Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 16:28

General

  • Target

    18da47cbaa9d4fddb3d68859d66bd2573f172eea02c5f829795ae6c09f4fcdf3.exe

  • Size

    7.0MB

  • MD5

    b673c5891c5baaa2fce350be43c3d396

  • SHA1

    10ecb9262f69103ae74e46ad8f3444e7ba4525e2

  • SHA256

    18da47cbaa9d4fddb3d68859d66bd2573f172eea02c5f829795ae6c09f4fcdf3

  • SHA512

    6c265c673889b7c088bbdfd2c932b7c3f6e8a75bfd414d6f174eebd451a296465a95983a7dba9a237699ea28746d09cddf7bfc0a779314995c64da5aecfa0530

  • SSDEEP

    196608:4nI+2vZunkkByr/P7uPifbdkC0AvRNimFq5Xg/G4:4Gv/6PifbNvlY5Xge4

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\18da47cbaa9d4fddb3d68859d66bd2573f172eea02c5f829795ae6c09f4fcdf3.exe
    "C:\Users\Admin\AppData\Local\Temp\18da47cbaa9d4fddb3d68859d66bd2573f172eea02c5f829795ae6c09f4fcdf3.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8O90.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8O90.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\B7V14.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\B7V14.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5108
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1f62L6.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1f62L6.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3532
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3728
            • C:\Users\Admin\AppData\Local\Temp\1013468001\a1ade1cf03.exe
              "C:\Users\Admin\AppData\Local\Temp\1013468001\a1ade1cf03.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2840
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 1728
                7⤵
                • Program crash
                PID:6032
            • C:\Users\Admin\AppData\Local\Temp\1013469001\466e4deaf6.exe
              "C:\Users\Admin\AppData\Local\Temp\1013469001\466e4deaf6.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4988
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 1560
                7⤵
                • Program crash
                PID:3312
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 1584
                7⤵
                • Program crash
                PID:5068
            • C:\Users\Admin\AppData\Local\Temp\1013470001\6c3a03db4f.exe
              "C:\Users\Admin\AppData\Local\Temp\1013470001\6c3a03db4f.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2428
            • C:\Users\Admin\AppData\Local\Temp\1013471001\33a6bcc1d4.exe
              "C:\Users\Admin\AppData\Local\Temp\1013471001\33a6bcc1d4.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1064
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1884
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2308
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4936
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:324
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4704
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3532
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  8⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:4696
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2008 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {79ebf369-2196-41cc-ab37-a383e72a9966} 4696 "\\.\pipe\gecko-crash-server-pipe.4696" gpu
                    9⤵
                      PID:3996
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {23da9d96-0df9-4197-af7a-0bcca13bd3a8} 4696 "\\.\pipe\gecko-crash-server-pipe.4696" socket
                      9⤵
                        PID:1020
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3020 -childID 1 -isForBrowser -prefsHandle 3012 -prefMapHandle 3008 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9ff15770-1907-4068-8113-67aae2346df1} 4696 "\\.\pipe\gecko-crash-server-pipe.4696" tab
                        9⤵
                          PID:3164
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4036 -childID 2 -isForBrowser -prefsHandle 4028 -prefMapHandle 4024 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {53b6e582-a11c-459c-9536-9b22bc6b042c} 4696 "\\.\pipe\gecko-crash-server-pipe.4696" tab
                          9⤵
                            PID:2188
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4800 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4512 -prefMapHandle 4772 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b41c39a6-7a42-4c7f-a4d0-d5adc7e44e94} 4696 "\\.\pipe\gecko-crash-server-pipe.4696" utility
                            9⤵
                            • Checks processor information in registry
                            PID:5280
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5224 -childID 3 -isForBrowser -prefsHandle 5280 -prefMapHandle 4708 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3004ee17-2225-4be8-9ac1-809f678cb459} 4696 "\\.\pipe\gecko-crash-server-pipe.4696" tab
                            9⤵
                              PID:4180
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 4 -isForBrowser -prefsHandle 5388 -prefMapHandle 5364 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e1c395c8-db10-4e27-9929-197e6ec6c356} 4696 "\\.\pipe\gecko-crash-server-pipe.4696" tab
                              9⤵
                                PID:4228
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5680 -childID 5 -isForBrowser -prefsHandle 5672 -prefMapHandle 5668 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf1ddbc9-d9cd-467e-b334-1ca9e9fe17f5} 4696 "\\.\pipe\gecko-crash-server-pipe.4696" tab
                                9⤵
                                  PID:5100
                          • C:\Users\Admin\AppData\Local\Temp\1013472001\0d6583089e.exe
                            "C:\Users\Admin\AppData\Local\Temp\1013472001\0d6583089e.exe"
                            6⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1884
                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2g2220.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2g2220.exe
                        4⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1224
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 1604
                          5⤵
                          • Program crash
                          PID:4728
                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3L04M.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3L04M.exe
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4588
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4O827E.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4O827E.exe
                    2⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Windows security modification
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:388
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1224 -ip 1224
                  1⤵
                    PID:2520
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4988 -ip 4988
                    1⤵
                      PID:3996
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4988 -ip 4988
                      1⤵
                        PID:1868
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2840 -ip 2840
                        1⤵
                          PID:6000
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1492
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:7080

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\321WJBEQ\download[1].htm

                          Filesize

                          1B

                          MD5

                          cfcd208495d565ef66e7dff9f98764da

                          SHA1

                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                          SHA256

                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                          SHA512

                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json

                          Filesize

                          19KB

                          MD5

                          d67a0a5307dc686f2bb33a3d47b5a3fc

                          SHA1

                          bce0856745cfd8bf2ed6175b310ddcdcd80e0fae

                          SHA256

                          855dfa595b2422a42950793676f3d02d63269ac059aaec1496c70cfc5fcd6c20

                          SHA512

                          9a55eb41305aa91afc0f9bdddf7d7fafcae0917bca5663e97fa0e949a9ea15cb6d52438d6eacd4aef10f650cb908b41c3afac49862e70b7f060b06ec265500ae

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                          Filesize

                          13KB

                          MD5

                          95c8d58bb7fb235aab36750033e8993c

                          SHA1

                          ea0852ad7e0731a277ea9a4b43456ba86b53795c

                          SHA256

                          5a5f9eddb76644a6b11430a11f810f0d0384c57134aea5cd0f0885fea1302be8

                          SHA512

                          a59fc94c82949322fc8c8d3ad617fa9ca641e6909e126907096cda6d5f07cbe3f07f60db00b59e751d6ec8ccc698dd1a32a9fcffd40d4868bbd5fad308a8a51e

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308

                          Filesize

                          9KB

                          MD5

                          734e72d2796ba614654f7419e4065d6c

                          SHA1

                          9b3ed3e33d74f7cac3c825df3760a89485259c8b

                          SHA256

                          528099c498e4719e228508a7359e23bc97a1700cf7582bf3594dde526a733a36

                          SHA512

                          b131b6626abc12e92e25a9f340d3eaa21eb7bde47aaaa4616c2bdc583d940a0a4c0f434a35b6932d605b27667b0d7dbecf958acd91f869af13f1802377f3efd2

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                          Filesize

                          15KB

                          MD5

                          96c542dec016d9ec1ecc4dddfcbaac66

                          SHA1

                          6199f7648bb744efa58acf7b96fee85d938389e4

                          SHA256

                          7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                          SHA512

                          cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                        • C:\Users\Admin\AppData\Local\Temp\1013468001\a1ade1cf03.exe

                          Filesize

                          1.9MB

                          MD5

                          e96cd9e1c8cbc927c9c445e155d5bd75

                          SHA1

                          6c8d7a80cb4635fda0f7b799ace942dcd10b3700

                          SHA256

                          9f1169888c4c2acd65e79928bb27a686204fa3b622b921a7ee56c7a735924eb6

                          SHA512

                          419cb0650a718f7356335745a64d441d8693c48181692bdfb22da508fa993e93772f5ee89ae5085e5ae3d04f28936b57e12e6704291be6acc45041744ba7f413

                        • C:\Users\Admin\AppData\Local\Temp\1013471001\33a6bcc1d4.exe

                          Filesize

                          948KB

                          MD5

                          20f205ebc3ddeec636e52a437b8c3c9b

                          SHA1

                          a7d0319411c2b8d115b5fb02f1ef63a37c7ea55f

                          SHA256

                          d1f20d134a92d23683fc218749a27d327a9ac6a35cdcde8bded0854bc05ab3e8

                          SHA512

                          2a7880884aabb5a5cd1677455c38f50d6e97d7ffe11688673f683c76031725fe068acfc0f530bd3d1d574d721566ef9308431595b09cff17840a294b5b19afcb

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4O827E.exe

                          Filesize

                          2.7MB

                          MD5

                          43c842910f45deae72a62e0819adceb0

                          SHA1

                          fffcc762a5d4753855e62bd845ad39e43c962097

                          SHA256

                          aedb1af233367d2b3facb397055713f112e2fd833e625f07fff1ae723ebc4fb8

                          SHA512

                          c9fca70038e11e562e613d13061e2b68c378ee16bddf7341ca81e3502e07f31d01431f8acb39d35d43444115d96a0ace52d81d352ccbddbbe66773f64cc73fc0

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8O90.exe

                          Filesize

                          5.4MB

                          MD5

                          42f9ec4cb0e30ccda4fdb28221b45a65

                          SHA1

                          33a78b159efa969cf61cfc6a76d448da3788a70e

                          SHA256

                          3f249389e49ef533030ec9b9ab33bca3cfb4f717ca497474e5557f3e5d8338e4

                          SHA512

                          d114c774dc70d7b16c6f7850556b323a8871996cae7241fc77ecbe11b840cb5422c6f301c44fd7c0dbc773b05a9c76f04fefd4ce41a6ee5c6f5ad6c49787bd23

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3L04M.exe

                          Filesize

                          1.7MB

                          MD5

                          be752df2a3bae5d9fbd14d433b351967

                          SHA1

                          64355c823c38b257e469ff717c5ba8a9e0b0bbf2

                          SHA256

                          08570ded4cf2c4a1d44b1837436d241c0392f3c9f35ff96da78ffc80dcdcf0fc

                          SHA512

                          600cb7a8e7832f70909f53ea387c850d8a8b7e255d80f7049ff4833b198ae18cb817460e2343ff92021935c17d4845caa88ecf4ecbad8b832083d6f0fd83b151

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\B7V14.exe

                          Filesize

                          3.6MB

                          MD5

                          763b3ae10244275a7d457c7db7212967

                          SHA1

                          59430170e18de28dcb48d555dccebfe7dac465ef

                          SHA256

                          5bf201ae3499c16f62263d5a80b0c20929a7f777571cb4dfd2d5037833ca3059

                          SHA512

                          2962ebcb02ce3a11b77c04ff7cda862a946c483f23a1e6673bcb92b18ec0ee418e9821bbdc4b142fb10fdfef46971889d2a122e49143f637c7b0b4ecd02dca70

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1f62L6.exe

                          Filesize

                          3.1MB

                          MD5

                          21215739bb6d350c25a7e386f1efc041

                          SHA1

                          4365f766f0309f5182b4776e02605b80f48d9763

                          SHA256

                          6da9464cdfce2dc3d5bbcbcce04b4edb225106312be7bcd4d752c60ff05d0d05

                          SHA512

                          6d2115ed4b89ac86703ed92c63f17d6a8603a89d274e092df4dc058dbc8ea1731504e3828c9607dbbe97ea71132a340415843379cf535b4c78c6bb49d0acbf08

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2g2220.exe

                          Filesize

                          1.8MB

                          MD5

                          fc730cc04cea274ba94c95faad570950

                          SHA1

                          9959c1e33b3fe4f3e4da5e033f97a39004518b7d

                          SHA256

                          478b4646887cf4961943568f8aef881f2991e0fffaf5d2592939724c6a8c2d78

                          SHA512

                          5eb3af384e548e3ae02a1a0b972394b6a4b40798df44e379d50dd251c1f61eccc0d90460f966de2c3868ed9b521daae7e59c1eef449b02e884ffb96b408a7281

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          479KB

                          MD5

                          09372174e83dbbf696ee732fd2e875bb

                          SHA1

                          ba360186ba650a769f9303f48b7200fb5eaccee1

                          SHA256

                          c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                          SHA512

                          b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                          Filesize

                          13.8MB

                          MD5

                          0a8747a2ac9ac08ae9508f36c6d75692

                          SHA1

                          b287a96fd6cc12433adb42193dfe06111c38eaf0

                          SHA256

                          32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                          SHA512

                          59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                          Filesize

                          6KB

                          MD5

                          93ee9ee009a00d8ccdce5d2887fd1eae

                          SHA1

                          8c777d4eb23dd8993db345783c1d2bff6c9710e2

                          SHA256

                          7ffc2e7781fc6ff671dd2d1e0021ed11ff7e0ad7805d4186b4bcaa360450c4a7

                          SHA512

                          15e7b806f61cb6e6c90fef5e6c4c60c85c763ee904c9eb43912db1baabe853290f8f90a696e57ff89cae93ce067f63c2a208ee94789dec744e4dd4f78cc5559a

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                          Filesize

                          18KB

                          MD5

                          09ea8d6abc2f32852222c6876f55904e

                          SHA1

                          af4ae8cd666ff0e0f76a9e6e56c4ba8eebfdf4dd

                          SHA256

                          f58599f8633a9dce678f19fa7bd2951703656449001de37d14f3e8cb010e7d80

                          SHA512

                          125871360b88696d1af8e54192fd037bcc22aba3167b3a155f39333c0b1fc1feb894661b9ef3a0d7a740f8debc00db8a6069496068c84f344ca93454bb8c1c22

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                          Filesize

                          7KB

                          MD5

                          86e739b8f7fd09e9637c08bb46d136be

                          SHA1

                          ac2bb2ade5d1d643d68e77eadd493054ed9097de

                          SHA256

                          e82ba612952f02dcd305d87c7df9bcdf03097ac1c36f23c18f1217fa1d7b3611

                          SHA512

                          573298bd59c91a32157f4fb5246292491dce5a916d9a230824b7e4afb65222add0ca70177e75f4109ea2fa02d0f8fb14eecf21590a2eb12109267016eab9c8c1

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                          Filesize

                          12KB

                          MD5

                          6dd7e47d87bc243a1e1efe126b8e0a3f

                          SHA1

                          4bf3da1ede760d2b6d2873678c4a926cbb5defc0

                          SHA256

                          329f9aef054b9bb77318efba0e83f2757606be67bc9f92e2a401cd46f4079d5f

                          SHA512

                          e79fc8a688b5c2a448d59b98039ab47b96b6b4ee29b2bad60a653c7e93684167b08f6ae1376669ba071070156ac4db9506d3773d27dbca149ed254292f621c3d

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          5KB

                          MD5

                          8427afb4b50e33f9ba3f41611358f214

                          SHA1

                          261c0b96f9ff0d33331618b221958854bb9b3670

                          SHA256

                          2d249d9650a98cef638da92bb13616c118e74c6d857c62ae4115080d2904dcb6

                          SHA512

                          eff3d81cb7743a6ea48fe09239012b0989665daa86a4db8b9365de8fc913d830a934de6ffe384178c161518744fb82386c2b07ce1e2502c196c1bd072176bae9

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          23KB

                          MD5

                          c2347614f41154104e999cd2b75b233e

                          SHA1

                          94b1037bbafb6f80d4cd6ba1c7fdc41ce3d2282b

                          SHA256

                          c1c93d7f4b544645bf1698d3d31c151e5b05032fd83441cad271472062a1b57d

                          SHA512

                          30edbb57c9578355e504a0b04a9eed770fe9b5501b1e4d5d232d50a3c5a5843f8f0cf6eab996ed648bac02e5a067ab796e5d259e115d59425f7c4da2cc950619

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          5KB

                          MD5

                          b5388c760d1f34a8fe54ee208c2043bc

                          SHA1

                          945a84dd6ddbdda81dadf5d4d608be70b99de104

                          SHA256

                          7b38f6fb9838525fb8528f340ed46bddcfa2ef89d20d4c34bb99330c77bed058

                          SHA512

                          43f65558b21e212bce993933be1659ff88dc69e1cce60f211c588a0307b3fae1adb34d9cf6e7c52b0bd186ad7e72f990089f9836374a03662d469bf1ba2e0dd6

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          15KB

                          MD5

                          2e6f0fb86955eb1b63b62883cfca426a

                          SHA1

                          e3476eb8755cbdcc7a586dee72dc98690b3ad11d

                          SHA256

                          65147e222e8ef82779c1c3735982fec4bb4f1d0707ecabbf69a905a51d591e3e

                          SHA512

                          315c0dce9d1d359908b4b56c97647e773385c2b1dca26fd5cf5b7812870d07e555358d9b03e657929cbb2bac3045e2c5895dea7fc8d95db1f90decf5adc60773

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          15KB

                          MD5

                          eaaf99d29b185457a7b1d649ba402f3b

                          SHA1

                          fd8eec87502718df48a7d27ab5250f1f779979f0

                          SHA256

                          06cdaec637d9faa184567aa51b006ec974482deb8ddb541df051478272abf0c1

                          SHA512

                          a7856da6219aa4a656cef179c35b36b3a95d68cb886347900f5da3eb1643b49bcb38be2f60b4ea4da77c0bf6fd072d5caa76d773fdfffb0cdc8d728b65b90618

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          6KB

                          MD5

                          78feb44196faa640ebbeda223134fea8

                          SHA1

                          8185c6364904d953b7f979be42bdd3c5db2f672e

                          SHA256

                          0b4bba5a60b31a929708e27fbe1efa98fe4ec0983b740583a7eae5a0650824fa

                          SHA512

                          a7f4bc221b311080918e4d8470ad22c98af6518187e55be5246cbf7623935a795a23229eb45290e1a623001860a15dfe9f04bd47250d41f3bd985c4c34394732

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          6KB

                          MD5

                          08687faa1af949a0f01409498c7af16e

                          SHA1

                          78dc8cb157a1f01c47efdd306659bd7757f21221

                          SHA256

                          c90fda6d8420e6811f952d8a973dff5ca54978397f718b4ebeab6f671ea1613a

                          SHA512

                          1f5174ea14bca5d2ae7c75c6f5d4c95ddd85e232b347f87913818cbcfb52a68fe169ef2b858851c5ed51ff20c9abf8bb07c8762a5440fd1b8e4d71b5085a9bce

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          15KB

                          MD5

                          1452750f64ad8f0ff6cd2aa0718e395f

                          SHA1

                          e7557fc8391ae7fd8f74f8f032c59faa48b25000

                          SHA256

                          0ed7365a6d9bf013435ebc2e781080642c8459d02d3ac620db140de222423d3d

                          SHA512

                          42694f0c3edb260b7779cdb13d94ba585a7ee9f0b6f59610741363f39d1ed9c45291869b8c1eb9007289f0b5dbf58db530e4dd435f7b12e7d74fffbe908fe272

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\1f100a02-1019-49ed-8d89-1c500a2a263a

                          Filesize

                          27KB

                          MD5

                          c022f377ad2a133aec6cff0b2395ba75

                          SHA1

                          7007958f7cc2915449dedd5751019445723dcabd

                          SHA256

                          cfe92b37aa5f30997d8f2810fb5389ba27dad416ba67a75768a74910c4464565

                          SHA512

                          8ef229f476e1d22a2ccbe58ec1fa4add24e5ada91ea9279b7cbc40d7416aa0b0264b7ad0597157766b218408787d5809070d06981682aded786318be67646ea8

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\2bc9ac24-5c80-4090-986f-3e9cb876b591

                          Filesize

                          671B

                          MD5

                          831bc3b4b48d85933718405b6ce731cb

                          SHA1

                          025965dd9813516a09d0e387ee35f1ddac4367b3

                          SHA256

                          1c958b4640be2d0d5d402e2eafc0479dd18fa6945564296559f0485cb5aaa8cf

                          SHA512

                          cecd0ab4a6edcb345411ec2ce22477cd092567aba9a43d82e1e5f8e4f092da2a7346d5a70d4183d2fad0930731170ecab33dba9c3d276683b860dda60b911d32

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\4dd261a6-84e5-4e41-a1fb-cf52d406140c

                          Filesize

                          982B

                          MD5

                          bd562eb37741e650f3b0100788d75fe1

                          SHA1

                          0c93a03e2467a528673c92de8a3615c48eae09ae

                          SHA256

                          132899f6f37c92eefcfa3fb02f794e38487887e2fc94d311d008250bb7c76a15

                          SHA512

                          41349f95f2af7cf8473f2d0891fa48a1b2782d2e599687fcfc02b4c72b562df2e3a6363a96e0d9a957d0ba5d113f59730cd86191669af161175efdee7ead250c

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                          Filesize

                          1.1MB

                          MD5

                          842039753bf41fa5e11b3a1383061a87

                          SHA1

                          3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                          SHA256

                          d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                          SHA512

                          d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                          Filesize

                          116B

                          MD5

                          2a461e9eb87fd1955cea740a3444ee7a

                          SHA1

                          b10755914c713f5a4677494dbe8a686ed458c3c5

                          SHA256

                          4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                          SHA512

                          34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                          Filesize

                          372B

                          MD5

                          bf957ad58b55f64219ab3f793e374316

                          SHA1

                          a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                          SHA256

                          bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                          SHA512

                          79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                          Filesize

                          17.8MB

                          MD5

                          daf7ef3acccab478aaa7d6dc1c60f865

                          SHA1

                          f8246162b97ce4a945feced27b6ea114366ff2ad

                          SHA256

                          bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                          SHA512

                          5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                          Filesize

                          10KB

                          MD5

                          38e6f0e18f1b688bf73a8501add5d2c5

                          SHA1

                          7523db426d9609eee2f5ce5079ce36771419f4ec

                          SHA256

                          cb3b1224ffd4f5aaceaf6accf6d91966ca7bacfc9829e895c4042ccc83c5b9a5

                          SHA512

                          d15b67c0efd040276e62f391fdff1d1301a1811139864b76a205c85278d8674ef9839866fd188c81b0bf40d6cd61d691ca1f08e623908510d70ab689a263c7b2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                          Filesize

                          12KB

                          MD5

                          bdf365bc1adecd99a54b87d5cf0ed15c

                          SHA1

                          d0cc4be43ce95133d6cf9fcaba4772c5b401ab2e

                          SHA256

                          72be5cba139da41a2f9d27301f0a38b83a01583dbca8128ba149399c8d559b4e

                          SHA512

                          73cd4ddfb09ea0019ff1648ce5d24a1097b035bbcf164b4658c14acaeed78ab9cb476972cd1eb5f5e51ddea43e751a6011b4cd5452d085c2d1f1e8c753085eb4

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                          Filesize

                          15KB

                          MD5

                          078f6a7d35c5f73b2526c6dfb45fd4c1

                          SHA1

                          4e42d8c4f09aef5160382a0f6247181794155bd6

                          SHA256

                          a43126ed3ab5ef2a563cd1d402f8798327487e3b6d9e5862009267382f8f197e

                          SHA512

                          426d3089d2ad60b43a9c41bd099945311512f2493bb64ae72450ed732639db3465bde88ffdd1809aca0b9a0d19f422cc1468029dbbc7c54acfe8cba408973763

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs.js

                          Filesize

                          10KB

                          MD5

                          de5ce1734c51633d2d0158c6d12cbe31

                          SHA1

                          08fc952583b80f315f036714742f9d716e46d734

                          SHA256

                          cfb9d6a65e09620b4210fd3bde45cb2b4a9e47ed98b14a17ade6565d2bcfe043

                          SHA512

                          921f5bfbb0b6c397e56635f7c461f8e5256149833c8d092d3d07855b1b7bad506d30a69214ca836d35cc16fd73cf7156e863a73286103202ee8827b9d123cd5a

                        • memory/388-50-0x0000000000830000-0x0000000000AF6000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/388-121-0x0000000000830000-0x0000000000AF6000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/388-99-0x0000000000830000-0x0000000000AF6000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/388-51-0x0000000000830000-0x0000000000AF6000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/388-49-0x0000000000830000-0x0000000000AF6000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/1224-38-0x0000000000E80000-0x0000000001336000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/1224-40-0x0000000000E80000-0x0000000001336000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/1492-1563-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/1492-1518-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/1884-846-0x0000000000B90000-0x0000000000E56000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/1884-883-0x0000000000B90000-0x0000000000E56000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/1884-881-0x0000000000B90000-0x0000000000E56000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/1884-932-0x0000000000B90000-0x0000000000E56000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/1884-935-0x0000000000B90000-0x0000000000E56000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/2428-117-0x00000000000A0000-0x000000000072E000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/2428-115-0x00000000000A0000-0x000000000072E000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/2840-939-0x0000000000400000-0x0000000000C67000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/2840-92-0x0000000010000000-0x000000001001C000-memory.dmp

                          Filesize

                          112KB

                        • memory/2840-122-0x0000000000400000-0x0000000000C67000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/2840-142-0x0000000000400000-0x0000000000C67000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/2840-921-0x0000000000400000-0x0000000000C67000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/2840-70-0x0000000000400000-0x0000000000C67000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/2840-950-0x0000000000400000-0x0000000000C67000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/3532-21-0x00000000001C0000-0x00000000004EA000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3532-34-0x00000000001C0000-0x00000000004EA000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-95-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-2029-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-72-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-667-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-3580-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-35-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-3582-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-3579-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-985-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-3581-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-3400-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-3565-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-3571-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-930-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-3575-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/3728-3576-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/4588-44-0x00000000006E0000-0x0000000000D6E000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/4588-45-0x00000000006E0000-0x0000000000D6E000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/4988-90-0x0000000000BB0000-0x0000000001066000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/4988-98-0x0000000000BB0000-0x0000000001066000-memory.dmp

                          Filesize

                          4.7MB

                        • memory/7080-3578-0x0000000000950000-0x0000000000C7A000-memory.dmp

                          Filesize

                          3.2MB