Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2024 17:04

General

  • Target

    file.exe

  • Size

    3.1MB

  • MD5

    5cc43c13e14113d07197871708ba3d6a

  • SHA1

    3fd30c8b2df49f949086aa654ca67e67bc963a08

  • SHA256

    e147291b4b3f7e51599ff3e03f07cc2f556d35d7a0fa1c8ed284498ca6efc7f2

  • SHA512

    515ca57618a4e09eaafe432e8a345f712d29488b97cc3b88299179694c1facb0a61c5bbc019e14481ee6b2258b531a0d5d4eff9ae187404e01451ed12ef5bb02

  • SSDEEP

    49152:rvlYcKpLjavBk95yL7Po+Yamr9EuBlKJUqq/yNXlxwPw:rv6vgv295yL7Po+w9EuBIuqr5w

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

amadey

Version

5.04

Botnet

397a17

C2

http://89.110.69.103

http://94.156.177.33

Attributes
  • install_dir

    0efeaab28d

  • install_file

    Gxtuum.exe

  • strings_key

    6dea7a0890c1d404d1b67c90aea6ece4

  • url_paths

    /Lv2D7fGdopb/index.php

    /b9kdj3s3C0/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

https://infect-crackle.cyou/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

https://infect-crackle.cyou/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 20 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 28 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe
        "C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1404
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c ping 127.0.0.1 -n 10 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "word" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:1720
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 10
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:556
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "word" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"
            5⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            PID:1488
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c ping 127.0.0.1 -n 8 > nul && copy "C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe" && ping 127.0.0.1 -n 8 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:2872
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 8
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:592
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 8
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2916
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2884
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
              6⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:2560
              • C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe
                "C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3420
                • C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe
                  "C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"
                  8⤵
                  • Executes dropped EXE
                  PID:4024
                • C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe
                  "C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4032
            • C:\Users\Admin\AppData\Local\Temp\word.exe
              "C:\Users\Admin\AppData\Local\Temp\word.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3676
              • C:\Users\Admin\AppData\Local\Temp\word.exe
                "C:\Users\Admin\AppData\Local\Temp\word.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3736
      • C:\Users\Admin\AppData\Local\Temp\1012992001\7qg0CPF.exe
        "C:\Users\Admin\AppData\Local\Temp\1012992001\7qg0CPF.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:296
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp44FC.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp44FC.tmp.bat
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2784
      • C:\Users\Admin\AppData\Local\Temp\1012993001\2d625e104b.exe
        "C:\Users\Admin\AppData\Local\Temp\1012993001\2d625e104b.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2512
      • C:\Users\Admin\AppData\Local\Temp\1012994001\c7f0b80348.exe
        "C:\Users\Admin\AppData\Local\Temp\1012994001\c7f0b80348.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:316
      • C:\Users\Admin\AppData\Local\Temp\1012995001\33ae5589a5.exe
        "C:\Users\Admin\AppData\Local\Temp\1012995001\33ae5589a5.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2080
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2392
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:964
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2180
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3044
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2528
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
            PID:2508
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
              5⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:2876
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2876.0.319346346\772344269" -parentBuildID 20221007134813 -prefsHandle 1192 -prefMapHandle 1092 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5fab39e4-9cfb-45fc-a793-b655b98abfbb} 2876 "\\.\pipe\gecko-crash-server-pipe.2876" 1280 100d5158 gpu
                6⤵
                  PID:1872
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2876.1.1403139729\56285921" -parentBuildID 20221007134813 -prefsHandle 1484 -prefMapHandle 1468 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4b9c96a6-2682-444a-9a32-d01297a13ca9} 2876 "\\.\pipe\gecko-crash-server-pipe.2876" 1496 edeb558 socket
                  6⤵
                    PID:2120
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2876.2.411533051\935602251" -childID 1 -isForBrowser -prefsHandle 1976 -prefMapHandle 1972 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 588 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a0a78b62-1695-4a14-962f-db4fb8f75084} 2876 "\\.\pipe\gecko-crash-server-pipe.2876" 1988 d66458 tab
                    6⤵
                      PID:1724
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2876.3.1764844602\864487706" -childID 2 -isForBrowser -prefsHandle 2808 -prefMapHandle 2804 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 588 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5aedbe1-dd77-489a-b3bf-c27112f076b9} 2876 "\\.\pipe\gecko-crash-server-pipe.2876" 2820 d5db58 tab
                      6⤵
                        PID:2012
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2876.4.269937631\624962792" -childID 3 -isForBrowser -prefsHandle 3836 -prefMapHandle 3832 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 588 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c717a82-1f9f-40d2-93b3-f266bc582873} 2876 "\\.\pipe\gecko-crash-server-pipe.2876" 3848 194b3d58 tab
                        6⤵
                          PID:2924
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2876.5.399912572\1443082483" -childID 4 -isForBrowser -prefsHandle 2720 -prefMapHandle 3388 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 588 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4626d935-c25f-4614-880f-487a566cb901} 2876 "\\.\pipe\gecko-crash-server-pipe.2876" 3948 209a9558 tab
                          6⤵
                            PID:2364
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2876.6.1967116728\68194722" -childID 5 -isForBrowser -prefsHandle 4112 -prefMapHandle 4116 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 588 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f26b25c-bd36-46d4-8203-1df004aa8c60} 2876 "\\.\pipe\gecko-crash-server-pipe.2876" 4100 2159e358 tab
                            6⤵
                              PID:2104
                      • C:\Users\Admin\AppData\Local\Temp\1012996001\7f79f8ece7.exe
                        "C:\Users\Admin\AppData\Local\Temp\1012996001\7f79f8ece7.exe"
                        3⤵
                        • Modifies Windows Defender Real-time Protection settings
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Windows security modification
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3300

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\activity-stream.discovery_stream.json.tmp

                    Filesize

                    23KB

                    MD5

                    8ac64e5a65e5ec11e32491d80e9bdb97

                    SHA1

                    bc7af4f3a946a0a00fbcff85ed772530482dffea

                    SHA256

                    4cb0f58145664af4f0a0843b4ccc133de7809de928ad20fef6d63cc442ae4ae5

                    SHA512

                    c886ed0c00013f83a0ab6b96ab099dca8b451b035eb7a76e5647838667b90fd88fa4f75221e5715fcadc644966aa34943e61f8dabd51c07e4bfd3256ce9f0014

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                    Filesize

                    15KB

                    MD5

                    96c542dec016d9ec1ecc4dddfcbaac66

                    SHA1

                    6199f7648bb744efa58acf7b96fee85d938389e4

                    SHA256

                    7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                    SHA512

                    cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                  • C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe

                    Filesize

                    5.0MB

                    MD5

                    b183e5ff29a1532a84e5a38983ab9e4e

                    SHA1

                    230c9cbd2e14598aaf73ae78c85c998a6b923a51

                    SHA256

                    81a45f430c102365b46c663203ae5708b6befe2848f01efc7b702aff7170c901

                    SHA512

                    31be2761821fb6bc81a010a3f68fa6901aa5e9768e9c57db53b52e0495c7340abccc9191500aa39540fef159578403e78d2af31ac364b89774d5f359b54c6c1e

                  • C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe

                    Filesize

                    799KB

                    MD5

                    89bd66e4285cb7295300a941964af529

                    SHA1

                    232d9fee67a3c3652a80e1c1a258f0d789c6a6cf

                    SHA256

                    a46bf8412717f75bf098966cb1f5074836e78f5699bb5073dcc45d59ca790047

                    SHA512

                    72d1c8c4b74bacca619a58062441203c6cfea81d064dc1933af7a3cb9758d924b011a6935e8d255aad58159a4ecbb3677cc6a6e80f6daa8b135711195a5c8498

                  • C:\Users\Admin\AppData\Local\Temp\1012992001\7qg0CPF.exe

                    Filesize

                    5.9MB

                    MD5

                    3297554944a2e2892096a8fb14c86164

                    SHA1

                    4b700666815448a1e0f4f389135fddb3612893ec

                    SHA256

                    e0a9fcd5805e66254aa20f8ddb3bdfca376a858b19222b178cc8893f914a6495

                    SHA512

                    499aa1679f019e29b4d871a472d24b89adddc68978317f85f095c7278f25f926cbf532c8520c2f468b3942a3e37e9be20aea9f83c68e8b5e0c9adbf69640ad25

                  • C:\Users\Admin\AppData\Local\Temp\1012993001\2d625e104b.exe

                    Filesize

                    1.8MB

                    MD5

                    d780c527e77e5d364222f238a1be814d

                    SHA1

                    f9f575fb76d0c56caa9ae40b9cb7bf138ed7a6b1

                    SHA256

                    c2d4357ca74eff5fb5d4578314a148b35b1ed049bb7b01432acfb522ec7fc023

                    SHA512

                    3eb051a61c8ffa9e3ac600b583da86a699ec4718516d4b39d13c2ed46bbc3741a9c6454173f47ef00f2a187132f1485fd3f7adcbf9b793f4cdb2308e28e529a5

                  • C:\Users\Admin\AppData\Local\Temp\1012994001\c7f0b80348.exe

                    Filesize

                    1.7MB

                    MD5

                    498e0c93df5ed66b1831f428750dcc49

                    SHA1

                    d1742e319af6ece96b50ba929411aa67d450b4e1

                    SHA256

                    ecf34e2df6d8da5946d74ce0c53f278b44dc955c0d63f2cfba900b1505e4f1e0

                    SHA512

                    dcfdb4d9261d5527970f539435778129b2489f6fd8d3261a5ecdd61a334d60910d88b2efd18115a671d966324a3d25a8f66dc6985431c4fcb184baf06bbadec3

                  • C:\Users\Admin\AppData\Local\Temp\1012995001\33ae5589a5.exe

                    Filesize

                    944KB

                    MD5

                    6b1ffb69c2b316bdccf175d4670b9631

                    SHA1

                    bbad646bfd834bc5ec330510bfafab1fe23927af

                    SHA256

                    c72087743c05988bc74a22832266cf31ccc6e7d2fc568b796b69f6d4b01a7a89

                    SHA512

                    17fa2303e30bbfb300412466599189a3b2f25e56c0ec5137a7e0350950d404927f31ff31174fabcde75ec5d55484a13844266e66e1d6dd5c662b77c45d72b07a

                  • C:\Users\Admin\AppData\Local\Temp\1012996001\7f79f8ece7.exe

                    Filesize

                    2.7MB

                    MD5

                    52c60b0648b29aa222a28c4b56dd0143

                    SHA1

                    e89e4192c9c99e2e9aa0277dfd9d31042f8433ec

                    SHA256

                    a48f21684a63e428a08768e7e9995f3035a4b14af845b3ab2a633c9f806d338d

                    SHA512

                    72670bd733b6b3293627af1f9317a547ede9df2a62c65d16d7b7c4a3ad329ab78c32753bab63a7046c67ec0047c0a2157be42112777a9653d57c87c14c686367

                  • C:\Users\Admin\AppData\Local\Temp\CabEE47.tmp

                    Filesize

                    70KB

                    MD5

                    49aebf8cbd62d92ac215b2923fb1b9f5

                    SHA1

                    1723be06719828dda65ad804298d0431f6aff976

                    SHA256

                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                    SHA512

                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                  • C:\Users\Admin\AppData\Local\Temp\TarEE69.tmp

                    Filesize

                    181KB

                    MD5

                    4ea6026cf93ec6338144661bf1202cd1

                    SHA1

                    a1dec9044f750ad887935a01430bf49322fbdcb7

                    SHA256

                    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                    SHA512

                    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                  • C:\Users\Admin\AppData\Local\Temp\tmp44FC.tmp.bat

                    Filesize

                    186B

                    MD5

                    790dd6f9aab53b59e358a126dc5d59fc

                    SHA1

                    ec6bf3eb0fa5d2e37c694bf71254e0ce0be1a5fc

                    SHA256

                    7ca8c160037742b7da30366775d7aae7882a98e1fbfdbbefb743c2a93d6b1c52

                    SHA512

                    a9d819b8d771febfa027de6f201d4effaf7bdd3334255707dddceb57b2b322649698903ee5d72f0e431780d29b01abedd5250d372100e6c66c0639965f86c7ef

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    442KB

                    MD5

                    85430baed3398695717b0263807cf97c

                    SHA1

                    fffbee923cea216f50fce5d54219a188a5100f41

                    SHA256

                    a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                    SHA512

                    06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    8.0MB

                    MD5

                    a01c5ecd6108350ae23d2cddf0e77c17

                    SHA1

                    c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                    SHA256

                    345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                    SHA512

                    b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                  • C:\Users\Admin\AppData\Local\Temp\word.txt

                    Filesize

                    91B

                    MD5

                    90f1080b570e067b7897a324ae4a1d71

                    SHA1

                    8efe80936e23dd7ce53bf33d2f12886b958013e9

                    SHA256

                    9fe1264790fd8032f8f5be1f4d767049666d5887252d7211fd899458837946cc

                    SHA512

                    92583f6f6ed66706fbd78710409ea4de4efe63179733a13744a881c78725f8a63cd9dc76ac7ac4fec80f707a86a20e09e826c1b6b0a99637cc50495961b644cc

                  • C:\Users\Admin\AppData\Local\Temp\word.txt

                    Filesize

                    91B

                    MD5

                    095cf5e6a3dfdf665d1ed05f3acd7e2d

                    SHA1

                    3a24f3c5e3cf42ae403c81a4352f412f4a4ed641

                    SHA256

                    4bcdcb3e5a718f5ebebe85c4e48aca0ecc427c0dc1db220b546aab96d61da304

                    SHA512

                    ce347e0478a6570aed1bc3c362f7b3778a498089a7c57705daae105f5f5e14504eeee628ec37a609183b97e315e4b40240d6afa6e77db1236e845801c5b41e34

                  • C:\Users\Admin\AppData\Roaming\AdminUserCash\COOKIE~1

                    Filesize

                    20KB

                    MD5

                    c9ff7748d8fcef4cf84a5501e996a641

                    SHA1

                    02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

                    SHA256

                    4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

                    SHA512

                    d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

                  • C:\Users\Admin\AppData\Roaming\AdminUserCash\CREDIT~1

                    Filesize

                    92KB

                    MD5

                    6093b9b9effe107a1958b5e8775d196a

                    SHA1

                    f86ede48007734aebe75f41954ea1ef64924b05e

                    SHA256

                    a10b04d057393f5974c776ed253909cafcd014752a57da2971ae0dddfa889ab0

                    SHA512

                    2d9c20a201655ffcce71bfafa71b79fe08eb8aa02b5666588302608f6a14126a5a1f4213a963eb528514e2ea2b17871c4c5f9b5ef89c1940c40c0718ec367a77

                  • C:\Users\Admin\AppData\Roaming\AdminUserCash\LOGIN_~1

                    Filesize

                    46KB

                    MD5

                    02d2c46697e3714e49f46b680b9a6b83

                    SHA1

                    84f98b56d49f01e9b6b76a4e21accf64fd319140

                    SHA256

                    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                    SHA512

                    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin

                    Filesize

                    2KB

                    MD5

                    e7ec8379e2abdf095e26e5fa195e8cd8

                    SHA1

                    68eb011c09cfc6ace0e72567aa832d1d4e9e3980

                    SHA256

                    176b6db525bf3cc6d5ff8f1a34d8df4010c53c22eaa002708e6b0f983e8cc9de

                    SHA512

                    fe68dff78d12b56e69da41ba116a699a103b705f282a56bf7dcb1df561f624fa934d6157a8eb4f2767b379d31be169916978bcc4b4c4b45d11ff6c5940f9ae44

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin

                    Filesize

                    2KB

                    MD5

                    324681343a7aed034a2d31251d90976c

                    SHA1

                    41e2567a4bf922b36add47b966813c863cfae96b

                    SHA256

                    5f4ad17e829c587117d784abf08e48e51d27b26ba9c709a15357901363a33897

                    SHA512

                    527e771a0f4f67c93f989b418a61c2b9e1b4127b8fe789fec1b5bef16ca002bda91adda8cfe240288e22249ddc25ae5c9a794ddca8ae7da7c04cf50c5e7b7c57

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\1349d9e3-dbbe-4e2e-babe-3a7d0d1c4e72

                    Filesize

                    745B

                    MD5

                    b794291100d026cd8fa531b913e570da

                    SHA1

                    4763f78b6bbb57a392cfdd1020aff4d4f08a2d88

                    SHA256

                    261db82bfc4fa821923e9d39a038a91fce215147ba5e428fdab10f48bc639714

                    SHA512

                    77764ef79b14cb2f3c53d08fca126ccf8c7e868e0d78de981aa4acb42ad2ada106f508805d2cfad080f3ab453acffb953546c2fc896c58537570f14991919ce5

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\388dd342-9e08-4aac-a208-5061cef0046e

                    Filesize

                    12KB

                    MD5

                    e6d1522f8d46d78deacda2c8192c33c9

                    SHA1

                    f09e40a4c4ce6e55591f7fa5bf842b5000627c72

                    SHA256

                    3cbcb09cf5c09b46142e8a67af2f7b4fbc3b7837c61faea91115135be73f3c52

                    SHA512

                    2f5480e8e1ec1d179c33c9228ca17bbaa39921ee7a243efee2f334175bab832c2d957005095aa44a7c28bc2db6d6c92c53e194c71d3d5e34d310c37bb7c1d8c8

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                    Filesize

                    997KB

                    MD5

                    fe3355639648c417e8307c6d051e3e37

                    SHA1

                    f54602d4b4778da21bc97c7238fc66aa68c8ee34

                    SHA256

                    1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                    SHA512

                    8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    3d33cdc0b3d281e67dd52e14435dd04f

                    SHA1

                    4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                    SHA256

                    f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                    SHA512

                    a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                    Filesize

                    479B

                    MD5

                    49ddb419d96dceb9069018535fb2e2fc

                    SHA1

                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                    SHA256

                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                    SHA512

                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                    Filesize

                    372B

                    MD5

                    8be33af717bb1b67fbd61c3f4b807e9e

                    SHA1

                    7cf17656d174d951957ff36810e874a134dd49e0

                    SHA256

                    e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                    SHA512

                    6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                    Filesize

                    11.8MB

                    MD5

                    33bf7b0439480effb9fb212efce87b13

                    SHA1

                    cee50f2745edc6dc291887b6075ca64d716f495a

                    SHA256

                    8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                    SHA512

                    d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                    Filesize

                    1KB

                    MD5

                    688bed3676d2104e7f17ae1cd2c59404

                    SHA1

                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                    SHA256

                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                    SHA512

                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                    Filesize

                    1KB

                    MD5

                    937326fead5fd401f6cca9118bd9ade9

                    SHA1

                    4526a57d4ae14ed29b37632c72aef3c408189d91

                    SHA256

                    68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                    SHA512

                    b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    47691b73b571a5a0731a46af7ef696af

                    SHA1

                    fe47c30ffedf47bed0e31dfd83370edb0234ce66

                    SHA256

                    2a594c3bf64542abc9b6174c0b461c1f1e1f32d26140696d90c6546b72c2aa52

                    SHA512

                    7c7de5d571998e9509d6ad94346881117ba146e83a67335ed9db02bb3c117956cee4dca7b7dd340dcd2c75a0baf19daa61276b29efaf3a02bb443bc13ce4d3e9

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    2195bb8e61e368c6cda2c282c11518c9

                    SHA1

                    529acc71f15eb71e4491f2710cacd5616491447c

                    SHA256

                    9d6f1071560979491ea73f3b20b1bf0a470d6e165264d9cdac7a0b03edb10cd8

                    SHA512

                    42fc81554bf83649423fff465778ef714feec1c296ec4a9ea13ec5c332230eea154e976f1fa7ad2c592cbedbe1243978384edf2a062e18423824898f97cb41cb

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs.js

                    Filesize

                    6KB

                    MD5

                    2268630b99769e5621b36bb32b3bd76a

                    SHA1

                    249aad699b0bed14891c4168e58a376688e947d9

                    SHA256

                    947d893309484c12fa2f0a476beaf0926e843042bf275651b8f2d069a5547df9

                    SHA512

                    aaafea0e492158c222cc71708736fe8a3b2852ba9cd9aa04db51b5c40840b4b1886f44489a3d8a5ab398557a1c0521ffed74c6004529a538729d2b9b938e2ef3

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs.js

                    Filesize

                    6KB

                    MD5

                    39304172a455ecef1273bd9f54609f3a

                    SHA1

                    2009bcf657dd82bc2a6035c1477bd49562aba687

                    SHA256

                    4f172b3440b0729e448a967c6ad9e1e83ee51fb48da9c0cea9832f2a4dd51307

                    SHA512

                    0cf298efbf8fc14cc53991678d4841337cf670197f35e3b05619b62c98fde88fbc22258884d9180b6d70862f3fae5810dd95746fb45d6208baee888589f9128e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4

                    Filesize

                    4KB

                    MD5

                    bc8a7f3942c5604e40edd9fc1b226fae

                    SHA1

                    97959b2bea0ed583da7c29c3cd37535e594eef6b

                    SHA256

                    a26f8203b0a08f75d7b47dcfc0f14f4104f8a3539ed35c3ff4d1daead19a893c

                    SHA512

                    1aae00fb766d6a8943485ed6e35cd2e50e5b561be6320a2c65f5d96d637f65baea6bd0abae969a6796e733f8d0f86301ef5585d603ed24f716b0cfb945e911eb

                  • \Users\Admin\AppData\Local\Temp\10000760101\vector.exe

                    Filesize

                    2.5MB

                    MD5

                    d1e3f88d0caf949d5f1b4bf4efbb95a4

                    SHA1

                    61ffd2589a1965bf9cb874833c4c9b106b3e43e8

                    SHA256

                    c505f3b2f40b8a68e7cacfe2a9925498ab0f7ef29aa7023bb472597021066b2e

                    SHA512

                    5d4c43e858371f24ebafb56388a586c081d7b0289a3b039dbb2b011e9864e8e9f5dc7037fcb3e88f4bec4259a09ce5f3ccdae3161b43dff140e0e4ca7bff96c3

                  • \Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\32\sqlite.interop.dll

                    Filesize

                    1.4MB

                    MD5

                    6f2fdecc48e7d72ca1eb7f17a97e59ad

                    SHA1

                    fcbc8c4403e5c8194ee69158d7e70ee7dbd4c056

                    SHA256

                    70e48ef5c14766f3601c97451b47859fddcbe7f237e1c5200cea8e7a7609d809

                    SHA512

                    fea98a3d6fff1497551dc6583dd92798dcac764070a350fd381e856105a6411c94effd4b189b7a32608ff610422b8dbd6d93393c5da99ee66d4569d45191dc8b

                  • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                    Filesize

                    3.1MB

                    MD5

                    5cc43c13e14113d07197871708ba3d6a

                    SHA1

                    3fd30c8b2df49f949086aa654ca67e67bc963a08

                    SHA256

                    e147291b4b3f7e51599ff3e03f07cc2f556d35d7a0fa1c8ed284498ca6efc7f2

                    SHA512

                    515ca57618a4e09eaafe432e8a345f712d29488b97cc3b88299179694c1facb0a61c5bbc019e14481ee6b2258b531a0d5d4eff9ae187404e01451ed12ef5bb02

                  • \Users\Admin\AppData\Local\Temp\word.exe

                    Filesize

                    76KB

                    MD5

                    0e362e7005823d0bec3719b902ed6d62

                    SHA1

                    590d860b909804349e0cdc2f1662b37bd62f7463

                    SHA256

                    2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

                    SHA512

                    518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

                  • memory/296-68-0x0000000000250000-0x0000000000C2C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/296-134-0x0000000000250000-0x0000000000C2C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/296-76-0x00000000083C0000-0x000000000842A000-memory.dmp

                    Filesize

                    424KB

                  • memory/296-78-0x0000000008CF0000-0x0000000008DA2000-memory.dmp

                    Filesize

                    712KB

                  • memory/296-80-0x0000000002EF0000-0x0000000002F10000-memory.dmp

                    Filesize

                    128KB

                  • memory/296-70-0x0000000000250000-0x0000000000C2C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/296-69-0x0000000000250000-0x0000000000C2C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/316-173-0x0000000000D60000-0x00000000013F1000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/316-172-0x0000000000D60000-0x00000000013F1000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/1404-42-0x0000000000E60000-0x0000000000F2E000-memory.dmp

                    Filesize

                    824KB

                  • memory/1404-43-0x0000000000880000-0x00000000008A6000-memory.dmp

                    Filesize

                    152KB

                  • memory/2196-17-0x0000000001240000-0x0000000001553000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2196-1-0x0000000077E30000-0x0000000077E32000-memory.dmp

                    Filesize

                    8KB

                  • memory/2196-18-0x0000000001241000-0x00000000012A9000-memory.dmp

                    Filesize

                    416KB

                  • memory/2196-2-0x0000000001241000-0x00000000012A9000-memory.dmp

                    Filesize

                    416KB

                  • memory/2196-3-0x0000000001240000-0x0000000001553000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2196-0-0x0000000001240000-0x0000000001553000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2196-4-0x0000000001240000-0x0000000001553000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2512-101-0x0000000000030000-0x00000000004E4000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2512-151-0x0000000000030000-0x00000000004E4000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2560-149-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/2560-563-0x0000000000400000-0x0000000000473000-memory.dmp

                    Filesize

                    460KB

                  • memory/2560-141-0x0000000000400000-0x0000000000473000-memory.dmp

                    Filesize

                    460KB

                  • memory/2560-558-0x0000000000400000-0x0000000000473000-memory.dmp

                    Filesize

                    460KB

                  • memory/2560-143-0x0000000000400000-0x0000000000473000-memory.dmp

                    Filesize

                    460KB

                  • memory/2560-145-0x0000000000400000-0x0000000000473000-memory.dmp

                    Filesize

                    460KB

                  • memory/2560-147-0x0000000000400000-0x0000000000473000-memory.dmp

                    Filesize

                    460KB

                  • memory/2560-137-0x0000000000400000-0x0000000000473000-memory.dmp

                    Filesize

                    460KB

                  • memory/2560-382-0x0000000000400000-0x0000000000473000-memory.dmp

                    Filesize

                    460KB

                  • memory/2560-139-0x0000000000400000-0x0000000000473000-memory.dmp

                    Filesize

                    460KB

                  • memory/2560-387-0x0000000000400000-0x0000000000473000-memory.dmp

                    Filesize

                    460KB

                  • memory/2560-383-0x0000000000400000-0x0000000000473000-memory.dmp

                    Filesize

                    460KB

                  • memory/2572-152-0x0000000006980000-0x0000000006E34000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2572-75-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-371-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-381-0x0000000006410000-0x00000000066C6000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/2572-604-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-364-0x0000000006410000-0x00000000066C6000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/2572-603-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-602-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-390-0x0000000006410000-0x00000000066C6000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/2572-580-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-366-0x0000000006410000-0x00000000066C6000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/2572-572-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-21-0x00000000002F1000-0x0000000000359000-memory.dmp

                    Filesize

                    416KB

                  • memory/2572-22-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-24-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-412-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-44-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-20-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-45-0x00000000002F1000-0x0000000000359000-memory.dmp

                    Filesize

                    416KB

                  • memory/2572-46-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-189-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-188-0x0000000006980000-0x0000000007011000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/2572-47-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-169-0x0000000006980000-0x0000000007011000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/2572-170-0x0000000006980000-0x0000000007011000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/2572-66-0x0000000006980000-0x000000000735C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2572-153-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-567-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-150-0x0000000006980000-0x000000000735C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2572-539-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2572-100-0x0000000006980000-0x0000000006E34000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2572-67-0x0000000006980000-0x000000000735C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2572-556-0x00000000002F0000-0x0000000000603000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2884-110-0x0000000000AB0000-0x0000000000B7E000-memory.dmp

                    Filesize

                    824KB

                  • memory/2884-136-0x0000000001F80000-0x0000000001F86000-memory.dmp

                    Filesize

                    24KB

                  • memory/2884-135-0x0000000000800000-0x000000000081A000-memory.dmp

                    Filesize

                    104KB

                  • memory/3300-365-0x0000000000E40000-0x00000000010F6000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/3300-367-0x0000000000E40000-0x00000000010F6000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/3300-392-0x0000000000E40000-0x00000000010F6000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/3300-368-0x0000000000E40000-0x00000000010F6000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/3300-386-0x0000000000E40000-0x00000000010F6000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/3420-566-0x0000000001270000-0x00000000014F2000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/3420-581-0x0000000005750000-0x00000000058E0000-memory.dmp

                    Filesize

                    1.6MB

                  • memory/3420-582-0x00000000004F0000-0x0000000000512000-memory.dmp

                    Filesize

                    136KB

                  • memory/3676-399-0x0000000000230000-0x000000000024A000-memory.dmp

                    Filesize

                    104KB

                  • memory/4032-599-0x0000000000400000-0x0000000000456000-memory.dmp

                    Filesize

                    344KB

                  • memory/4032-594-0x0000000000400000-0x0000000000456000-memory.dmp

                    Filesize

                    344KB

                  • memory/4032-592-0x0000000000400000-0x0000000000456000-memory.dmp

                    Filesize

                    344KB

                  • memory/4032-590-0x0000000000400000-0x0000000000456000-memory.dmp

                    Filesize

                    344KB

                  • memory/4032-588-0x0000000000400000-0x0000000000456000-memory.dmp

                    Filesize

                    344KB

                  • memory/4032-586-0x0000000000400000-0x0000000000456000-memory.dmp

                    Filesize

                    344KB

                  • memory/4032-596-0x0000000000400000-0x0000000000456000-memory.dmp

                    Filesize

                    344KB

                  • memory/4032-598-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/4032-601-0x0000000000400000-0x0000000000456000-memory.dmp

                    Filesize

                    344KB