Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2024 15:42

General

  • Target

    7f9c4f99669b5c05535075cc97e746e9df229b8177f56a0a9e989b861e8a2ef4.exe

  • Size

    3.1MB

  • MD5

    03bb6c45bf7f0ce8caa6c8ba6ca33509

  • SHA1

    f59d3d9d070984d3bd3e4bd7c903990b204ed554

  • SHA256

    7f9c4f99669b5c05535075cc97e746e9df229b8177f56a0a9e989b861e8a2ef4

  • SHA512

    0e99313226eb3df882a9372820532d71ebe95616f7290e4eb08256681af7bf8826c66cea34cd50f89b1dc34af145fa7803d036d64d58a45855e998982d4259be

  • SSDEEP

    49152:qmZuKkpYpaS4Zqf63VQkUfHZjTvfS1REpnlt+nzZWF5whsj1NbyE5Hd:qeg4Cqf63Vsf5jTvfeEntzohs5sE

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

xworm

Version

5.0

C2

45.200.148.155:5050

returns-male.gl.at.ply.gg:19831

Mutex

i5ZVKLKJz2PVTovK

Attributes
  • Install_directory

    %AppData%

  • install_file

    SecurityHealthSystray.exe

aes.plain
aes.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 7 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f9c4f99669b5c05535075cc97e746e9df229b8177f56a0a9e989b861e8a2ef4.exe
    "C:\Users\Admin\AppData\Local\Temp\7f9c4f99669b5c05535075cc97e746e9df229b8177f56a0a9e989b861e8a2ef4.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe
        "C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:356
        • C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe
          "C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1072
      • C:\Users\Admin\AppData\Local\Temp\1013458001\9Qk4n8B.exe
        "C:\Users\Admin\AppData\Local\Temp\1013458001\9Qk4n8B.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Drops startup file
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2080
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1013458001\9Qk4n8B.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1720
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '9Qk4n8B.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1744
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2644
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SecurityHealthSystray.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2208
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SecurityHealthSystray" /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1784
        • C:\Users\Admin\AppData\Local\Temp\rhbook.exe
          "C:\Users\Admin\AppData\Local\Temp\rhbook.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2656
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\rhbook.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4064
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'rhbook.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3240
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\SecurityHealthSystray.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3116
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SecurityHealthSystray.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3548
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SecurityHealthSystray" /tr "C:\Users\Admin\AppData\Local\SecurityHealthSystray.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1044
      • C:\Users\Admin\AppData\Local\Temp\1013459001\e5892e8570.exe
        "C:\Users\Admin\AppData\Local\Temp\1013459001\e5892e8570.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2112
      • C:\Users\Admin\AppData\Local\Temp\1013460001\79c11e24ea.exe
        "C:\Users\Admin\AppData\Local\Temp\1013460001\79c11e24ea.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2944
      • C:\Users\Admin\AppData\Local\Temp\1013461001\9b3447c5b9.exe
        "C:\Users\Admin\AppData\Local\Temp\1013461001\9b3447c5b9.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1848
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2440
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1840
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2016
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2940
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
            PID:2364
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
              5⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:2504
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2504.0.2120244925\491451640" -parentBuildID 20221007134813 -prefsHandle 1208 -prefMapHandle 1200 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d23dc70-4eb8-432e-803f-dbef794039cb} 2504 "\\.\pipe\gecko-crash-server-pipe.2504" 1272 10fc0d58 gpu
                6⤵
                  PID:2764
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2504.1.843652636\1772012718" -parentBuildID 20221007134813 -prefsHandle 1476 -prefMapHandle 1472 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {02ecd9ad-739e-4751-95c9-77df061803fa} 2504 "\\.\pipe\gecko-crash-server-pipe.2504" 1488 e71558 socket
                  6⤵
                    PID:1508
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2504.2.1401185509\1248751417" -childID 1 -isForBrowser -prefsHandle 2100 -prefMapHandle 2096 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0730604a-5f07-4cfd-8c96-be171cc9d1d8} 2504 "\\.\pipe\gecko-crash-server-pipe.2504" 2112 10f5b358 tab
                    6⤵
                      PID:1524
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2504.3.15632187\1443833365" -childID 2 -isForBrowser -prefsHandle 2904 -prefMapHandle 2900 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fabd4a3f-bab2-4ce3-a298-cd72ac0fb954} 2504 "\\.\pipe\gecko-crash-server-pipe.2504" 2916 1d17e858 tab
                      6⤵
                        PID:980
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2504.4.52330630\277089693" -childID 3 -isForBrowser -prefsHandle 3708 -prefMapHandle 3704 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e47cd470-ea89-4e6d-8d32-550386ab41be} 2504 "\\.\pipe\gecko-crash-server-pipe.2504" 3720 1f549058 tab
                        6⤵
                          PID:1292
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2504.5.80686773\364457796" -childID 4 -isForBrowser -prefsHandle 3740 -prefMapHandle 3736 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {835f2e12-8a72-436c-9ee5-f8c80bd9a4b2} 2504 "\\.\pipe\gecko-crash-server-pipe.2504" 3912 2028b858 tab
                          6⤵
                            PID:1840
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2504.6.351231163\1608624842" -childID 5 -isForBrowser -prefsHandle 3972 -prefMapHandle 3976 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {efd9f841-32cf-4efa-b743-f5c21aae2800} 2504 "\\.\pipe\gecko-crash-server-pipe.2504" 3960 2028c158 tab
                            6⤵
                              PID:1304
                      • C:\Users\Admin\AppData\Local\Temp\1013462001\10c81a6d46.exe
                        "C:\Users\Admin\AppData\Local\Temp\1013462001\10c81a6d46.exe"
                        3⤵
                        • Modifies Windows Defender Real-time Protection settings
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Windows security modification
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1924
                      • C:\Users\Admin\AppData\Local\Temp\1013463001\abe821c527.exe
                        "C:\Users\Admin\AppData\Local\Temp\1013463001\abe821c527.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Loads dropped DLL
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3608
                  • C:\Windows\system32\taskeng.exe
                    taskeng.exe {7E0F166E-B125-4E33-ADB7-DA26D7342D58} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]
                    1⤵
                      PID:2068
                      • C:\Users\Admin\AppData\Local\SecurityHealthSystray.exe
                        C:\Users\Admin\AppData\Local\SecurityHealthSystray.exe
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3896

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\download[1].htm

                      Filesize

                      1B

                      MD5

                      cfcd208495d565ef66e7dff9f98764da

                      SHA1

                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                      SHA256

                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                      SHA512

                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\activity-stream.discovery_stream.json.tmp

                      Filesize

                      24KB

                      MD5

                      e0be4967600efa9b434024a0c582dd1e

                      SHA1

                      426c30a5fd3ef0ee6a1642583687f0ee3479d605

                      SHA256

                      be4826e8b982cbbd8446ec4828f06aaf83c35be49916f12fce7e49b7ff69bdf8

                      SHA512

                      3b679c7cd41cffacde9ceef30cce600bdbdbf706711a7bb8d096bdcd186c9ae02dacca66155471c3f3e6ed37d997adb2c271a06a2fc079351e76e59d4767d91b

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                      Filesize

                      15KB

                      MD5

                      96c542dec016d9ec1ecc4dddfcbaac66

                      SHA1

                      6199f7648bb744efa58acf7b96fee85d938389e4

                      SHA256

                      7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                      SHA512

                      cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                    • C:\Users\Admin\AppData\Local\Temp\1013433001\ziNGMDa.exe

                      Filesize

                      9.9MB

                      MD5

                      53306653e88891da35bdfc1330a2dafd

                      SHA1

                      0870df54ca24e32bf88ccf00d7dd0ada3a0ea096

                      SHA256

                      fc3471e819eafc1640b51c5c8d4bd36db60dc96d912769fa0dfd619f3ec6ff09

                      SHA512

                      930ff27fc7377eaf0097cc6430f2c5486336c398a7ae08fadbcb0af62490b96c0b9ec3d36455c04e5a79d2405fc0c6f1f6a44b0298f3b6ff46f2a6c591aa51ba

                    • C:\Users\Admin\AppData\Local\Temp\1013458001\9Qk4n8B.exe

                      Filesize

                      1.9MB

                      MD5

                      5d88053a8fa89daf50a22f3e7130b84f

                      SHA1

                      376315c3b18c6d410a615dcc18dff4529f44ef9b

                      SHA256

                      78d2025e6bfce4ee78142552e30d2eb07c9bb7901ec6407ab8ce5bba72c13074

                      SHA512

                      f60af0d664d5a13555c21891a02fab76d7c63d45b6497e8c7da1cad3cc89223d1578c9b0a394fd23bb650777eb8f295cb372519db0c22a7061c0a4a0872261eb

                    • C:\Users\Admin\AppData\Local\Temp\1013459001\e5892e8570.exe

                      Filesize

                      1.7MB

                      MD5

                      2e294f3db1a3b1f0624b69d47ba3456c

                      SHA1

                      082c1d3d3a7363b86db51d01e23959f72eaf740c

                      SHA256

                      03100a9686a78171ad87a164d17b5cf4defc92736db32352fc16bf60e5d731fc

                      SHA512

                      c60875c1825ec998996de35c52cff8b03c0b98631578c93bce026c9f580494fd2df216bbbe6db13832b67a4f0f21d045926041ce3865f87508c5bdd422e753e7

                    • C:\Users\Admin\AppData\Local\Temp\1013460001\79c11e24ea.exe

                      Filesize

                      1.7MB

                      MD5

                      a7af58fe0da7ef19da6ad1ce8376597e

                      SHA1

                      891eb45d3c52f186cd2cfb03997b996c4535bf26

                      SHA256

                      b8b2986f268c6ba53ea30d750092c0a26e7fe8cdfb74a3ff3be9513ad05b716d

                      SHA512

                      7c0d7d30b7c6a013378ab2f744d45b218c5be00fc20bfc00cd983a13e60645e8dc311278c433d842151043408fb316a00c20cb655b13426dcd7e6acfdcbb25c5

                    • C:\Users\Admin\AppData\Local\Temp\1013461001\9b3447c5b9.exe

                      Filesize

                      950KB

                      MD5

                      58d8b4340fa9ca05e2ecc82281f6ba30

                      SHA1

                      bf7fdb9954f4763c5bd0d6f45e5df9e2fa4326e5

                      SHA256

                      95cd445851e76e32539034fb5614d3bd2d04747479941dda234a0175e78dc2a4

                      SHA512

                      0d8c69ff14216d151151a935a3ff76679e219f551badb37fa441e189c7364a68e03cb4b65f8400238fddd48e862b004a7b7163043fb1a524feba30da3d8e74ff

                    • C:\Users\Admin\AppData\Local\Temp\1013462001\10c81a6d46.exe

                      Filesize

                      2.7MB

                      MD5

                      0c628411b34cd221d309d406683deca1

                      SHA1

                      5f8be3da5456806706c322c3c83aaa60c2d5f1f3

                      SHA256

                      0332638fac22e2222292b66defa0c78ac428d160e44802ca89cfe0b898f70620

                      SHA512

                      40c2c39c84d56d4cd3a0541fefb04738eab0e19e9aef3baa0f9ffff89b264cddd33fa056f9a23dfdf92c6dddb5dc6334dcead943d634143bbd0d2601b3332fb9

                    • C:\Users\Admin\AppData\Local\Temp\1013463001\abe821c527.exe

                      Filesize

                      1.9MB

                      MD5

                      e96cd9e1c8cbc927c9c445e155d5bd75

                      SHA1

                      6c8d7a80cb4635fda0f7b799ace942dcd10b3700

                      SHA256

                      9f1169888c4c2acd65e79928bb27a686204fa3b622b921a7ee56c7a735924eb6

                      SHA512

                      419cb0650a718f7356335745a64d441d8693c48181692bdfb22da508fa993e93772f5ee89ae5085e5ae3d04f28936b57e12e6704291be6acc45041744ba7f413

                    • C:\Users\Admin\AppData\Local\Temp\_MEI3562\python310.dll

                      Filesize

                      4.2MB

                      MD5

                      c6c37b848273e2509a7b25abe8bf2410

                      SHA1

                      b27cfbd31336da1e9b1f90e8f649a27154411d03

                      SHA256

                      b7a7f3707beab109b66de3e340e3022dd83c3a18f444feb9e982c29cf23c29b8

                      SHA512

                      222ad791304963a4b8c1c6055e02c0c4c47fce2bb404bd4f89c022ff9706e29ca6fa36c72350fbf296c8a0e3e48e3756f969c003dd1eb056cd026efe0b7eba40

                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                      Filesize

                      3.1MB

                      MD5

                      03bb6c45bf7f0ce8caa6c8ba6ca33509

                      SHA1

                      f59d3d9d070984d3bd3e4bd7c903990b204ed554

                      SHA256

                      7f9c4f99669b5c05535075cc97e746e9df229b8177f56a0a9e989b861e8a2ef4

                      SHA512

                      0e99313226eb3df882a9372820532d71ebe95616f7290e4eb08256681af7bf8826c66cea34cd50f89b1dc34af145fa7803d036d64d58a45855e998982d4259be

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                      Filesize

                      442KB

                      MD5

                      85430baed3398695717b0263807cf97c

                      SHA1

                      fffbee923cea216f50fce5d54219a188a5100f41

                      SHA256

                      a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                      SHA512

                      06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                      Filesize

                      8.0MB

                      MD5

                      a01c5ecd6108350ae23d2cddf0e77c17

                      SHA1

                      c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                      SHA256

                      345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                      SHA512

                      b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                      Filesize

                      7KB

                      MD5

                      218a7118ff3f9dc124ba06db93d04fc7

                      SHA1

                      15a2244a70949bcdff87e781655414b278c3ca91

                      SHA256

                      120789ab7a73f9a19dead8fface739c88b4f52cb41607d53e0916f6d6dd47719

                      SHA512

                      d02fd46052cb0a266d0291fc3affb811885aa5fe315cb48e0f095a389c665ef561d1151f3a226490f1539a27d84496899d7a239a69cba757f01281157ddb7f2b

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                      Filesize

                      7KB

                      MD5

                      f8bda74ebe24f8a70fab98e2a564141e

                      SHA1

                      05849f90422edfc7ba88fecb59401c8867233341

                      SHA256

                      0cdf66325e6578c95d602bfec260ed0941bacf8738a0a3933ef8d1145e1c889c

                      SHA512

                      ab9efc7252863c62c67c4d29e6cbf5cc2be3d57fa3ad42bf59756fc44ab96fde938ebeece26787c9e15f539f8f3580edcba9fc7a389c30e3130d7470ffa9d33f

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk

                      Filesize

                      860B

                      MD5

                      fd4a97c9d90254a2becb5a46fb8133ad

                      SHA1

                      04715270c79c9a055184396198a53a1bf551a382

                      SHA256

                      fad4434f06e813a72fed58a1c08f7863bbcbb66a06b81cc0ea431af061432e82

                      SHA512

                      6fc24999fc25c54b434258b1f2233f073e7a40edafd512e4ba2c9bf1ac96a05c17de19cc11ac663cc7e6267b94abd22da7c3b3bbf5275de9558de89b6fdd0f59

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      2KB

                      MD5

                      109affbcbb12eb0a535e506bcdb7210b

                      SHA1

                      74892f3e8c621719369a2924a52641e25c774d48

                      SHA256

                      8ac748e405871079a8ad7f7c798166a0e420edff03251d08a7eb1034f055c1e0

                      SHA512

                      22578bd07f0c5786c354d5842cf4cfce361f6cada58522e5d1abdc45e3da29f97997926550b4358d83bda10223c5b8cd8efc45f4ee48c7f31a64be95185b30e5

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\9de4a36b-0a30-45bf-b16e-87705795c1da

                      Filesize

                      11KB

                      MD5

                      cbe745ab26a8570faa6ae359e284f0bb

                      SHA1

                      9f7d84bdc9e37ad88c622190e0f8fd62d1f9fd2e

                      SHA256

                      ccf22ecf8c8908f57822f1f7f2346f826f518819d182f98f06fac5ab788eb2d1

                      SHA512

                      72c533a25194f272e7814135c319ace01e68047fec960a97475ebd2a23f0a0273ef20b658f2bad2f849acc494ba5d26bb1318e3dbca3d65ad5a8c7aa02130282

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\f6998456-4fb0-4e5a-bbf4-1e6b13b26c4c

                      Filesize

                      745B

                      MD5

                      17f640e653c79e493fd49f958fc811db

                      SHA1

                      a8a77437039380e6e3362284351a40f97e19c742

                      SHA256

                      d5c2a5a65a69c718b396ae529affa3e1467ec1a409bb364077630dc7e0821079

                      SHA512

                      2abe09ea6f163f5bde64ab617f678371a3248e1b9e8e01aa69479968007c4b139c98d60719218422fb5faf92798d8039636093fce12f2bc3dcb871bf881fc836

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                      Filesize

                      997KB

                      MD5

                      fe3355639648c417e8307c6d051e3e37

                      SHA1

                      f54602d4b4778da21bc97c7238fc66aa68c8ee34

                      SHA256

                      1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                      SHA512

                      8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                      Filesize

                      116B

                      MD5

                      3d33cdc0b3d281e67dd52e14435dd04f

                      SHA1

                      4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                      SHA256

                      f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                      SHA512

                      a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                      Filesize

                      479B

                      MD5

                      49ddb419d96dceb9069018535fb2e2fc

                      SHA1

                      62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                      SHA256

                      2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                      SHA512

                      48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                      Filesize

                      372B

                      MD5

                      8be33af717bb1b67fbd61c3f4b807e9e

                      SHA1

                      7cf17656d174d951957ff36810e874a134dd49e0

                      SHA256

                      e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                      SHA512

                      6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                      Filesize

                      11.8MB

                      MD5

                      33bf7b0439480effb9fb212efce87b13

                      SHA1

                      cee50f2745edc6dc291887b6075ca64d716f495a

                      SHA256

                      8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                      SHA512

                      d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                      Filesize

                      1KB

                      MD5

                      688bed3676d2104e7f17ae1cd2c59404

                      SHA1

                      952b2cdf783ac72fcb98338723e9afd38d47ad8e

                      SHA256

                      33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                      SHA512

                      7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                      Filesize

                      1KB

                      MD5

                      937326fead5fd401f6cca9118bd9ade9

                      SHA1

                      4526a57d4ae14ed29b37632c72aef3c408189d91

                      SHA256

                      68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                      SHA512

                      b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs-1.js

                      Filesize

                      6KB

                      MD5

                      94b16aa051b0c8d883ed8a5d2954ff1d

                      SHA1

                      a4037da767446e2d5a9746ba83025e9d27f3e89c

                      SHA256

                      c7461ebad66a8a171e78801bff5b1717f40006aa9b0a8d33080dc4aadd69ded4

                      SHA512

                      238c28f7803e0876e5e46148813bf579c4ea78212eb4330cc3dc6619970b7f94f17f67f34717f1f47459948958fbc027df34fd4343620a971b646df18fda0b31

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs-1.js

                      Filesize

                      7KB

                      MD5

                      8cf2da4b8638beb9cf14eea684ac5fc2

                      SHA1

                      fc0cae9d717327930633af5c37ea08d0335d400d

                      SHA256

                      1ecb5e21aadc704021ab93e8006a4ce8fbd6cbd112f646807a341e2877b2524b

                      SHA512

                      5f849b18c65798ff7d8835feee3fb375d3c2220b0b2f70d11986c7494b5e92f969c0b101444de3868fa47e17830ee96e81dc922026dccbbc3f811ceccde81aff

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs-1.js

                      Filesize

                      7KB

                      MD5

                      e6076e8810f15802ba4c96a5f99b7dd9

                      SHA1

                      82f9c1a3d9ac59c5661b57e0a89d2edb38b6c3d4

                      SHA256

                      de2ff01c8d0e978f857ae9bd2c6e1d79811d75e2b2c958867dcb3b31b950de7a

                      SHA512

                      28b4ea3b1f02bffaff7a75c4a36cd3b09fb5fef576131bfe538118bfce7305e61ac6451717ce9fc4499a013bf33613cf7b8055944dd7d103fe9e207993e3d03c

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs.js

                      Filesize

                      6KB

                      MD5

                      da31f0b1fae1fc8105ed3f51e500c70b

                      SHA1

                      544e5d2d6efb3f036cb28446e24ab04fdf32db15

                      SHA256

                      0f2315a31fbb0ad70d0bb75d10208a518ebf2a1d209e7829814a7aa9671b53c8

                      SHA512

                      bcf853c12dc0eca3c743b7d4fb87a49ffec34453d31dd23b4c481fcf111220cb1d91f5fcedcf5e672c449a06b276149495b6ca2f7eb1ff10770149df66e0ba59

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4

                      Filesize

                      4KB

                      MD5

                      16f461278bd1a93e3ab4da730233b8ac

                      SHA1

                      f7e07fd84a4babce440a1d1da3a33a7f69f219c4

                      SHA256

                      d4c97bdb4a7924b991e518b76dc1fa91822c0d2463f1d67b1de2a2750e9dcf38

                      SHA512

                      6b0145f2e3125ed57505a1835bae6fc5efdb2ebbe88b1e455552fff27a70cca9889ef1d0ad14a58a2395e76ba2f70d5f2daff3ec67ec76be47e4c5d7e16fd1e8

                    • \Users\Admin\AppData\Local\Temp\rhbook.exe

                      Filesize

                      225KB

                      MD5

                      df308cc3c6aae07ad391026f96c8948d

                      SHA1

                      6d694961718b2ee81680381faf76aa90e1e2af1c

                      SHA256

                      1ffd9cc6ba55221068a15ef8dfbbab5e2653f6434670dd2945d7c73f5d74567c

                      SHA512

                      f6a0757e8d7348d768ecad3262c3da2bc050b392c15f830bc0b8d12fb9f3b41fd5bf05346a26b14d85fc7cf53d43c821345f427fe320a33c22b438ee24f4ded5

                    • \Users\Admin\AppData\Local\Temp\uW8RDfVSA4\Y-Cleaner.exe

                      Filesize

                      1.4MB

                      MD5

                      a8cf5621811f7fac55cfe8cb3fa6b9f6

                      SHA1

                      121356839e8138a03141f5f5856936a85bd2a474

                      SHA256

                      614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c

                      SHA512

                      4479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd

                    • memory/1704-5-0x0000000000E30000-0x000000000115A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/1704-18-0x0000000000E30000-0x000000000115A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/1704-1-0x00000000778A0000-0x00000000778A2000-memory.dmp

                      Filesize

                      8KB

                    • memory/1704-2-0x0000000000E31000-0x0000000000E99000-memory.dmp

                      Filesize

                      416KB

                    • memory/1704-19-0x0000000000E31000-0x0000000000E99000-memory.dmp

                      Filesize

                      416KB

                    • memory/1704-3-0x0000000000E30000-0x000000000115A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/1704-0-0x0000000000E30000-0x000000000115A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/1924-436-0x0000000001280000-0x000000000153A000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/1924-524-0x0000000001280000-0x000000000153A000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/1924-448-0x0000000001280000-0x000000000153A000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/1924-447-0x0000000001280000-0x000000000153A000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/2080-230-0x0000000001390000-0x000000000181C000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2080-229-0x0000000001390000-0x000000000181C000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2080-228-0x0000000001390000-0x000000000181C000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2080-288-0x0000000001390000-0x000000000181C000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2112-245-0x0000000000200000-0x0000000000680000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2112-256-0x0000000000200000-0x0000000000680000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2656-660-0x0000000000DE0000-0x0000000000E1E000-memory.dmp

                      Filesize

                      248KB

                    • memory/2888-631-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-286-0x00000000065C0000-0x0000000006C45000-memory.dmp

                      Filesize

                      6.5MB

                    • memory/2888-129-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-30-0x0000000001021000-0x0000000001089000-memory.dmp

                      Filesize

                      416KB

                    • memory/2888-29-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-501-0x00000000065C0000-0x0000000006E27000-memory.dmp

                      Filesize

                      8.4MB

                    • memory/2888-704-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-503-0x00000000065C0000-0x0000000006E27000-memory.dmp

                      Filesize

                      8.4MB

                    • memory/2888-506-0x00000000065C0000-0x000000000687A000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/2888-510-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-702-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-434-0x00000000065C0000-0x0000000006C45000-memory.dmp

                      Filesize

                      6.5MB

                    • memory/2888-529-0x00000000065C0000-0x0000000006E27000-memory.dmp

                      Filesize

                      8.4MB

                    • memory/2888-700-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-698-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-534-0x00000000065C0000-0x0000000006E27000-memory.dmp

                      Filesize

                      8.4MB

                    • memory/2888-28-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-435-0x00000000065C0000-0x000000000687A000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/2888-542-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-27-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-25-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-26-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-23-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-22-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-21-0x0000000001021000-0x0000000001089000-memory.dmp

                      Filesize

                      416KB

                    • memory/2888-226-0x00000000065C0000-0x0000000006A4C000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2888-20-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-385-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-307-0x00000000065C0000-0x0000000006A40000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2888-247-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-244-0x00000000065C0000-0x0000000006A40000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2888-284-0x00000000065C0000-0x0000000006A4C000-memory.dmp

                      Filesize

                      4.5MB

                    • memory/2888-664-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-285-0x00000000065C0000-0x0000000006C45000-memory.dmp

                      Filesize

                      6.5MB

                    • memory/2888-426-0x00000000065C0000-0x000000000687A000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/2888-646-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2888-648-0x0000000001020000-0x000000000134A000-memory.dmp

                      Filesize

                      3.2MB

                    • memory/2944-291-0x0000000000D30000-0x00000000013B5000-memory.dmp

                      Filesize

                      6.5MB

                    • memory/2944-287-0x0000000000D30000-0x00000000013B5000-memory.dmp

                      Filesize

                      6.5MB

                    • memory/3240-681-0x0000000001C10000-0x0000000001C18000-memory.dmp

                      Filesize

                      32KB

                    • memory/3240-680-0x000000001B830000-0x000000001BB12000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/3608-533-0x0000000000400000-0x0000000000C67000-memory.dmp

                      Filesize

                      8.4MB

                    • memory/3608-636-0x0000000000400000-0x0000000000C67000-memory.dmp

                      Filesize

                      8.4MB

                    • memory/3608-618-0x0000000000400000-0x0000000000C67000-memory.dmp

                      Filesize

                      8.4MB

                    • memory/3608-645-0x0000000000400000-0x0000000000C67000-memory.dmp

                      Filesize

                      8.4MB

                    • memory/3608-531-0x0000000000400000-0x0000000000C67000-memory.dmp

                      Filesize

                      8.4MB

                    • memory/3608-518-0x0000000010000000-0x000000001001C000-memory.dmp

                      Filesize

                      112KB

                    • memory/3608-502-0x0000000000400000-0x0000000000C67000-memory.dmp

                      Filesize

                      8.4MB

                    • memory/3896-708-0x0000000000AD0000-0x0000000000B0E000-memory.dmp

                      Filesize

                      248KB

                    • memory/4064-674-0x0000000001E10000-0x0000000001E18000-memory.dmp

                      Filesize

                      32KB

                    • memory/4064-673-0x000000001B630000-0x000000001B912000-memory.dmp

                      Filesize

                      2.9MB