Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 21:21

General

  • Target

    fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5N.exe

  • Size

    1.8MB

  • MD5

    ebf798251a9e386cfb6cffcf54542830

  • SHA1

    5da641a8ad380d88bd05208339832f4886401d5d

  • SHA256

    fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5

  • SHA512

    0a5a2e0075c44997f73c4784936b7407cec2624bbd57917c65b279104f55aa8e84d73fab29e481e8b6c12c67d23432ceff859b6e54bec5f0069d18866bafbcf0

  • SSDEEP

    24576:c6aKEeSuuI1l4wI3O0GH7OKDfm5GWJTph4VKXAiXecS6+gNpp9MHoFtlgs7o3/TT:TRKW4wmkSKLmrtCjiXtpKKg31

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

gcleaner

C2

92.63.197.221

45.91.200.135

Extracted

Family

xworm

C2

185.196.8.239:7000

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    WindowsUpdaterConf.exe

  • telegram

    https://api.telegram.org/bot8070077125:AAEdRIyp1anHye9Y0jcV8uNF6U4mmijN8Pk/sendMessage?chat_id=1818813749

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://dare-curbys.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

https://zinc-sneark.biz/api

https://dwell-exclaim.biz/api

https://formy-spill.biz/api

https://covery-mover.biz/api

https://print-vexer.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 1 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5N.exe
    "C:\Users\Admin\AppData\Local\Temp\fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5N.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe
        "C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe
          "C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2316
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2896
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'wL3EGdM.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2172
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\WindowsUpdaterConf.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3264
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsUpdaterConf.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3364
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WindowsUpdaterConf" /tr "C:\Users\Admin\WindowsUpdaterConf.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:3568
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c timeout /t 1 && DEL /f wL3EGdM.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1140
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 1
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:1876
      • C:\Users\Admin\AppData\Local\Temp\1012513001\777fba08f4.exe
        "C:\Users\Admin\AppData\Local\Temp\1012513001\777fba08f4.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4388
      • C:\Users\Admin\AppData\Local\Temp\1012514001\rhnew.exe
        "C:\Users\Admin\AppData\Local\Temp\1012514001\rhnew.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4592
      • C:\Users\Admin\AppData\Local\Temp\1012515001\518da6c8f0.exe
        "C:\Users\Admin\AppData\Local\Temp\1012515001\518da6c8f0.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        PID:4884
      • C:\Users\Admin\AppData\Local\Temp\1012516001\d2d5e9bf40.exe
        "C:\Users\Admin\AppData\Local\Temp\1012516001\d2d5e9bf40.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        PID:2488
      • C:\Users\Admin\AppData\Local\Temp\1012517001\fe550fa7e3.exe
        "C:\Users\Admin\AppData\Local\Temp\1012517001\fe550fa7e3.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3212
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3304
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3452
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3568
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3700
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3804
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
            PID:3904
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
              5⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:3920
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3920.0.434661912\1046986611" -parentBuildID 20221007134813 -prefsHandle 1244 -prefMapHandle 1236 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2040b345-e02d-43e2-87cd-65938d68d7d1} 3920 "\\.\pipe\gecko-crash-server-pipe.3920" 1308 12cd6158 gpu
                6⤵
                  PID:4236
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3920.1.73221003\1709317654" -parentBuildID 20221007134813 -prefsHandle 1512 -prefMapHandle 1508 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {38dc5f15-3744-43e4-b382-8b1ca9d458ad} 3920 "\\.\pipe\gecko-crash-server-pipe.3920" 1524 d71858 socket
                  6⤵
                    PID:1932
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3920.2.1248151572\1906000676" -childID 1 -isForBrowser -prefsHandle 2276 -prefMapHandle 2272 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0ef9c2a2-ac6b-4712-a4b5-9b12dcdb0aba} 3920 "\\.\pipe\gecko-crash-server-pipe.3920" 2288 1a1ef258 tab
                    6⤵
                      PID:1848
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3920.3.2039747137\733703145" -childID 2 -isForBrowser -prefsHandle 2736 -prefMapHandle 2732 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {33e9526c-9b21-453f-8b87-c10d84b03c3b} 3920 "\\.\pipe\gecko-crash-server-pipe.3920" 2748 1ccabe58 tab
                      6⤵
                        PID:548
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3920.4.2097424251\1226994830" -childID 3 -isForBrowser -prefsHandle 3676 -prefMapHandle 3120 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {05a79ec9-f3f4-4575-a066-601f553ca632} 3920 "\\.\pipe\gecko-crash-server-pipe.3920" 3664 1eedde58 tab
                        6⤵
                          PID:768
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3920.5.605377660\1286271666" -childID 4 -isForBrowser -prefsHandle 3744 -prefMapHandle 3748 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f522290-4c58-4c3f-8c82-a9854c01942a} 3920 "\\.\pipe\gecko-crash-server-pipe.3920" 3732 1eedf058 tab
                          6⤵
                            PID:2688
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3920.6.74520430\1835907603" -childID 5 -isForBrowser -prefsHandle 3916 -prefMapHandle 3920 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c0062bf-a2ff-444c-9bd1-411e4d290599} 3920 "\\.\pipe\gecko-crash-server-pipe.3920" 3904 1eedf358 tab
                            6⤵
                              PID:2564
                      • C:\Users\Admin\AppData\Local\Temp\1012518001\6b40d003b4.exe
                        "C:\Users\Admin\AppData\Local\Temp\1012518001\6b40d003b4.exe"
                        3⤵
                        • Modifies Windows Defender Real-time Protection settings
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Windows security modification
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4368
                  • C:\Windows\system32\taskeng.exe
                    taskeng.exe {2AE94E34-227D-4CC2-85A6-3DC009805015} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]
                    1⤵
                      PID:2396
                      • C:\Users\Admin\WindowsUpdaterConf.exe
                        C:\Users\Admin\WindowsUpdaterConf.exe
                        2⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2140

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HHT5LGG0\download[2].htm

                      Filesize

                      1B

                      MD5

                      cfcd208495d565ef66e7dff9f98764da

                      SHA1

                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                      SHA256

                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                      SHA512

                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\activity-stream.discovery_stream.json.tmp

                      Filesize

                      23KB

                      MD5

                      22bfb7cd7acc4612955784cf0c1bb598

                      SHA1

                      8989252c307894bbee31ee05687b7c0aa4f5c75a

                      SHA256

                      fff038d43120763238bf0c9f8e2d192f74af4b13a07bf87adbf0f050681c65be

                      SHA512

                      2de7264386aa95e38244f9e1247c17241b700901733a9f4a7914c3d22591723c9cdaf9163ee4c50dac8f5e6f63b42585c28d0c44a247af9bd0dcd611fbbf08f6

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                      Filesize

                      15KB

                      MD5

                      96c542dec016d9ec1ecc4dddfcbaac66

                      SHA1

                      6199f7648bb744efa58acf7b96fee85d938389e4

                      SHA256

                      7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                      SHA512

                      cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                    • C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe

                      Filesize

                      3.3MB

                      MD5

                      7823e902900881094372948957825fe1

                      SHA1

                      297a663f3b64fb9863164d10ac698bef03dd3a0f

                      SHA256

                      92d36e5fb3fdbf10ad10c7880c40013c2e21b8a49e20720137d2b4851681233f

                      SHA512

                      60d4ea35cfec5154cfa3cb767de7c839ca8b3987b27599ea218ec1c47f1d111a59f193cd3cfd1266ae384434ae653f1e0a297f7222a2592e529b2b4404dd6238

                    • C:\Users\Admin\AppData\Local\Temp\1012513001\777fba08f4.exe

                      Filesize

                      1.9MB

                      MD5

                      99a31354f39549f085e6ffc213da9332

                      SHA1

                      35bc861303e0085349919376dc3ecd87f2c00264

                      SHA256

                      e8004da7a3c79934e0234cf767e38363368899050858a81dfd31b2010395d40c

                      SHA512

                      fb38c1e4126c9ced52b40977ba67eab30b698c481c3bb1107b45b656e02a20839d977d4f0ec0de384c6cc465c19870849cef219a7d0a109fa2b21aaa3a6de4b1

                    • C:\Users\Admin\AppData\Local\Temp\1012514001\rhnew.exe

                      Filesize

                      1.8MB

                      MD5

                      90aa0042c2825073aac9d8cb97a3696d

                      SHA1

                      3bc907a5ddd6172fb9ce4b672feed48e3c2da961

                      SHA256

                      106d17aab9be8de992208dfce5f7fde982f0082d34dae389675ce1e19e168cae

                      SHA512

                      1547e0ef3dd94c4e05f430be114dadabaca8c29c589d9ca27d141e0eb3508d9b5557755cc0d081833b993397203b14d10248a947c92fcf0caf86416a07fc13f9

                    • C:\Users\Admin\AppData\Local\Temp\1012515001\518da6c8f0.exe

                      Filesize

                      1.7MB

                      MD5

                      3b0ee0f73b83c5fdec23ed05a9ce07f6

                      SHA1

                      95b1e81d4ff61b6b075751363b9df8892edc1185

                      SHA256

                      234acf55281350a35fc087395b98052b3e759ffc3dab816ae019c84b1c8818f1

                      SHA512

                      92a770454dfb5d12d560f664a4d3fd3d2b7913c0ca8ab72e8630681e6d7e1f3354ffa28195182593fd4f0b03a629bb2a82769f11035dfcb934fbf8f0fa7ea9a5

                    • C:\Users\Admin\AppData\Local\Temp\1012516001\d2d5e9bf40.exe

                      Filesize

                      4.9MB

                      MD5

                      e96aca70fff7cef90aeaecfd082dbaad

                      SHA1

                      c1a8c82f70d72dd66d1b4383f8728dc3e32f3a22

                      SHA256

                      49b75ffaa9e81188cd1cb9d09ec7e43912bf8dbf4c85e3e1ee061e18e7d89efb

                      SHA512

                      ae758571212f329544941a9c1cb9610c4c029acae2280bfdf466847daa024fd5c6d680f8663fafd75344cc6cba233876e1297b47da3cb68455d358f54841f242

                    • C:\Users\Admin\AppData\Local\Temp\1012517001\fe550fa7e3.exe

                      Filesize

                      947KB

                      MD5

                      80255e2c49a8627a19583eeaad5b942a

                      SHA1

                      b60aeae02d417e020082077ea4cd8b99dd21416c

                      SHA256

                      243409ec8812d65caecda60ae06e6c2e96ff6facad4c547194360731b74bcaea

                      SHA512

                      90f927024866a4bb789f679e0a8ad93cb31bca2c4612919f6841116063f831bafbc31630b8d4ec02c1928f192b2434ceb006e871909c08b9bef31af8915c80e9

                    • C:\Users\Admin\AppData\Local\Temp\1012518001\6b40d003b4.exe

                      Filesize

                      2.7MB

                      MD5

                      0f54b179b09e3bd6d38e6394942a095b

                      SHA1

                      54ef51be1678cf3cf0d1ce142d2f8011ea04cd6e

                      SHA256

                      19120b2ecb7405fc7fa7afe0a806571148c00cea20160fe66598016ab5329338

                      SHA512

                      6ab103d8e4083973cea5fb7f43115abb925e45c5174ccdaa29747640c61e31e82abc8d8143b9a5d3167db017aad28611ec447f9c4f45b3362e87048c02cd2150

                    • C:\Users\Admin\AppData\Local\Temp\CabF8B3.tmp

                      Filesize

                      70KB

                      MD5

                      49aebf8cbd62d92ac215b2923fb1b9f5

                      SHA1

                      1723be06719828dda65ad804298d0431f6aff976

                      SHA256

                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                      SHA512

                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                    • C:\Users\Admin\AppData\Local\Temp\TarF8C5.tmp

                      Filesize

                      181KB

                      MD5

                      4ea6026cf93ec6338144661bf1202cd1

                      SHA1

                      a1dec9044f750ad887935a01430bf49322fbdcb7

                      SHA256

                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                      SHA512

                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                      Filesize

                      442KB

                      MD5

                      85430baed3398695717b0263807cf97c

                      SHA1

                      fffbee923cea216f50fce5d54219a188a5100f41

                      SHA256

                      a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                      SHA512

                      06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                      Filesize

                      8.0MB

                      MD5

                      a01c5ecd6108350ae23d2cddf0e77c17

                      SHA1

                      c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                      SHA256

                      345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                      SHA512

                      b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                      Filesize

                      7KB

                      MD5

                      ebbd074b68e4ce2a5b24159184eb5e6b

                      SHA1

                      331483a45179b5a160147d4e8e8b186abb070857

                      SHA256

                      f330a82b97fde55875656584a5b1c4329baf0bde90b9f0090a64630c9c5841ce

                      SHA512

                      1c04812b9fc42563e76a4d9a3be0cb861b6127d50a2d04f83a473e9e28d190a5f82ee711b117546c63e1c84f099134975270e20c14c1866275d6f4181ca179c6

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      2KB

                      MD5

                      f019564ac8fcfb6aae94bf09a2eb3a08

                      SHA1

                      0563f959053fdfcdf20ef32e90efa6515faffd9d

                      SHA256

                      5fb6c3dfbd004e9012384b38f7244681505aa9b469dfa3a73202214acd619ab1

                      SHA512

                      1a7f8df1f96223b6ba9e64e3029bb3c6622722da36e2afb5a1b0e0022e0650ebb4ab5d97b7e82612be75e10de80ebd0f9349189ae4677929d82978bb57578f41

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\04ae5c5f-031c-494f-9a73-108527177d41

                      Filesize

                      11KB

                      MD5

                      05e635d62919c1dc018eaa62bf692d33

                      SHA1

                      08ce8deb1447c7fa02b1951db10940c70c23cccc

                      SHA256

                      0c2031302f57df1f0ac2909b9fcb8e93514e1062d334e15c7d9be31aedb3fb7b

                      SHA512

                      49f2e85059a19999849d8f6034151bf4ae40b3ed5381480c2ef6b66f0e612cb9a96b027e788e57be3398de7ca420e62b04182b1ae4f184b46b9e6b69367251d7

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\d80fd839-d8dc-4921-96bc-a23f9a41109c

                      Filesize

                      745B

                      MD5

                      ce1b234af34cd1b90e089ef7545f042f

                      SHA1

                      35782e3f69d816235fbb1b058cf0c12c61eaf2da

                      SHA256

                      c2260e35a3151f72f3a6233cdc6f3526613f42d5ef4604d59f511d8ea77f3d8f

                      SHA512

                      f4b30e4f9637bcc27547062c216f1c98cb02585d8322d84a423d5b5b4043251b02a5464693c2ddf332c9edf00da56b97e5ae3700e6bf4145bb727642ec159c05

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                      Filesize

                      997KB

                      MD5

                      fe3355639648c417e8307c6d051e3e37

                      SHA1

                      f54602d4b4778da21bc97c7238fc66aa68c8ee34

                      SHA256

                      1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                      SHA512

                      8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                      Filesize

                      116B

                      MD5

                      3d33cdc0b3d281e67dd52e14435dd04f

                      SHA1

                      4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                      SHA256

                      f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                      SHA512

                      a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                      Filesize

                      479B

                      MD5

                      49ddb419d96dceb9069018535fb2e2fc

                      SHA1

                      62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                      SHA256

                      2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                      SHA512

                      48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                      Filesize

                      372B

                      MD5

                      8be33af717bb1b67fbd61c3f4b807e9e

                      SHA1

                      7cf17656d174d951957ff36810e874a134dd49e0

                      SHA256

                      e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                      SHA512

                      6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                      Filesize

                      11.8MB

                      MD5

                      33bf7b0439480effb9fb212efce87b13

                      SHA1

                      cee50f2745edc6dc291887b6075ca64d716f495a

                      SHA256

                      8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                      SHA512

                      d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                      Filesize

                      1KB

                      MD5

                      688bed3676d2104e7f17ae1cd2c59404

                      SHA1

                      952b2cdf783ac72fcb98338723e9afd38d47ad8e

                      SHA256

                      33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                      SHA512

                      7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                      Filesize

                      1KB

                      MD5

                      937326fead5fd401f6cca9118bd9ade9

                      SHA1

                      4526a57d4ae14ed29b37632c72aef3c408189d91

                      SHA256

                      68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                      SHA512

                      b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs-1.js

                      Filesize

                      6KB

                      MD5

                      d0707afca67d3e028174be06ca26bf8f

                      SHA1

                      064826b6ab339f621de7cf1105d1ef71cf0ad018

                      SHA256

                      0c84e1ba59bc19af43731a4784cfb125ab0116c0082a86b17de2fbd7ff31f6db

                      SHA512

                      b6984434628da55a25b9fe8b153143c1cac50d09fd63d88b9608964a1883c4d519fdfa0cd6891a76d66bf544d4812c7d65a805abc3b0bcd7e99a6285a2f3568c

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs-1.js

                      Filesize

                      7KB

                      MD5

                      0926a7797d822697e058f726577a8d37

                      SHA1

                      9c48a94e24d3be5622bad189df29a882123bb5ff

                      SHA256

                      dfd766afe83476d94845279c3e21025aee0cf1dce9f4da95e5bc4b0b72a901b0

                      SHA512

                      b558746262b9d70cc7bbc139a132914253e757e4927ae9cdcb44d83515345973f013e5b53b6a070de8136d61dd2662f535720300e243400472c82b7eaf686744

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs-1.js

                      Filesize

                      7KB

                      MD5

                      a13523855e6ea22d78e24adfaafb142e

                      SHA1

                      a03279f13d87bb2a98ed011634d310975ee3ced0

                      SHA256

                      7d1331b02f9308e572806118663d0a0b03fd66ad2562b0b2637ccbdfff25af55

                      SHA512

                      9e9dce3fb0e88c645f21fe59bf9fd14ec521ceb7444826c179c8ec7499e7cb68995c745fbda12d57175d33240689b30a05fb039d822bae96b7004cf2db7b1071

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\prefs.js

                      Filesize

                      6KB

                      MD5

                      bb73b7f5af830399fe420839f415f24f

                      SHA1

                      f471976777a7ef2f7d25329a6fa69fdb1f4fbff1

                      SHA256

                      0b695bd0952d03464997d239fcec344947240add94cb356b6276689524a3854d

                      SHA512

                      4229f097aff08bc25e300084403500d8aa91b5c2d89b3558b0bd406147120fb8c087ee5cc74ebf1952f5f7d09db7c1c24f0045cebbabc0ea9d27cfc3f192e424

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\sessionstore-backups\recovery.jsonlz4

                      Filesize

                      4KB

                      MD5

                      028fa82c474d743ac5a6103849e25632

                      SHA1

                      c63d26e97f7620dad7c6843796f1006bc3360402

                      SHA256

                      9a355179fe949e62d168eea06b67d0351b24e76bca5b6520084bd29941099729

                      SHA512

                      1cc87fe11b45b457d4bd818793d6001eb0623620ed1ea37e71ff17fdc152421307a6df469a661acf09a6d16e18d65091337d2302de64fc06e720d6a5b62b5425

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                      Filesize

                      184KB

                      MD5

                      3dc733f51b6c47c0e57ae7035b9abacf

                      SHA1

                      d4c28a6f9d4bae9e297440a46726a2cb3e2504ba

                      SHA256

                      aafa700fb884f14becaf86a0eb9df79dfa15885b2ebe11cabe5f48a3a5d9e0e1

                      SHA512

                      e02670f6fa626a21ad150e0e0e589ba9f1f7a1fb921dc28f4117dc0a30a337b9c9b165dd0a30da864fe4dbdf130372e846648792a0bcf5aad4e8d28118101067

                    • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                      Filesize

                      1.8MB

                      MD5

                      ebf798251a9e386cfb6cffcf54542830

                      SHA1

                      5da641a8ad380d88bd05208339832f4886401d5d

                      SHA256

                      fb08ab4d990067daa56452dad65d4322e5d1bd733e6b0e6a9b326141ef4992b5

                      SHA512

                      0a5a2e0075c44997f73c4784936b7407cec2624bbd57917c65b279104f55aa8e84d73fab29e481e8b6c12c67d23432ceff859b6e54bec5f0069d18866bafbcf0

                    • memory/2140-37661-0x0000000000B30000-0x0000000000E8E000-memory.dmp

                      Filesize

                      3.4MB

                    • memory/2312-18-0x0000000001160000-0x0000000001627000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2312-20-0x0000000006C70000-0x0000000007137000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2312-6-0x0000000001160000-0x0000000001627000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2312-4-0x0000000001160000-0x0000000001627000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2312-3-0x0000000001160000-0x0000000001627000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2312-2-0x0000000001161000-0x000000000118F000-memory.dmp

                      Filesize

                      184KB

                    • memory/2312-1-0x0000000077180000-0x0000000077182000-memory.dmp

                      Filesize

                      8KB

                    • memory/2312-0-0x0000000001160000-0x0000000001627000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2316-37237-0x0000000000400000-0x000000000041A000-memory.dmp

                      Filesize

                      104KB

                    • memory/2488-37263-0x0000000000E90000-0x0000000001386000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/2488-37259-0x0000000000E90000-0x0000000001386000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/2748-37190-0x00000000010E0000-0x00000000015A7000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2748-37238-0x0000000006970000-0x0000000006E19000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2748-21-0x00000000010E0000-0x00000000015A7000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2748-22-0x00000000010E0000-0x00000000015A7000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2748-37176-0x00000000010E0000-0x00000000015A7000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2748-23-0x00000000010E0000-0x00000000015A7000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2748-37174-0x0000000006970000-0x00000000071DE000-memory.dmp

                      Filesize

                      8.4MB

                    • memory/2748-37173-0x0000000006970000-0x00000000071DE000-memory.dmp

                      Filesize

                      8.4MB

                    • memory/2748-25-0x00000000010E0000-0x00000000015A7000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2748-26-0x00000000010E0000-0x00000000015A7000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2748-42-0x00000000010E0000-0x00000000015A7000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2748-37533-0x0000000006250000-0x000000000650A000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/2748-37191-0x0000000006970000-0x0000000006E19000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2748-37371-0x0000000006250000-0x000000000650A000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/2748-37303-0x0000000006970000-0x0000000006E66000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/2748-37256-0x0000000006970000-0x0000000006E66000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/2748-37207-0x0000000006970000-0x0000000006DEB000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2748-37213-0x0000000006970000-0x00000000071DE000-memory.dmp

                      Filesize

                      8.4MB

                    • memory/2748-37258-0x0000000006970000-0x0000000006DEB000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2748-37255-0x0000000006970000-0x0000000006E66000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/2816-71-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-47-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-93-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-91-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-97-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-81-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-79-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-77-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-99-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-101-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-103-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-89-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-105-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-83-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-73-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-75-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-41-0x0000000000B40000-0x0000000000E9E000-memory.dmp

                      Filesize

                      3.4MB

                    • memory/2816-85-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-43-0x00000000053D0000-0x0000000005588000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-95-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-65-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-44-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-45-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-69-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-49-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-51-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-53-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-55-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-67-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-63-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-61-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-87-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-59-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/2816-57-0x00000000053D0000-0x0000000005582000-memory.dmp

                      Filesize

                      1.7MB

                    • memory/4368-37534-0x0000000000CD0000-0x0000000000F8A000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/4368-37543-0x0000000000CD0000-0x0000000000F8A000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/4368-37390-0x0000000000CD0000-0x0000000000F8A000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/4368-37394-0x0000000000CD0000-0x0000000000F8A000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/4368-37372-0x0000000000CD0000-0x0000000000F8A000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/4388-37175-0x0000000000400000-0x0000000000C6E000-memory.dmp

                      Filesize

                      8.4MB

                    • memory/4388-37214-0x0000000000400000-0x0000000000C6E000-memory.dmp

                      Filesize

                      8.4MB

                    • memory/4592-37531-0x00000000000D0000-0x0000000000579000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/4592-37239-0x00000000000D0000-0x0000000000579000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/4592-37192-0x00000000000D0000-0x0000000000579000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/4884-37528-0x0000000000920000-0x0000000000D9B000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/4884-37208-0x0000000000920000-0x0000000000D9B000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/4884-37261-0x0000000000920000-0x0000000000D9B000-memory.dmp

                      Filesize

                      4.5MB