Analysis

  • max time kernel
    60s
  • max time network
    47s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    21-04-2021 18:34

General

  • Target

    BookLot.17.2102.1pawk.exe

  • Size

    69.7MB

  • MD5

    262dbc70f4b9486ac7b7fcd6d3461a45

  • SHA1

    895c8588764e11e410921928d10784771744f1a1

  • SHA256

    ed9e5b3986147c79fff860e2fe5597cc2f34762adc8c84000c8734b8fb0dc808

  • SHA512

    fa3bede3ed0fbf2a701b2d9ac68a9e2e4d726e05913ea375d15ffef3a0a3c439957eb358b0ebcb79c9b608921bce69e87ae575ab7a56dc36c0773360b25b7bce

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 21 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BookLot.17.2102.1pawk.exe
    "C:\Users\Admin\AppData\Local\Temp\BookLot.17.2102.1pawk.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C "sc QUERY NPF | FIND /C "RUNNING""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Windows\SysWOW64\sc.exe
        sc QUERY NPF
        3⤵
          PID:2224
        • C:\Windows\SysWOW64\find.exe
          FIND /C "RUNNING"
          3⤵
            PID:3680
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe" C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe
          2⤵
            PID:2252
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2104
          • C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe
            "C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe"
            2⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Loads dropped DLL
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:3812
            • C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe
              C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\BookLot\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\BookLot\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\BookLot\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\BookLot\User Data" --annotation=plat=Win32 --annotation=prod=BookLot --annotation=ver=0.0.99 --initial-client-data=0x2ac,0x2a8,0x2a4,0x2a0,0x2b0,0x748850d0,0x748850e0,0x748850ec
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1888
              • C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe
                C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\BookLot\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\BookLot\User Data\Crashpad" --annotation=plat=Win32 --annotation=prod=BookLot --annotation=ver=0.0.99 --initial-client-data=0x1e4,0x1e8,0x1ec,0x1e0,0x1f0,0xaf0378,0xaf0388,0xaf0394
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2852
            • C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe
              "C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe" --type=gpu-process --field-trial-handle=1496,13898514471437457317,7217634391871827286,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\BookLot\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3812_15320" --gpu-preferences=KAAAAAAAAACAAwDAAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --user-data-dir="C:\Users\Admin\AppData\Local\BookLot\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3812_15320" --service-request-channel-token=16563320355894216538 --mojo-platform-channel-handle=1512 /prefetch:2
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              PID:1780
            • C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe
              "C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\BookLot\gen" --js-flags=--expose-gc --no-zygote --field-trial-handle=1496,13898514471437457317,7217634391871827286,131072 --service-pipe-token=15656721731398269781 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\BookLot\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3812_15320" --nwjs --extension-process --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=15656721731398269781 --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2368 /prefetch:1
              3⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3104
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "driverquery /FO list /v"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:4204
                • C:\Windows\SysWOW64\driverquery.exe
                  driverquery /FO list /v
                  5⤵
                    PID:4240
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "driverquery /FO list /v"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4312
                  • C:\Windows\SysWOW64\driverquery.exe
                    driverquery /FO list /v
                    5⤵
                      PID:4388
                • C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe
                  "C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe" --type=utility --field-trial-handle=1496,13898514471437457317,7217634391871827286,131072 --lang=en-US --service-sandbox-type=audio --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\BookLot\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3812_15320" --service-request-channel-token=3731537238255054888 --mojo-platform-channel-handle=3276 /prefetch:8
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3564
                • C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe
                  "C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe" --type=gpu-process --field-trial-handle=1496,13898514471437457317,7217634391871827286,131072 --disable-gpu-sandbox --use-gl=disabled --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\BookLot\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3812_15320" --gpu-preferences=KAAAAAAAAACAAwDAAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --user-data-dir="C:\Users\Admin\AppData\Local\BookLot\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3812_15320" --service-request-channel-token=14716781668671228873 --mojo-platform-channel-handle=3888 /prefetch:2
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4492

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Persistence

            Registry Run Keys / Startup Folder

            1
            T1060

            Defense Evasion

            Modify Registry

            2
            T1112

            Install Root Certificate

            1
            T1130

            Discovery

            Query Registry

            2
            T1012

            System Information Discovery

            2
            T1082

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\BookLot\User Data\Crashpad\settings.dat
              MD5

              5f13ad3adbf152796eedfcdbce9b4a72

              SHA1

              9243c2eb2da36685b0b23d0921531a9afcead839

              SHA256

              3ed4b53bf34484c9f576953c830680729d6314639c277879af64722c9eedfddc

              SHA512

              7e9acd0078827c2a7ca09dc485fdd864999317562382379f2116a2833f83c1d22e5fa430e62b49d38e139fff923ad8e029089caf95d5c5165db2e0ea25742205

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\ip-regex\index.js
              MD5

              d8ad95a7b6a3fb035c7e1a4dae741dd5

              SHA1

              a05b912f4f6be16338c0b4fc279dd246144875b0

              SHA256

              3d6009cb08e64bda7305c2834057f0599ff3b8d1aced030c240ffa0d6a16257a

              SHA512

              830ed3ad7244c996d76998d02d09dfc9766b91305cddfb6e255f7b7fca9d1df7c94431f665ad5c6f9c30fb8ded8a4f301837fd05590d215df4ded416b3d17e57

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\ip-regex\package.json
              MD5

              e7bb1b751128d586108f27b7ef29b3aa

              SHA1

              76e1bedb697b627aa3db14047ab860a68bbdcfa3

              SHA256

              cb551dfefed71849e88eb8c590959194f8b13df0b6be84e3b7455766889aca93

              SHA512

              9e0602fda1a0379045b21b5c3fb7c363a5daa8c08db209232b89121c6b2654c71263804c0b4d4c8b1a88a601e685f771df5c635ea6054dfd9e264ef2e99ca29d

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\json-stringify-safe\package.json
              MD5

              fb9afefdbee5b88803b2e0af75c937e4

              SHA1

              afc7ac4d0caf06b25f890f841cbdcfd095daa0e3

              SHA256

              440291671674822a83d72a070b99e46ce6c479f881022b464f6155b92ce26b2c

              SHA512

              aeea50f7d612bd5eb3ca09a962f5ddbfa4bfaae7e7a564885ac803969bf35fb1599e75b23a8217bc8b9ee7374f5ca181972aea9191a585f124f8e9a529dba8fd

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\json-stringify-safe\stringify.js
              MD5

              a138c2d1114bef6d26623141fc9e7a92

              SHA1

              b36a3a8d0f794fae13dc8e1c93bd4a8cae311bf2

              SHA256

              952ffb7fc912b6168d6b9afb92cd12d4a01a4c55fe2eb82a9abce4def0a207c5

              SHA512

              78d4b8acf2638885978e5d1d06d751738839d3e4e1ac67775674c38fb28a91d0e1dc278142eab6691432b8112e71081978d799779189e0df9d0c761eb22e3e0b

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\psl\data\rules.json
              MD5

              cf25864c2720ab33bbf6938527114678

              SHA1

              cda973ccb804bb70c4fceda0533a03a354be2ffe

              SHA256

              dddb3446e3caa6df63ff0b527c9e67466d6d52dae3293e085cfd2980ef44e3ad

              SHA512

              9685023cd3c11e953b803a971029a002f2e065b4478b146ec9e4febc1463a477c9fe86a311899645d3d2f7a1d0013f31dbe1c57035a90bd7b2b419989f404ca0

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\psl\index.js
              MD5

              bae2793857cca142ce83734db1e5cc57

              SHA1

              9e7fd00d5e988f4034720c6831e47a0f258261f0

              SHA256

              b031d76949a9fa16597773062d56615533b45fe856e131b395dcf8be9ffa99d3

              SHA512

              d9a0af2392db032566127fbd51d57ab2b0379349cbd684496b028427feab3f11b394cdd3fd43ec2f9e8db670e2c2a1b97399d6c9d81af00df58235b7c776ca96

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\psl\package.json
              MD5

              c04dd778e12a1504eee4d5de982a183e

              SHA1

              a1eb37be9cdaf76e14071f620cc3b9c9289239ef

              SHA256

              e57d4cc025540785aa04a44c3675c79832aea606724dceef8ccbe86b28af1e72

              SHA512

              f99257686620cf333bec04f0d2c22d079df0afd6bdb5ee796f8d66b0cd63899c3e626ca91bd69a2201c4fc39cb3edec257fc42c330e7d13c06da7814d59b6c41

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\qs\index.js
              MD5

              279b5408af1f82bfb5846a40504b1b86

              SHA1

              8dd441855f345ab5de8626bec2dd91084b9dd611

              SHA256

              f87890b6d58f3a7e71b06299d2166c29e394be25534e469d158d26682a228376

              SHA512

              46e30b504f3710df997e20e94fcde8516ea3372ba17fcf338188ffe8e19221f27b11427098b1975475a39395005cdb1f9fc32b2966646fe207d9c627f89f4305

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\qs\lib\index.js
              MD5

              a2dd930d422861906388041dd04aee21

              SHA1

              1d12b60ebf187b97694b40050dc582b1205775c0

              SHA256

              234a0ac59c4d5f5f333bd756c3d7939fa5637a20fd5246848aa0d31bc26fbfbe

              SHA512

              b6efd4b7df1c18e8a9639bc6cdc1374f8f2121e4dff74370023eaa3f03c1e908986ebe94bf181b3cda6ac0228f0e6fd2e72e4eed9e80eb95196383ce627bcbdd

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\qs\package.json
              MD5

              0c648e05aa267fcf6b4d6afebf2bbd30

              SHA1

              6c481f0e61925bfad5b1d180273a99a655c371c2

              SHA256

              e64a3ac21e4bde0462b70d43c0454e95464dde01cddd84fb249b12999c6fedac

              SHA512

              688ba6756301e8413227baf58d45492a4455733a5c9a728643f740d9080694caa91843a6e9fe5a09760f0676b18ee7c64d17f8e84cc87be48c9301eca036ae3e

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\request\index.js
              MD5

              32ef3686a6e9a154933429aca8852d2a

              SHA1

              4f4cf280c357784ae223a0aa6f7d7aa2a0b70b73

              SHA256

              176ff6da743f5de88422c87e993f12fd62e49710755fa2f80204efab817f0cec

              SHA512

              58ac8a8ab019d90e05b059334ae843c91ca4c5edb9543d6f1e6eb461767fa70824c1cbb509e7fc50afd91ff7d0bffba507f32bef4552f42ca550a90a320f42c2

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\request\lib\cookies.js
              MD5

              3f1cad79f7518a5caa203c9c47f8fe56

              SHA1

              4f7a0ad5981b555857ed98dfc4e338a69883173d

              SHA256

              2cbb36d465eac68f9253fa9733ac9f301ed7079e8b4f36d1ea1a3b6acb3e83fc

              SHA512

              3bcc306e77797358ffbf049d1b31223d21f5037f94c5276d18879ec01bbcb4e95e4ec2f1463bd16d8df8668d5889bdcabe57c344a1adcf5f2757ca4de48cdf26

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\request\lib\helpers.js
              MD5

              1380ce3ff72761b4f0c435c74005bfef

              SHA1

              c22d03f7407650d6d4047c6af6dbb1261b8d7472

              SHA256

              241466f93a63b2be5be0b4fcc2d87a518e18003724f16bbf334e5f66538e6ef9

              SHA512

              c6f7631afd2a37eea1eb472b03c56354a0cc7e607440a64776a70742f7bcc9c464892975d1317f71016eac902c10420e1367c2a16d6cb7d469f5a45b2de75946

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\request\package.json
              MD5

              ec131d3108b7e619ad69a8a21e506325

              SHA1

              fb48c4cc9ac5e6cb43c795da4fba6a82e600f19e

              SHA256

              58ffec60b67393a22709c25f9a3787a84ab3af52676096a6f340873ff8e2ba06

              SHA512

              953198776ecc6c3b84a4eb5a3034d252f952804cf8cdc05b6afe1b294420e5364d6766fb0e026a61bd906171ee8ae2e27668582ff67956dcea63de8675fd6629

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\request\request.js
              MD5

              f0f60fd5ff5adb2c4bccc9c93b5b2573

              SHA1

              85ca89504958937c37646bdcb3bf478db9f1cdb9

              SHA256

              a986479ffb5aef638deddb3cfaf8dd306cc2f541f018f9ffd95289e9ffc68b3f

              SHA512

              eea7a81b4a076c5b09476cc1c84f012f94f1cb150095c1a109afb3270daa9406b9d051d8137a75e52986f2a56d4f5bb4172a4d3cf3efe233d1789837cffe4414

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\tough-cookie\lib\cookie.js
              MD5

              c2e24ba6412b3cc0e29ced71846deed9

              SHA1

              c7fb3b80ec3050b53e14eb32001725bddf7adb3a

              SHA256

              1abae9de95f5c7fd912200db127dd25a5186ef757c56d05e632046776a412eb5

              SHA512

              c8cb9ccb1b056adb0c87d4b6392c78547df210aaee6cd0fe8e0835bfb0a8505ca01b411d7a21c1a75e2885d7ae58bc10b444fc6a804809f432e7fee1865186f5

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\tough-cookie\lib\memstore.js
              MD5

              8375fca65218785c0dbebfc20bd50fa2

              SHA1

              507ed22a5208cad71c234fbe3750d1cbe0c2b80b

              SHA256

              279c134838e62cd0fa962467334a568332188079a8167b01744c2aa1f4bc06f2

              SHA512

              595e0e588bd12ec8a364975fe7cb6bca4bd7b1e9fc2231e98495204ed49ad25036ca383bcc72d4fc3d29e2efefc10da820f5552856c89883c3b5ce4dcd18fb47

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\tough-cookie\lib\pathMatch.js
              MD5

              8ef4b4a39dcaa8d84894d1a3b325565d

              SHA1

              3d403b8aad536db9e97eef4915eb01ef53405323

              SHA256

              1f07134d0b6d5f0dcdfd8be2b8aefc792ee8aa97c7204e81300a6950fc7fa24f

              SHA512

              759a08f6dfa17660892474cf6425788d8b35a1e6a20feb84b10ed04ee396942a85cc594d856446e7982c2b05d9dc835d7965d70ad03965b5a84f22734b36593a

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\tough-cookie\lib\permuteDomain.js
              MD5

              f45210a61831992857e540985cb4de17

              SHA1

              d028d9ac2af6241ebc40810eaa1c1d886d922451

              SHA256

              1265469f37c9cd695ea24717342684c89812c3a3a7181345a1f57d13841965e5

              SHA512

              9421e5e96939aa7b4b2aa05168d6a92bb8d2f17a82fe2b5f6dba657d01b6385440b2646542704c67c028aa409673049418cea1bc1ef2ee42bedf1dcb48bc3df6

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\tough-cookie\lib\pubsuffix-psl.js
              MD5

              7c0d6e0ac48eb3cff5b516d139b850f4

              SHA1

              e6f44577dc69725e632107a5f710de480e178eac

              SHA256

              393965637a28f3ddb461409b34a1724c6ac48e97f2a387456aef58922a76ea4e

              SHA512

              ef7a2ac21587d93e98a39c0b82d63b42cbc6d6fb0bd7b65df2a757743f9bd1afbcf161a324c63877364d4fb16856e628546e80d3ea5fdc9250beb22ab596c750

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\tough-cookie\lib\store.js
              MD5

              5a442a244ee5ff6740784d4e197339bd

              SHA1

              52af1a436ae6783907e59fcd6d3c97c3279f363a

              SHA256

              8f19685eb26680203b59528485626bf9c53bc31a865bd3f9874907eeb382b29e

              SHA512

              ee66225a425d4dd3a7d66faec473fdea06b013a3c75cc7eafd2c9af1e7f6dc2669a4b2f83bab161d79fabd5c4f8a522c97151f13ae055dfd10687a30bf49d494

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\tough-cookie\lib\version.js
              MD5

              baa98c66e060961b36737e5accf536e0

              SHA1

              827b8135724e0b7ebda388d4f38e613744c99724

              SHA256

              1ba7730b2e132a94bd03cf6e1d86e83310d7e03c4db7280a17b0a381c112ac32

              SHA512

              84bdbd74affcc09e3e664ca184f604cccf3434abfe0c5f97e1b67666cf7c58bf4cfa384f5c9cfb7d25db8fdf00214a65a94cec56cbd94e75540816cc26564c54

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\node_modules\tough-cookie\package.json
              MD5

              b119555fa455b8f383ff59b06cd88904

              SHA1

              c5b3185392c9faf953d29c4d251e180ae846442e

              SHA256

              8c317399f7be46612be54413eb3aba558cd7e036bdea719aec83d53c94fe3507

              SHA512

              481ac71f21e9d081965cd78b94044b86cea09215f9c4bd7e07d640ec01bafd630b8e2f640993b8b8a5be6b083459e5349a519b156e527323cd4c2310d6023982

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\package.json
              MD5

              137b5f87e6fa904be7b07f2f4942d034

              SHA1

              21ffed1eff3f90b520726fec8c675b4f23d9262a

              SHA256

              46639a2ffe335fefc7f90163e528f27844aeace23eee5761d1d8baaf7800ca40

              SHA512

              05cfcf9a771df188faa0efd456df4812d7e9b67882c1942bd890d7e973fb8ea1cbda2ffef03c6fc8d39b84111d656264aedd342c419889c91588f25171d5a2f4

            • C:\Users\Admin\AppData\Local\Temp\nw3812_15320\settings.js
              MD5

              b1543e36f8614041ea18bc835e861401

              SHA1

              98e2d3a9a52a9a4f3b4cdd11c31975df3fb565c2

              SHA256

              77499c96d3c83ebc81db9a44f9a538945bb6704c0b8a274eabd2fcc0bd701ebc

              SHA512

              206bec9b1f1599bc32e9bda12ad362afd693524fab72251b8ddd7ac1737e3bd3e31b3d36c09708433848d9ffd8604bc4449bafab69cb2a447d1b52b3820a4757

            • C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe
              MD5

              ab87fe73a386f63c49d474cbc52b79c8

              SHA1

              b37f17af0e2fd108291953047458e69d84ec865c

              SHA256

              187047b6542cb613194f8e3c449d61978735fc28f952ee7b26532a47c697b3d6

              SHA512

              b4166d48c44918ce9a0526c5e8ce98fb2f3e2073b0172383f7dd79971f3fd45f6c981c60262719108d25341e530231f8f69f1de33d7edae631b809e2cc0e55c3

            • C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe
              MD5

              ab87fe73a386f63c49d474cbc52b79c8

              SHA1

              b37f17af0e2fd108291953047458e69d84ec865c

              SHA256

              187047b6542cb613194f8e3c449d61978735fc28f952ee7b26532a47c697b3d6

              SHA512

              b4166d48c44918ce9a0526c5e8ce98fb2f3e2073b0172383f7dd79971f3fd45f6c981c60262719108d25341e530231f8f69f1de33d7edae631b809e2cc0e55c3

            • C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe
              MD5

              ab87fe73a386f63c49d474cbc52b79c8

              SHA1

              b37f17af0e2fd108291953047458e69d84ec865c

              SHA256

              187047b6542cb613194f8e3c449d61978735fc28f952ee7b26532a47c697b3d6

              SHA512

              b4166d48c44918ce9a0526c5e8ce98fb2f3e2073b0172383f7dd79971f3fd45f6c981c60262719108d25341e530231f8f69f1de33d7edae631b809e2cc0e55c3

            • C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe
              MD5

              ab87fe73a386f63c49d474cbc52b79c8

              SHA1

              b37f17af0e2fd108291953047458e69d84ec865c

              SHA256

              187047b6542cb613194f8e3c449d61978735fc28f952ee7b26532a47c697b3d6

              SHA512

              b4166d48c44918ce9a0526c5e8ce98fb2f3e2073b0172383f7dd79971f3fd45f6c981c60262719108d25341e530231f8f69f1de33d7edae631b809e2cc0e55c3

            • C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe
              MD5

              ab87fe73a386f63c49d474cbc52b79c8

              SHA1

              b37f17af0e2fd108291953047458e69d84ec865c

              SHA256

              187047b6542cb613194f8e3c449d61978735fc28f952ee7b26532a47c697b3d6

              SHA512

              b4166d48c44918ce9a0526c5e8ce98fb2f3e2073b0172383f7dd79971f3fd45f6c981c60262719108d25341e530231f8f69f1de33d7edae631b809e2cc0e55c3

            • C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe
              MD5

              ab87fe73a386f63c49d474cbc52b79c8

              SHA1

              b37f17af0e2fd108291953047458e69d84ec865c

              SHA256

              187047b6542cb613194f8e3c449d61978735fc28f952ee7b26532a47c697b3d6

              SHA512

              b4166d48c44918ce9a0526c5e8ce98fb2f3e2073b0172383f7dd79971f3fd45f6c981c60262719108d25341e530231f8f69f1de33d7edae631b809e2cc0e55c3

            • C:\Users\Admin\AppData\Roaming\BookLot\BookLot.exe
              MD5

              ab87fe73a386f63c49d474cbc52b79c8

              SHA1

              b37f17af0e2fd108291953047458e69d84ec865c

              SHA256

              187047b6542cb613194f8e3c449d61978735fc28f952ee7b26532a47c697b3d6

              SHA512

              b4166d48c44918ce9a0526c5e8ce98fb2f3e2073b0172383f7dd79971f3fd45f6c981c60262719108d25341e530231f8f69f1de33d7edae631b809e2cc0e55c3

            • C:\Users\Admin\AppData\Roaming\BookLot\D3DCompiler_47.dll
              MD5

              16ce419ea09cf06a4da2f2834101b537

              SHA1

              3a2fff27a58100acdc3596c4f65402c07c71ede4

              SHA256

              53afc756cbe3d08549fbd1b28d7d9abb40fa03b0f646cd0a156cce808cdbe7a2

              SHA512

              d92fd638952e072f67ac95eaa9722a5f2cb03c403827a4a27e45c50fb32907051501c34a6525cca2fbb08ae0571ad31b19b03098f74bf436af2fd51f2b73887e

            • C:\Users\Admin\AppData\Roaming\BookLot\icudtl.dat
              MD5

              59e21005a68ed37eb7019091301b2c6c

              SHA1

              0161c874d50f245238b8683381b3c39ced4873f7

              SHA256

              75b9d0e6c2ce9d8f8abd53c7198f614ab77af4912b39cb9a0ff272a7c2093b95

              SHA512

              40241f90bf4ef435a0449acfdec416c8a86c9db9219a532b27ec7dc265d731809dd1932f97b8695d425b4597d5c9c08149ea8bff8324a4a27077e4ed60cd881e

            • C:\Users\Admin\AppData\Roaming\BookLot\locales\en-US.pak
              MD5

              04401732451f77ad1987f25c8d1361be

              SHA1

              270fb5000804cfde8cf84ce6a6e9000e157f7ff0

              SHA256

              bc1a09ef4a2d3cd3a8e1cb5f53a3084d4784dd08af9bb77b7db192b50a33dbc2

              SHA512

              b0e824208681dc6975286df88a33acc4e70a10880ceaefb78cb75e660e8b4f7cad5d31e5ad7d3afbd22f54ef8ee9e0cac0488166ff6ede0bfba51f7ec2b85d41

            • C:\Users\Admin\AppData\Roaming\BookLot\natives_blob.bin
              MD5

              ee8117cf109aa1e47599b6b6bbffc176

              SHA1

              5860d98d47084650ace3847b956686df01a32d14

              SHA256

              05620c1db015ddfbbc7dfe39afb14c250f20090a61d9aba8dcd55e6a1a649223

              SHA512

              49cecab0c2657e5c9811d90bc65bc8b9763bf51b033c27b6db159354911865729e62f47dcde8598c854d2d458296cddb0de76697687925892a94e9e45edd6730

            • C:\Users\Admin\AppData\Roaming\BookLot\node.dll
              MD5

              7ddc0a5c72a07307f64068a83c8c250d

              SHA1

              89ec1e9c61c8e568fbc4eb376519d302504624c3

              SHA256

              e61bba7993725279d8e0020b2bb3c2386a684057e4124784f78e696adeb21bcb

              SHA512

              337cda4fd6e78b4b21425028542061af0960b414ba86a6b9f84caa3b45975d367c50bd6a59281b19f81a7e15d794d3fd1e514cadece32ab7ab76b1f7d737f8bf

            • C:\Users\Admin\AppData\Roaming\BookLot\nw.dll
              MD5

              5d1d692e1d1bb8120c1df9dbcba19b39

              SHA1

              ac3e0e06e8c9fc842075673688485a772d6ae765

              SHA256

              c294535b74618db94fd0ad0d0f1fefad5b772c51f6aa0924bdba412a42f2010c

              SHA512

              115ae166adf99b4bb6059961eab5b2073442b0c92182109c2bdbcc45886c933a98155802a48d1f7e018dcb1632f5cacb08d9ad499b5f4a941a58c7cfca1611e6

            • C:\Users\Admin\AppData\Roaming\BookLot\nw_100_percent.pak
              MD5

              032b5d5a86b3a7485dfb0e04e5267714

              SHA1

              018a6944cee946ea57b9860e3c4f686d3762544e

              SHA256

              e768e532a867066e90df8fcd1db7d4f94f1fd0585e8cae87205c46062cb68d66

              SHA512

              0f718e665dab13797bd57cb6d2a636204074e5a5ca12bb6b12d203b9f277099f8c475e1db344e371518c76d56f86d2dbf9eaad2705d5d49bc0570e88121dd39c

            • C:\Users\Admin\AppData\Roaming\BookLot\nw_200_percent.pak
              MD5

              4d35e77150b45dfc89356a2c73462612

              SHA1

              952ce0fae80cf131a2fa23f6c0349849b12dd6bb

              SHA256

              53dab7f756ed37e4ab8b7c280b5c5d517edc6820d35478a285d32a31ca1b34a4

              SHA512

              0ad4d40f21f34c82ad1f67067420ad49b58e63e291776a93796b97323b895b0ff1054883c4b24cc42d4456db2c32ec2358d77de57cf21ad4828bcbd4f97a876e

            • C:\Users\Admin\AppData\Roaming\BookLot\nw_elf.dll
              MD5

              9c73c5e60cc4df891f7988126dea06d3

              SHA1

              daebadd2c69e32ef64060e736efd81a69ca2f132

              SHA256

              dfc9f22c1cbca7de9422d794ff6c3107ea9161eb11d3756e34b6108d5c994892

              SHA512

              0b17283ec4e4101036a915cefab930710e95e79f8bb9bc184b40c90ddd801fc09d3cfe7b9570570ca0f6c494bb02c81fbebdd0850c111b1cd6b90cfd51d25d13

            • C:\Users\Admin\AppData\Roaming\BookLot\resources.pak
              MD5

              5d3fa0a9a55681de1026c0bae589dd74

              SHA1

              a404f7598a26302b933783ad665092a712519dc6

              SHA256

              dbf6c9ca5fb13ab009da8b233891c3606cd344961c1c5af374c43476c0758dec

              SHA512

              a5acd110be6bbe58101ff1736ad227c6efe3113045b3eb8198be699e5b3cbce637644ed88f6381defcd64ff1327d60e889ec925096d937c3f11b4811496e3663

            • C:\Users\Admin\AppData\Roaming\BookLot\swiftshader\libegl.dll
              MD5

              1c85ae3c2cd01a0fa35306e4a79ab09d

              SHA1

              a23d819ba4805a47bfa1774f8e1c0f3b78ba7347

              SHA256

              e73aee1df92cc5ed40f38097310f98c58c41e729c05fe554877b42b620c7d658

              SHA512

              983a039d324aa442fc90e0f5bf2c5056370cb700b780d5a2c1c6058edd370a48f44354c6b755ab9486f6fdbae1b4bc743f48f01eaef1a83775c4db8c5099faff

            • C:\Users\Admin\AppData\Roaming\BookLot\swiftshader\libglesv2.dll
              MD5

              dc0a1c2539d26524aadf8aa8937cef0b

              SHA1

              831ddc55343284fcbfc46915224beacb18aa419d

              SHA256

              6c3f9d4062a383983716c6956dee35c6832e6c7d5de82d60220d3bf6beb74a56

              SHA512

              a39ae1f34f73545a14b5ee8acb0bc99eefe093de7264932da669a24eeace1593033510a6b62fa4450903abd7d01efc368221b8744da079a16a43d7ead2e45d9d

            • C:\Users\Admin\AppData\Roaming\BookLot\v8_context_snapshot.bin
              MD5

              edc01d3db74ca95705aaf11cee734c71

              SHA1

              318aa7196dc4d7954afd5e353cf4e9a9854f89c7

              SHA256

              6dd5f4d2ff9389f939991d7fe9a14f68a89249712df9fa23613849678c05bd83

              SHA512

              85ac8fd58d5243231c78561c0859fb1847d8aec580648f426d4411a56782427185b46a2f24004c4133a6cd91eb94dd8538053d043e4859b77505168f32e92d05

            • \??\pipe\crashpad_3812_MARMMTQZSUWCFITA
              MD5

              d41d8cd98f00b204e9800998ecf8427e

              SHA1

              da39a3ee5e6b4b0d3255bfef95601890afd80709

              SHA256

              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

              SHA512

              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

            • \Users\Admin\AppData\Local\Temp\nsfB879.tmp\System.dll
              MD5

              5ccde6cbe28a74c393f2b7b6f5cc7458

              SHA1

              f49a9731b0c94418430c2d82970164b21acb4bfd

              SHA256

              2c2db6b7ca5781a34c30c42c18ec1ece1284b8d500fd0251fa383fd7b1eeb6e0

              SHA512

              f2a24ec74409f006c9c99ea5ebe7e33de6ae8f49d8f90b05d1f56de9c0ae17a31b3217a71ccf2dc33ebb4305db19cad2e296f32f12273cd9bcbb2603d536100c

            • \Users\Admin\AppData\Local\Temp\nsfB879.tmp\System.dll
              MD5

              5ccde6cbe28a74c393f2b7b6f5cc7458

              SHA1

              f49a9731b0c94418430c2d82970164b21acb4bfd

              SHA256

              2c2db6b7ca5781a34c30c42c18ec1ece1284b8d500fd0251fa383fd7b1eeb6e0

              SHA512

              f2a24ec74409f006c9c99ea5ebe7e33de6ae8f49d8f90b05d1f56de9c0ae17a31b3217a71ccf2dc33ebb4305db19cad2e296f32f12273cd9bcbb2603d536100c

            • \Users\Admin\AppData\Local\Temp\nsfB879.tmp\inetc.dll
              MD5

              1fc1fbb2c7a14b7901fc9abbd6dbef10

              SHA1

              4d9ed86f31075a3d3f674ff78f39c190a4098126

              SHA256

              4f26394c93f1acb315c42c351983dafc7f094b2d05db6d7a1ba7dcb39a3a599e

              SHA512

              76d8ff7fc301cc5ff966ad8be17f0f3f2d869ef797c5a2c55a062305c02133a842906448741bf9818ec369bbb2932b9a9c2193ebc59835b50e8703db0090fdb2

            • \Users\Admin\AppData\Local\Temp\nsfB879.tmp\inetc.dll
              MD5

              1fc1fbb2c7a14b7901fc9abbd6dbef10

              SHA1

              4d9ed86f31075a3d3f674ff78f39c190a4098126

              SHA256

              4f26394c93f1acb315c42c351983dafc7f094b2d05db6d7a1ba7dcb39a3a599e

              SHA512

              76d8ff7fc301cc5ff966ad8be17f0f3f2d869ef797c5a2c55a062305c02133a842906448741bf9818ec369bbb2932b9a9c2193ebc59835b50e8703db0090fdb2

            • \Users\Admin\AppData\Local\Temp\nsfB879.tmp\nsDialogs.dll
              MD5

              635e0750d89a69fcfca2efae8b65c0f2

              SHA1

              f36a7c3341eb9fa2669068851b2bb254cd92fa1d

              SHA256

              7f7af08e55e792805930c9090147085a047fbd8fd820ba72df3783b8fdf26f87

              SHA512

              7fcae19c3bc49f2fcbf38790ead11e19e323530596c307a48cdd62772138f16686da2c6fe4c6552929db5f627c69467580cc2e36d80f7b40ec20af04485fa501

            • \Users\Admin\AppData\Roaming\BookLot\d3dcompiler_47.dll
              MD5

              16ce419ea09cf06a4da2f2834101b537

              SHA1

              3a2fff27a58100acdc3596c4f65402c07c71ede4

              SHA256

              53afc756cbe3d08549fbd1b28d7d9abb40fa03b0f646cd0a156cce808cdbe7a2

              SHA512

              d92fd638952e072f67ac95eaa9722a5f2cb03c403827a4a27e45c50fb32907051501c34a6525cca2fbb08ae0571ad31b19b03098f74bf436af2fd51f2b73887e

            • \Users\Admin\AppData\Roaming\BookLot\node.dll
              MD5

              7ddc0a5c72a07307f64068a83c8c250d

              SHA1

              89ec1e9c61c8e568fbc4eb376519d302504624c3

              SHA256

              e61bba7993725279d8e0020b2bb3c2386a684057e4124784f78e696adeb21bcb

              SHA512

              337cda4fd6e78b4b21425028542061af0960b414ba86a6b9f84caa3b45975d367c50bd6a59281b19f81a7e15d794d3fd1e514cadece32ab7ab76b1f7d737f8bf

            • \Users\Admin\AppData\Roaming\BookLot\nw.dll
              MD5

              937ab3134cfbb76e2cdb7a869fde6924

              SHA1

              8c2879cf99392ecb56c09868f4bf5809a8ac0648

              SHA256

              88ec4436c3b88ec9b67d92e8118644e9f17e90222a32f50f338b14ea1412bd86

              SHA512

              92df5d01e15073dbf8fcea7ce120ca7885ba91dd9b2e3aae191b3b9ff2d7116ab4f2b46ea9dfe2050f8571f01a0c82c091b6d4ebf912caae5a71e4820079756c

            • \Users\Admin\AppData\Roaming\BookLot\nw.dll
              MD5

              5f4b6ebe724e0f33cd8eadf8ff4973af

              SHA1

              a8372ccc12deac98d1ada76bd986d1ac636e3daa

              SHA256

              02a82638693dbed3482b8f71d8cff5ee173385031225c832a0cc21d518af9942

              SHA512

              cf010ff90d290b012c5d036f378191cfa488e624952abb43528d07f2f1e91b777be53b984ec2af7ecf892d6d88e8a2a064dbf190afaea57e95e29eba3ecf1c14

            • \Users\Admin\AppData\Roaming\BookLot\nw.dll
              MD5

              4fc3d3ecebd26cc7dedec5d70ca83af0

              SHA1

              b3c75d23d83df3d9570119f61d87ded58a87469b

              SHA256

              db539078c5897fb72de349eacfc2ed22f4c103e91e2726c7b272db4220460a8b

              SHA512

              507adde4b9b0ce1f54a529b201e342d3d3acb44c69e821d604e0b433d27d04b96a17256fd19ce9ef9bc14c3da218675bb78cfd032f0169f58a32e2182df11e26

            • \Users\Admin\AppData\Roaming\BookLot\nw_elf.dll
              MD5

              9c73c5e60cc4df891f7988126dea06d3

              SHA1

              daebadd2c69e32ef64060e736efd81a69ca2f132

              SHA256

              dfc9f22c1cbca7de9422d794ff6c3107ea9161eb11d3756e34b6108d5c994892

              SHA512

              0b17283ec4e4101036a915cefab930710e95e79f8bb9bc184b40c90ddd801fc09d3cfe7b9570570ca0f6c494bb02c81fbebdd0850c111b1cd6b90cfd51d25d13

            • \Users\Admin\AppData\Roaming\BookLot\nw_elf.dll
              MD5

              9c73c5e60cc4df891f7988126dea06d3

              SHA1

              daebadd2c69e32ef64060e736efd81a69ca2f132

              SHA256

              dfc9f22c1cbca7de9422d794ff6c3107ea9161eb11d3756e34b6108d5c994892

              SHA512

              0b17283ec4e4101036a915cefab930710e95e79f8bb9bc184b40c90ddd801fc09d3cfe7b9570570ca0f6c494bb02c81fbebdd0850c111b1cd6b90cfd51d25d13

            • \Users\Admin\AppData\Roaming\BookLot\nw_elf.dll
              MD5

              9c73c5e60cc4df891f7988126dea06d3

              SHA1

              daebadd2c69e32ef64060e736efd81a69ca2f132

              SHA256

              dfc9f22c1cbca7de9422d794ff6c3107ea9161eb11d3756e34b6108d5c994892

              SHA512

              0b17283ec4e4101036a915cefab930710e95e79f8bb9bc184b40c90ddd801fc09d3cfe7b9570570ca0f6c494bb02c81fbebdd0850c111b1cd6b90cfd51d25d13

            • \Users\Admin\AppData\Roaming\BookLot\nw_elf.dll
              MD5

              9c73c5e60cc4df891f7988126dea06d3

              SHA1

              daebadd2c69e32ef64060e736efd81a69ca2f132

              SHA256

              dfc9f22c1cbca7de9422d794ff6c3107ea9161eb11d3756e34b6108d5c994892

              SHA512

              0b17283ec4e4101036a915cefab930710e95e79f8bb9bc184b40c90ddd801fc09d3cfe7b9570570ca0f6c494bb02c81fbebdd0850c111b1cd6b90cfd51d25d13

            • \Users\Admin\AppData\Roaming\BookLot\nw_elf.dll
              MD5

              9c73c5e60cc4df891f7988126dea06d3

              SHA1

              daebadd2c69e32ef64060e736efd81a69ca2f132

              SHA256

              dfc9f22c1cbca7de9422d794ff6c3107ea9161eb11d3756e34b6108d5c994892

              SHA512

              0b17283ec4e4101036a915cefab930710e95e79f8bb9bc184b40c90ddd801fc09d3cfe7b9570570ca0f6c494bb02c81fbebdd0850c111b1cd6b90cfd51d25d13

            • \Users\Admin\AppData\Roaming\BookLot\swiftshader\libEGL.dll
              MD5

              1c85ae3c2cd01a0fa35306e4a79ab09d

              SHA1

              a23d819ba4805a47bfa1774f8e1c0f3b78ba7347

              SHA256

              e73aee1df92cc5ed40f38097310f98c58c41e729c05fe554877b42b620c7d658

              SHA512

              983a039d324aa442fc90e0f5bf2c5056370cb700b780d5a2c1c6058edd370a48f44354c6b755ab9486f6fdbae1b4bc743f48f01eaef1a83775c4db8c5099faff

            • \Users\Admin\AppData\Roaming\BookLot\swiftshader\libGLESv2.dll
              MD5

              dc0a1c2539d26524aadf8aa8937cef0b

              SHA1

              831ddc55343284fcbfc46915224beacb18aa419d

              SHA256

              6c3f9d4062a383983716c6956dee35c6832e6c7d5de82d60220d3bf6beb74a56

              SHA512

              a39ae1f34f73545a14b5ee8acb0bc99eefe093de7264932da669a24eeace1593033510a6b62fa4450903abd7d01efc368221b8744da079a16a43d7ead2e45d9d

            • memory/636-117-0x0000000002B71000-0x0000000002B73000-memory.dmp
              Filesize

              8KB

            • memory/1780-152-0x0000000000000000-mapping.dmp
            • memory/1888-133-0x0000000000000000-mapping.dmp
            • memory/1956-118-0x0000000000000000-mapping.dmp
            • memory/2224-119-0x0000000000000000-mapping.dmp
            • memory/2252-123-0x0000000000000000-mapping.dmp
            • memory/2852-138-0x0000000000000000-mapping.dmp
            • memory/3104-165-0x0000000000000000-mapping.dmp
            • memory/3564-186-0x0000000000000000-mapping.dmp
            • memory/3680-120-0x0000000000000000-mapping.dmp
            • memory/3812-125-0x0000000000000000-mapping.dmp
            • memory/4204-208-0x0000000000000000-mapping.dmp
            • memory/4240-209-0x0000000000000000-mapping.dmp
            • memory/4312-210-0x0000000000000000-mapping.dmp
            • memory/4388-211-0x0000000000000000-mapping.dmp
            • memory/4492-212-0x0000000000000000-mapping.dmp