Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/12/2024, 11:44

General

  • Target

    9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49.exe

  • Size

    6.9MB

  • MD5

    48638460aff1a61556318cf2a5b17361

  • SHA1

    fcabab39f96fca1e443f9e36bc5cc58a78d7de6f

  • SHA256

    9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49

  • SHA512

    0957f34cf86682ca5c9aedb2f0d2949340a765c4c4cec41901f503f75931c5018156ce1f6e1dcca8c172e0b9b7967fca648860a6edd1db1ff7473c93cbc27402

  • SSDEEP

    196608:VswjKfv/R8uGECWZT+lGme1d3vkeIQchBXVK05:LKpFGj2T+lghgvX

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49.exe
    "C:\Users\Admin\AppData\Local\Temp\9ed40e0d795ec7894955447aa60a3df726b8a1618bab72711936c56383e20a49.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k4f23.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k4f23.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e5T82.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e5T82.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1180
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Z41K7.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Z41K7.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3692
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2044
            • C:\Users\Admin\AppData\Local\Temp\1013412001\4c6c59522d.exe
              "C:\Users\Admin\AppData\Local\Temp\1013412001\4c6c59522d.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4628
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 1604
                7⤵
                • Program crash
                PID:2040
            • C:\Users\Admin\AppData\Local\Temp\1013413001\346ee43165.exe
              "C:\Users\Admin\AppData\Local\Temp\1013413001\346ee43165.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1216
            • C:\Users\Admin\AppData\Local\Temp\1013414001\21e831060c.exe
              "C:\Users\Admin\AppData\Local\Temp\1013414001\21e831060c.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1836
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2560
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4004
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4072
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2608
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1588
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1940
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  8⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:4804
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 1988 -prefMapHandle 1980 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e050a75-7bc3-4d0e-8bea-9e32387db613} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" gpu
                    9⤵
                      PID:456
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {56811a93-9228-4602-b373-555c6df13ada} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" socket
                      9⤵
                        PID:1868
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3224 -childID 1 -isForBrowser -prefsHandle 3216 -prefMapHandle 3212 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c66e87f7-b3e7-4b87-b27f-04e29f465af8} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" tab
                        9⤵
                          PID:1440
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3772 -childID 2 -isForBrowser -prefsHandle 3768 -prefMapHandle 3764 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {528c9ee3-7c03-419d-8b77-20aaf96684fc} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" tab
                          9⤵
                            PID:3876
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4772 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4752 -prefMapHandle 4756 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {af7bc14a-4c4a-41f3-8567-075474e9b48f} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" utility
                            9⤵
                            • Checks processor information in registry
                            PID:5672
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5720 -childID 3 -isForBrowser -prefsHandle 5740 -prefMapHandle 5736 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aeb2d297-850c-4f83-af65-66bad8f2ffd4} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" tab
                            9⤵
                              PID:1484
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5876 -childID 4 -isForBrowser -prefsHandle 5756 -prefMapHandle 5768 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e5f2ff9-976c-4f03-8a4c-6feac8efa838} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" tab
                              9⤵
                                PID:1520
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5856 -childID 5 -isForBrowser -prefsHandle 6048 -prefMapHandle 6052 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb06348a-8750-40fa-9346-922fa70e30be} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" tab
                                9⤵
                                  PID:1396
                          • C:\Users\Admin\AppData\Local\Temp\1013415001\294ae191f7.exe
                            "C:\Users\Admin\AppData\Local\Temp\1013415001\294ae191f7.exe"
                            6⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5060
                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l4577.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l4577.exe
                        4⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1200
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 1608
                          5⤵
                          • Program crash
                          PID:396
                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3X53c.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3X53c.exe
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4604
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o767n.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o767n.exe
                    2⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Windows security modification
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2668
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1200 -ip 1200
                  1⤵
                    PID:3028
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4628 -ip 4628
                    1⤵
                      PID:1632
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:6440
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:6984

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json.tmp

                      Filesize

                      18KB

                      MD5

                      7ef452986293a3243738bd10c888934a

                      SHA1

                      f1c8ccd41013a8b63fccdbd11fc518df23a259bd

                      SHA256

                      b244245555765f08fcd1773b7ac2b550e370fec6c1e0b7fa7092efcdf2b8e558

                      SHA512

                      9059d9f57a54ce4d9063324ad220e7c2ff1ce81400717e1860e6df53d7130f39826e1dab299332543c39bf99f6b4e61d145f7399ec1b00cb3ed512f4703da172

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                      Filesize

                      13KB

                      MD5

                      be2cd466ea65807b5562fcd4ce67b30c

                      SHA1

                      368524f8b54df5619cd5ee9cb3bf82561b08bd2a

                      SHA256

                      845183a4d0f32f9b261aba35c27f07f3b852eaba191314c6c2c98c5552c302e5

                      SHA512

                      2ee2124c3c9f3373d5a8645c6fc82e4d733602b8dc33f27ece9678f092b169ff9a0a657a3438112a3f5ad9e70d1cea4e0d690ca18077882eb75681bfb7cf3add

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                      Filesize

                      15KB

                      MD5

                      96c542dec016d9ec1ecc4dddfcbaac66

                      SHA1

                      6199f7648bb744efa58acf7b96fee85d938389e4

                      SHA256

                      7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                      SHA512

                      cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                    • C:\Users\Admin\AppData\Local\Temp\1013412001\4c6c59522d.exe

                      Filesize

                      1.8MB

                      MD5

                      9035a7790366c718391f37fd13a52b71

                      SHA1

                      00cffbc4cf948aa8a4a20c535da13b90099da1f7

                      SHA256

                      7800195f1a9a7e6c04d66b85215f58ca240b9d6bb3f369d1ba8e150b95ae583c

                      SHA512

                      ef277aab36d4549a26a596dcf93131d9314e23d97ea901a212f9f57f27693baa3ae54fdbd2d7f41197fd94d7e84ca894fc5ddc97ea7f2e77258d347a123ded68

                    • C:\Users\Admin\AppData\Local\Temp\1013413001\346ee43165.exe

                      Filesize

                      1.7MB

                      MD5

                      e113c7c881355590d17b82cdd27e9c7d

                      SHA1

                      ef5b7dcac182074a561fd2e1fb2eda69ac3a40bf

                      SHA256

                      e8589e69f99d96c0c35c02ac0bdbb97cf3263855396f0408ec1f52e41d75a49b

                      SHA512

                      7eb5b668f6f2d517ddbee8928756fe877c971beee8f88801d0a4a0492696a291a19c803ecbb5eb77f31febdfb0187272a3037f48fb527e8334c5dc26abdadbeb

                    • C:\Users\Admin\AppData\Local\Temp\1013414001\21e831060c.exe

                      Filesize

                      949KB

                      MD5

                      aa9538e2609a13b9d70989fee6bf50ef

                      SHA1

                      1aa2cad3d9a5220cc8608f8d2f6ddca625462fcc

                      SHA256

                      d0eb6c787139e3316220cf40be158d16a40b963b2f40fc06787dae680fa6a5e7

                      SHA512

                      a1f470a72c42d78eea0a947b794d19084c81d2f90ebf18266b06fa98121daf61eabd1caf2cd0cc8e90e76834b2f8e45cf94435eda869f4b4e5a01774b33795cc

                    • C:\Users\Admin\AppData\Local\Temp\1013415001\294ae191f7.exe

                      Filesize

                      2.7MB

                      MD5

                      518449380f5deab6a9fd3c7a88776aa5

                      SHA1

                      6be4e76be6bab115b709f6a7536b32c0f86efff4

                      SHA256

                      edca3a93ab5834491aa022d568bbc2d0924b3933159fbd193b550aa9ac355c5b

                      SHA512

                      36d70ec7b4726fa6ec2f92774ce7b547ea89281db76acb498a50be469e63aac977317fef1995526be6c499470490847223edb16b2801a4aae27fd9daf2767664

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o767n.exe

                      Filesize

                      2.6MB

                      MD5

                      83b2aa227469cb6b1f61f031b833c86a

                      SHA1

                      af7cff78b9c660714197541da9daf857e1c48d90

                      SHA256

                      afd2addba2d713e60ad23b03b5b1d035ff0af26e1153ea01a04ecee3439acde2

                      SHA512

                      d8a6e2509bd05d1ea21532976e507dd2f3a5640766bbe5f7f7f5560e2438b53260440eeb76a3ee9dd63943ed6aa0826095006b11298f124f161ee9434cb59979

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k4f23.exe

                      Filesize

                      5.4MB

                      MD5

                      f2eb143bac76496a4b6a33a67d6175e1

                      SHA1

                      d6b3194c0e1be510e1e86ee806b6caa5550bbe62

                      SHA256

                      bb816d71905034c8d4928d7e60b055a24ae2882869f7dde03e97bcf6dafd8d7b

                      SHA512

                      26f92d0ba8df9d62b5889fb6b4436597446ad370c2495187a4ab020fda175c63d0e7dafd34ba7966f8ff1194c1025da04ac217f73cbbaaf425e18e1dbab338d7

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3X53c.exe

                      Filesize

                      1.7MB

                      MD5

                      96e99da216000a05f217d3f9062b53b3

                      SHA1

                      21de04b8db36227859b13698e340dc59001782b9

                      SHA256

                      ae6b5e2426b3acaeae058ac76fcbf04d21eb0e5954309393fca663827bb775da

                      SHA512

                      fd4a62e018a569167967a01c8651809126929009849ecb6a56c9bee21a7fd357081703efcaf485035d86b0d158fc7750b494ba57e9eba4df2e33f934117d7939

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e5T82.exe

                      Filesize

                      3.6MB

                      MD5

                      3fa16bdd99114f8409d2ecdcf893ba58

                      SHA1

                      7d5499670ddca1afd304c9cc1bb00f2fa20bfedf

                      SHA256

                      a9ee969f44aa71f7977ef3a2197e95ca06ab2947483ebb0efab749308426a771

                      SHA512

                      64866e6332199562eae6257ca11d5d137859abeaaf27fccb57a9a2660af1a055d22f575017a001f1302d7752f934dc5511604ee3691e491ab5f1cc70fe71c2d3

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Z41K7.exe

                      Filesize

                      3.1MB

                      MD5

                      9f55b56814015f22fb5a9068a1bac402

                      SHA1

                      792bfa57fd0d50e1c004044f63cd8b71f7427858

                      SHA256

                      3cd15e8fff1b3254d98a2d7d6c4d41393434d43e07e5f51833e0dbaf4719158a

                      SHA512

                      36ca2735c17bdbd72c86d4b7f0c38e6f70098c107840c17772f17f5235f03a4cafab1a8952b125509b68a3e49bc36bb1f58b63eb7f90d07c561f1ab0c8719933

                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l4577.exe

                      Filesize

                      1.8MB

                      MD5

                      c21182b71e3fdd1bc9cf2581cc28a329

                      SHA1

                      4134b01e41e3c5867e4a42e735daab965aa51cfb

                      SHA256

                      e5d81f8b678103832260b0ad22972a6c28ae74d2d9ea26acb62f170497a5a96a

                      SHA512

                      8890121a031f5a7e2e96284b1a9222b36f290946ba03a42d4346325c78448d09d900bae3b33c500f8707cdddfa305b57a3d11a61f20d45ec8cfbd3f654ca89f9

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                      Filesize

                      479KB

                      MD5

                      09372174e83dbbf696ee732fd2e875bb

                      SHA1

                      ba360186ba650a769f9303f48b7200fb5eaccee1

                      SHA256

                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                      SHA512

                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                      Filesize

                      13.8MB

                      MD5

                      0a8747a2ac9ac08ae9508f36c6d75692

                      SHA1

                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                      SHA256

                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                      SHA512

                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                      Filesize

                      6KB

                      MD5

                      a3629346eea4133213c1ace33019a942

                      SHA1

                      144095ade54442ba27c33560a9b044a79db6c807

                      SHA256

                      cfbfaee0058f41ff57116e0850f901290ab671fabf8cc08682a04193148b5591

                      SHA512

                      1ca69f5f366568e9a30b0ead271fabe6e70aa2c59b22ac2ff9693e4971edf63319feafc9f060c5637114db5b688e93cfdf3109fd0d8a0694d817c3a6addcaa69

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                      Filesize

                      18KB

                      MD5

                      9311712a92a28d2c02d8828f6be84c05

                      SHA1

                      2ee0d9a6776b0efead8062f04f9bb3ad57e7bab9

                      SHA256

                      f47408406feee45a7dc19d47bd19ed31f775dba232c6434349a554e72be60344

                      SHA512

                      1aa2fed91f885e763af8b42e7d67e59987ab9b158edecbe3aad7070ab90f71c947216961d274130d5c94129acd60ab13febcf8e4d60f88210e9f563e3590762f

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                      Filesize

                      10KB

                      MD5

                      f1a80c8f406cb3a82a55b060e20d7ab4

                      SHA1

                      af9b3554709b5d77b04dea9f09f1a4bdb480e0ad

                      SHA256

                      abee2d2a8e119a644ce75749ae8751fe694b30a6420a5609bbbf60669764267e

                      SHA512

                      cbe1f0dea158c82e298065ced3f4020fc495c8ffc262b7e9d9350882a49a59d69bce79b49e37366ba90df58c357d2f6bc90080fcdc6e1b06e163fe15f6b9724e

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      23KB

                      MD5

                      0b170bd12000634e23111c3c40d124f6

                      SHA1

                      6f50d5937ffab1f80f2b1157de2e80af876be4a0

                      SHA256

                      dd7853d96d75925b6b4bbcf5f4c31a0de195db27408ff757eb2b6cbaa3c8efeb

                      SHA512

                      76452a86149a62492d612519de9e512acb5057600205d817b57570c3c4877335359412f5ceb37cd90b4c1cda2f98532a088bef06378d27ed82189838b984e8f7

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      5KB

                      MD5

                      80aea78520a4262afd67b9988779c237

                      SHA1

                      2f34386c07839c3dbdbbbe29f2ea56d1d01658af

                      SHA256

                      1bb050b7203aefa9e94968d01eafb6c0e0e1ec55257b2d47b54b240f13b9cd6d

                      SHA512

                      801a7992bafc76a461b927634971bcb3802e17f4764c9c367c8656c2ac81b261a0b5519b1fe923cd9417885b048a046e477941318d5d74d2ad09eb6f59d65c6d

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      6KB

                      MD5

                      58168ac036c7a4e11c60508e53257c89

                      SHA1

                      1066f25e5877ee64308f3746f460c58085a245c9

                      SHA256

                      a435afc5464642c1ff37c8ed4888d4e40b6e1b511f442f23fb1b957384c90916

                      SHA512

                      525b8bde9eef5a80ccf28cb1dd30e232302f42b531ccda9245c2907f4e70031e6472d27ba19f3d999f2618a8f0f94afe66362cb60f374f8ddbe231841aefc1d5

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      15KB

                      MD5

                      9814d77e9ce219b2751064f2fc40019f

                      SHA1

                      83170f49c1bb8ddc688debf5d6abb57c0c252d72

                      SHA256

                      1a8d33a7c044031e2c490d8ec693239321c52240e2a30ee3a023d8f90045fa6e

                      SHA512

                      b86991c5baec8007057f141280ad4ac658914dc9fc660ed61f795e07b95cf6e2e62ebcc7c4ceb0ec0ede0b127cdd568f55a9fdcf7ddb4790b5be77925a261acc

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      15KB

                      MD5

                      e08eabf2968493c57bb755ca22fb7144

                      SHA1

                      514dc27ac34a53ba1fd191bd263c8704892b08b3

                      SHA256

                      b1c1819b315027a418ccbe2e0776c5e352916ac70c738de4add5611b31955f5d

                      SHA512

                      932d55f346bfe43188033f1c67c09d7d174da9c108478ddc9c2debd183a0af20a8466517620206599a22a47d7bc1593ba34af36c4e7eb33de5e75e199a0524bd

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      5KB

                      MD5

                      c8645f4f3653ad36843b1bfcb3ba8bf1

                      SHA1

                      0e6f5c5e8576e389b4f8a6d1851bc76aa1068d5a

                      SHA256

                      e873ebb132781c440346610727b94bc4987e088da4e0a5a2644304e76317fd97

                      SHA512

                      691e5778288a1ceca9b3d22bd7da876605407a73d4d76a929f7e9067798733d2422a6ee482a0217a60e5d5dd6e1a9478d95124c5bbc64b79f429147af70ef9bf

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      5KB

                      MD5

                      9b33986e0bab1f4a669a9eb5d2265dff

                      SHA1

                      7a4b986af72cbd618612e891fc30b8884b0b8fdc

                      SHA256

                      ab3e0b4e36d3d69a9396fd34a604e19418df092032d44e2cd973b5471d3126b0

                      SHA512

                      ac6eafc319f58bca278d4b90475d2f3f8b9233b6276ab81cb58775c36b0bb4a11194fffc530afe841d52f49bca54a07c8c9fe7b4eafac6716e403677e581ea26

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      6KB

                      MD5

                      789a7ea85fd5e8784944f124c7fb04b2

                      SHA1

                      992bb52c023688c42dc22eaa413a64f187642dde

                      SHA256

                      6f81ed71ae3a6ff0f20b79124b5179f5b203964f074f870ca46365e377caab28

                      SHA512

                      c238c97c270fb466990e138327e8734ead3f3cf22ed763e205d7f426dd6207c4aed0091ff2bd4d9c91fcdf700c14bf6061345e21f44a9d54882138fec39a2192

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      6KB

                      MD5

                      5e14836b84802667ebd67b92714b0a41

                      SHA1

                      2e1f0989930188169ecd316c7e609fe4cca6c4ed

                      SHA256

                      5cdad7c11b5977eb3927b1eeff2558fa52ca99e2a91c4792ebf34326c74e90b6

                      SHA512

                      35f2c1b390ac5f02113636af0e5fb0f62ccd0deb86a42594e81d035343833e59b66a51886b2add54d723089cc789f2cdf4b43fa43d9d0e31fba796445373692b

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      15KB

                      MD5

                      781b49fe4107c21ea1da2608e9fbe21a

                      SHA1

                      d1e75d3afc055d9f3af75a024aa87f4d199270bf

                      SHA256

                      dd17f074065abe0283f9f36345063e24054adf91e1825e068ac9ca79be0db210

                      SHA512

                      3d919a4f0572f483a62c8c2866e4d29b1ff39ed70f030d177669c8972b20834fb9ef9177bb630ce1223b5b5c22424b4d1bd87db6c689e255091507a536c8844e

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      15KB

                      MD5

                      a4e3f3cfdc10edc528c53285d7612b5d

                      SHA1

                      73ecdb61d5bf49bad1d5c767890b919c96b6a159

                      SHA256

                      157d3a7bb2f0c5e34a88a6262b0f130e6f879a46f62fb38ea0468dba340d7eb1

                      SHA512

                      904c50dae7f45cd241039e33ea11d4b7dde608d558c974e110654f3e16e16b08a87629a77e72b10011df5554a67afa46e982c48aa4e860f3e941411556bee687

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\00c9ca98-15b8-473b-90b3-aced842e4803

                      Filesize

                      982B

                      MD5

                      cc28e235da159da72a4cdfd1db3e6df1

                      SHA1

                      a6b853f7b1d5ce5000ed1642326e69fe117fabb8

                      SHA256

                      ac03d625aca2d38d15c84a764ae37c2973a9a3c78ab43e42497ccac4123e0f4e

                      SHA512

                      47813b1ebd95f89627d0a493e427328f7cc45ec7abc1d8fe20638a313ce00aefebdf12ea1ca260042a458eba77af53a26797855d0ec7fce73f87dcc7a2051f38

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\04ad9ad1-0129-4822-b029-f5ab0dc71acd

                      Filesize

                      671B

                      MD5

                      53ecd56ed928984fa9abb5a158579692

                      SHA1

                      80c5ca4da0c66d1a31529b18d0713a3b7e691edc

                      SHA256

                      21982f4b1755c996235c77e668891d35cab3c0e8850d8f6b62985a03f6c52c42

                      SHA512

                      f695acb8a69bc9bee31b0feed08e9b5c419e5e80e22b0af70d3cff46cbcfc159f8c20116f8c48dfcfb4038c98ff0938252a8123ca1d81cfcca37c129eca96b3c

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\f3eed83c-b6ce-4575-8e9a-eb0ebf097909

                      Filesize

                      28KB

                      MD5

                      1e4cf36cae6ffa12f761cd49ddc533ad

                      SHA1

                      beef32cc4ed58c945770ab25a5ebf254173c0644

                      SHA256

                      bfd6600d68f1f16771e5e9d73399f5a0d5b03763c734a415a489b82ef141e30d

                      SHA512

                      8cd3c0da55d1a58deee48e9882a1e4ae12f7e9b468d9bd34bc5fdbb8619140b17631f974aa4ae85e9be533787db5bf7b057d33475162bc9d663c1b3de36356ec

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                      Filesize

                      1.1MB

                      MD5

                      842039753bf41fa5e11b3a1383061a87

                      SHA1

                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                      SHA256

                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                      SHA512

                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                      Filesize

                      116B

                      MD5

                      2a461e9eb87fd1955cea740a3444ee7a

                      SHA1

                      b10755914c713f5a4677494dbe8a686ed458c3c5

                      SHA256

                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                      SHA512

                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                      Filesize

                      372B

                      MD5

                      bf957ad58b55f64219ab3f793e374316

                      SHA1

                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                      SHA256

                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                      SHA512

                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                      Filesize

                      17.8MB

                      MD5

                      daf7ef3acccab478aaa7d6dc1c60f865

                      SHA1

                      f8246162b97ce4a945feced27b6ea114366ff2ad

                      SHA256

                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                      SHA512

                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                      Filesize

                      10KB

                      MD5

                      e71b737328eab83074c8aad3a2fbc170

                      SHA1

                      2cfab1ef1648b977d8d63575eea9b462e48949db

                      SHA256

                      c5ff08a1a434516953ba83bfed14dfe38d2dbce833f069056eb4b07e4fe647f5

                      SHA512

                      6793d3fb8bfd76ab8a1087bcbbcc82120b4b3f7d15f95705fd488ddbe261f845cc55c6dccc8d0d9ddb7773e8f0c1accd3c20ad3211c5c6feac4a519dc02e439c

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                      Filesize

                      12KB

                      MD5

                      7032c4f5e6413a085e02d775b91436c2

                      SHA1

                      9d0810ae89bb368a0f09c2383db1694d35cb8ae4

                      SHA256

                      5e20a5cbb7d9487ade4d67ca1e20bfc06accfaa75ba444268d51169275a18b24

                      SHA512

                      1f742613e17197d6efaa260df03f28894a8ff8377d9bf289eaf8c34142a286de301a8309e7b7171d67f28a3978d599d1a9c99f409a3aa0f74d2918afc9c46f7d

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                      Filesize

                      15KB

                      MD5

                      6fd640769fd9afca4d857a082c60c9ef

                      SHA1

                      d925cff59ad8156f5e8d1c8ba69a77ccb30879b0

                      SHA256

                      0f9c032ae6a3c89bd9a4903b2e6994cf925f9b180dc70fbf9f32ff3151f14731

                      SHA512

                      995c6cac780326fe1f359372c341c19da89fd1986c7843df8cd384226590b38d67dcace0699272cd2a24ac0f7937575811034d59d808f669e1c6c69b3fb594ae

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                      Filesize

                      10KB

                      MD5

                      1044ba2163cb7cd4626d9f8d42ba2fc0

                      SHA1

                      22782e4f5acd7b8e262a6b210f27136ec122e3cc

                      SHA256

                      fa1ce16d3a93c12d781bbcd7016f72244fefaae95cc665d56c21844185ae5035

                      SHA512

                      da72aeb5cae266d47b4c68ce2f31893bcaac9a7add47f08e6f46bc0f3ad90212110433fe59861d062104304acfc77cd1e70db0364a262d36d72b39e579d67195

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                      Filesize

                      3.1MB

                      MD5

                      6be4a1bf462fa0ddf78980bf8cc16c33

                      SHA1

                      9ed16bc7e513df8b79623f7e7ec5140196fa2560

                      SHA256

                      7f7f987f84cf3e208171e5b1ea3791a3e2be202967554ddf69d615589f507660

                      SHA512

                      efec2ec3cd39b57f3681bb8c07e0880ad96fe4deacfb906e92e33337b03fd43a9dfe6de083bfef981b413476b05c83e761132f830b829ac9d1da7d381aee6142

                    • memory/1200-39-0x0000000000840000-0x0000000000CEE000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1200-38-0x0000000000840000-0x0000000000CEE000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/1216-85-0x0000000000EC0000-0x0000000001555000-memory.dmp

                      Filesize

                      6.6MB

                    • memory/1216-86-0x0000000000EC0000-0x0000000001555000-memory.dmp

                      Filesize

                      6.6MB

                    • memory/2044-68-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2044-2886-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2044-4021-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2044-4020-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2044-4019-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2044-897-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2044-4018-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2044-4015-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2044-4014-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2044-4010-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2044-83-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2044-4004-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2044-4003-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2044-994-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2044-748-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2044-33-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/2668-67-0x00000000003A0000-0x0000000000650000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/2668-64-0x00000000003A0000-0x0000000000650000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/2668-66-0x00000000003A0000-0x0000000000650000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/2668-678-0x00000000003A0000-0x0000000000650000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/2668-106-0x00000000003A0000-0x0000000000650000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/3692-32-0x0000000000140000-0x0000000000453000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/3692-21-0x0000000000140000-0x0000000000453000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/4604-61-0x0000000000990000-0x0000000001027000-memory.dmp

                      Filesize

                      6.6MB

                    • memory/4604-43-0x0000000000990000-0x0000000001027000-memory.dmp

                      Filesize

                      6.6MB

                    • memory/4628-59-0x0000000000B60000-0x0000000001013000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/4628-87-0x0000000000B60000-0x0000000001013000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/5060-679-0x0000000000310000-0x00000000005C8000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/5060-136-0x0000000000310000-0x00000000005C8000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/5060-680-0x0000000000310000-0x00000000005C8000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/5060-896-0x0000000000310000-0x00000000005C8000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/5060-887-0x0000000000310000-0x00000000005C8000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/6440-1105-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/6440-1125-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB

                    • memory/6984-4017-0x0000000000DA0000-0x00000000010B3000-memory.dmp

                      Filesize

                      3.1MB