmp

                          Filesize

                          40KB

                        • memory/5048-1270-0x0000000000580000-0x00000000005A6000-memory.dmp

                          Filesize

                          152KB

                        • memory/5048-1269-0x0000000000C70000-0x0000000000D10000-memory.dmp

                          Filesize

                          640KB

                        • memory/5048-1273-0x00000000005E0000-0x00000000005FE000-memory.dmp

                          Filesize

                          120KB

                        • memory/5048-1268-0x0000000001370000-0x0000000001402000-memory.dmp

                          Filesize

                          584KB