Analysis
-
max time kernel
138s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
25-07-2021 06:26
Static task
static1
Behavioral task
behavioral1
Sample
c3c559e832052bbf33f52f6f8b0ff086.exe
Resource
win7v20210408
General
-
Target
c3c559e832052bbf33f52f6f8b0ff086.exe
-
Size
701KB
-
MD5
c3c559e832052bbf33f52f6f8b0ff086
-
SHA1
23477b75572d17b1d47b9670862aa174fb55d166
-
SHA256
838edfe6cbf7b8fb1f0d3d99535f15ef22b651fa82a9f31a50c3cae435a0af0c
-
SHA512
2a1e3e9676b103d23947b2271059f59f0bd71559071805f8650c6a27168016cff791ec3c7f2102740b1e1b9a6c5f34775a9a58d2ae3215f9bf386827d9da4583
Malware Config
Extracted
cryptbot
smauvo62.top
mortuh06.top
-
payload_url
http://gurswi09.top/download.php?file=lv.exe
Extracted
danabot
1987
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
Signatures
-
CryptBot Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3872-114-0x0000000002560000-0x0000000002641000-memory.dmp family_cryptbot behavioral2/memory/3872-115-0x0000000000400000-0x0000000000919000-memory.dmp family_cryptbot -
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Blocklisted process makes network request 6 IoCs
Processes:
WScript.exerundll32.exeRUNDLL32.EXEflow pid process 40 4016 WScript.exe 42 4016 WScript.exe 44 4016 WScript.exe 46 4016 WScript.exe 49 3304 rundll32.exe 50 812 RUNDLL32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
CNXky.exe4.exevpn.exeSorridente.exe.comSorridente.exe.comSmartClock.exeghtnsvk.exepid process 4032 CNXky.exe 3612 4.exe 1792 vpn.exe 2712 Sorridente.exe.com 2732 Sorridente.exe.com 2160 SmartClock.exe 492 ghtnsvk.exe -
Drops startup file 1 IoCs
Processes:
4.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4.exe -
Loads dropped DLL 3 IoCs
Processes:
CNXky.exerundll32.exeRUNDLL32.EXEpid process 4032 CNXky.exe 3304 rundll32.exe 812 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
vpn.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" vpn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 24 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RUNDLL32.EXEdescription pid process target process PID 812 set thread context of 3468 812 RUNDLL32.EXE rundll32.exe -
Drops file in Program Files directory 4 IoCs
Processes:
rundll32.exeCNXky.exedescription ioc process File created C:\PROGRA~3\Jvgzbfh.tmp rundll32.exe File created C:\Program Files (x86)\foler\olader\acppage.dll CNXky.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll CNXky.exe File created C:\Program Files (x86)\foler\olader\acledit.dll CNXky.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 26 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RUNDLL32.EXEc3c559e832052bbf33f52f6f8b0ff086.exeSorridente.exe.comdescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c3c559e832052bbf33f52f6f8b0ff086.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Sorridente.exe.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c3c559e832052bbf33f52f6f8b0ff086.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Sorridente.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4028 timeout.exe -
Modifies registry class 1 IoCs
Processes:
Sorridente.exe.comdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings Sorridente.exe.com -
Processes:
WScript.exeRUNDLL32.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\83D7EF832C4EBBC25CBE234409341780AEA27DDF RUNDLL32.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\83D7EF832C4EBBC25CBE234409341780AEA27DDF\Blob = 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 RUNDLL32.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 2160 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
RUNDLL32.EXEpowershell.exepowershell.exepid process 812 RUNDLL32.EXE 812 RUNDLL32.EXE 812 RUNDLL32.EXE 812 RUNDLL32.EXE 812 RUNDLL32.EXE 812 RUNDLL32.EXE 812 RUNDLL32.EXE 812 RUNDLL32.EXE 3860 powershell.exe 3860 powershell.exe 3860 powershell.exe 812 RUNDLL32.EXE 812 RUNDLL32.EXE 3464 powershell.exe 3464 powershell.exe 3464 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RUNDLL32.EXEpowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 812 RUNDLL32.EXE Token: SeDebugPrivilege 3860 powershell.exe Token: SeDebugPrivilege 3464 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
c3c559e832052bbf33f52f6f8b0ff086.exeRUNDLL32.EXEpid process 3872 c3c559e832052bbf33f52f6f8b0ff086.exe 3872 c3c559e832052bbf33f52f6f8b0ff086.exe 812 RUNDLL32.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c3c559e832052bbf33f52f6f8b0ff086.execmd.exeCNXky.exevpn.execmd.execmd.execmd.exeSorridente.exe.com4.exeSorridente.exe.comghtnsvk.exerundll32.exeRUNDLL32.EXEdescription pid process target process PID 3872 wrote to memory of 3496 3872 c3c559e832052bbf33f52f6f8b0ff086.exe cmd.exe PID 3872 wrote to memory of 3496 3872 c3c559e832052bbf33f52f6f8b0ff086.exe cmd.exe PID 3872 wrote to memory of 3496 3872 c3c559e832052bbf33f52f6f8b0ff086.exe cmd.exe PID 3496 wrote to memory of 4032 3496 cmd.exe CNXky.exe PID 3496 wrote to memory of 4032 3496 cmd.exe CNXky.exe PID 3496 wrote to memory of 4032 3496 cmd.exe CNXky.exe PID 4032 wrote to memory of 3612 4032 CNXky.exe 4.exe PID 4032 wrote to memory of 3612 4032 CNXky.exe 4.exe PID 4032 wrote to memory of 3612 4032 CNXky.exe 4.exe PID 4032 wrote to memory of 1792 4032 CNXky.exe vpn.exe PID 4032 wrote to memory of 1792 4032 CNXky.exe vpn.exe PID 4032 wrote to memory of 1792 4032 CNXky.exe vpn.exe PID 1792 wrote to memory of 1844 1792 vpn.exe cmd.exe PID 1792 wrote to memory of 1844 1792 vpn.exe cmd.exe PID 1792 wrote to memory of 1844 1792 vpn.exe cmd.exe PID 1792 wrote to memory of 2764 1792 vpn.exe cmd.exe PID 1792 wrote to memory of 2764 1792 vpn.exe cmd.exe PID 1792 wrote to memory of 2764 1792 vpn.exe cmd.exe PID 2764 wrote to memory of 336 2764 cmd.exe cmd.exe PID 2764 wrote to memory of 336 2764 cmd.exe cmd.exe PID 2764 wrote to memory of 336 2764 cmd.exe cmd.exe PID 336 wrote to memory of 2604 336 cmd.exe findstr.exe PID 336 wrote to memory of 2604 336 cmd.exe findstr.exe PID 336 wrote to memory of 2604 336 cmd.exe findstr.exe PID 336 wrote to memory of 2712 336 cmd.exe Sorridente.exe.com PID 336 wrote to memory of 2712 336 cmd.exe Sorridente.exe.com PID 336 wrote to memory of 2712 336 cmd.exe Sorridente.exe.com PID 3872 wrote to memory of 1548 3872 c3c559e832052bbf33f52f6f8b0ff086.exe cmd.exe PID 3872 wrote to memory of 1548 3872 c3c559e832052bbf33f52f6f8b0ff086.exe cmd.exe PID 3872 wrote to memory of 1548 3872 c3c559e832052bbf33f52f6f8b0ff086.exe cmd.exe PID 336 wrote to memory of 3704 336 cmd.exe PING.EXE PID 336 wrote to memory of 3704 336 cmd.exe PING.EXE PID 336 wrote to memory of 3704 336 cmd.exe PING.EXE PID 1548 wrote to memory of 4028 1548 cmd.exe timeout.exe PID 1548 wrote to memory of 4028 1548 cmd.exe timeout.exe PID 1548 wrote to memory of 4028 1548 cmd.exe timeout.exe PID 2712 wrote to memory of 2732 2712 Sorridente.exe.com Sorridente.exe.com PID 2712 wrote to memory of 2732 2712 Sorridente.exe.com Sorridente.exe.com PID 2712 wrote to memory of 2732 2712 Sorridente.exe.com Sorridente.exe.com PID 3612 wrote to memory of 2160 3612 4.exe SmartClock.exe PID 3612 wrote to memory of 2160 3612 4.exe SmartClock.exe PID 3612 wrote to memory of 2160 3612 4.exe SmartClock.exe PID 2732 wrote to memory of 492 2732 Sorridente.exe.com ghtnsvk.exe PID 2732 wrote to memory of 492 2732 Sorridente.exe.com ghtnsvk.exe PID 2732 wrote to memory of 492 2732 Sorridente.exe.com ghtnsvk.exe PID 2732 wrote to memory of 4020 2732 Sorridente.exe.com WScript.exe PID 2732 wrote to memory of 4020 2732 Sorridente.exe.com WScript.exe PID 2732 wrote to memory of 4020 2732 Sorridente.exe.com WScript.exe PID 492 wrote to memory of 3304 492 ghtnsvk.exe rundll32.exe PID 492 wrote to memory of 3304 492 ghtnsvk.exe rundll32.exe PID 492 wrote to memory of 3304 492 ghtnsvk.exe rundll32.exe PID 2732 wrote to memory of 4016 2732 Sorridente.exe.com WScript.exe PID 2732 wrote to memory of 4016 2732 Sorridente.exe.com WScript.exe PID 2732 wrote to memory of 4016 2732 Sorridente.exe.com WScript.exe PID 3304 wrote to memory of 812 3304 rundll32.exe RUNDLL32.EXE PID 3304 wrote to memory of 812 3304 rundll32.exe RUNDLL32.EXE PID 3304 wrote to memory of 812 3304 rundll32.exe RUNDLL32.EXE PID 812 wrote to memory of 3468 812 RUNDLL32.EXE rundll32.exe PID 812 wrote to memory of 3468 812 RUNDLL32.EXE rundll32.exe PID 812 wrote to memory of 3468 812 RUNDLL32.EXE rundll32.exe PID 812 wrote to memory of 3860 812 RUNDLL32.EXE powershell.exe PID 812 wrote to memory of 3860 812 RUNDLL32.EXE powershell.exe PID 812 wrote to memory of 3860 812 RUNDLL32.EXE powershell.exe PID 812 wrote to memory of 3464 812 RUNDLL32.EXE powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3c559e832052bbf33f52f6f8b0ff086.exe"C:\Users\Admin\AppData\Local\Temp\c3c559e832052bbf33f52f6f8b0ff086.exe"1⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\CNXky.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CNXky.exe"C:\Users\Admin\AppData\Local\Temp\CNXky.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"4⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c YJktxkgm5⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Sfinge.vsdm5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^XvFshFVovrUIndZSFBxxytnrIUNDETWbxfrjHpPpZeHGABxnUuWmzuATXBIzSaECibhojMlvLkxevSDiAfIbXvrhOlfyAvsHntnrhkkoWANoMbvyXATDKiFKzqz$" Vorrei.vsdm7⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sorridente.exe.comSorridente.exe.com E7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sorridente.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sorridente.exe.com E8⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ghtnsvk.exe"C:\Users\Admin\AppData\Local\Temp\ghtnsvk.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\GHTNSV~1.TMP,S C:\Users\Admin\AppData\Local\Temp\ghtnsvk.exe10⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\GHTNSV~1.TMP,Mhga11⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 3180112⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp2036.tmp.ps1"12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp3518.tmp.ps1"12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost13⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask12⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask12⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\pumapvsfuajc.vbs"9⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wjwtxwxikqql.vbs"9⤵
- Blocklisted process makes network request
- Modifies system certificate store
-
C:\Windows\SysWOW64\PING.EXEping RJMQBVDN -n 307⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\jXAkfFXt & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\c3c559e832052bbf33f52f6f8b0ff086.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~3\Jvgzbfh.tmpMD5
d0567b9d156180c0703d7b867533bf55
SHA1ddbaaff7a55fde4be5c3cd2b5ceb9e49535a4702
SHA2565406a5325a4764b5e8772de776c3269b880c59cbd66f4a6682620fc675722a21
SHA5127e6eb445c2c8a76d584183a8c4c1c193028a58634415fc2d4f9b53a1f585a3daa254fb0fe71522f4cc2098da201c4c29a062eab6cc6f330b52a69f4df22b806a
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
47eebe401625bbc55e75dbfb72e9e89a
SHA1db3b2135942d2532c59b9788253638eb77e5995e
SHA256f1cd56000c44bbdb6880b5b133731f493fe8cba8198c5a861da6ae7b489ed0c3
SHA512590b149863d58be346e7927c28501375cc570858d2f156d234b03d68b86c5c0667a1038e2b6f6639172bf95638ca9f7c70f45270951abbcdf43b1be853b81d56
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
8613f72559a9c876b30abe044095d059
SHA1bbfa8f27574dc7695088a5993716605edf18f280
SHA2565a6fb166ae15fd9c85d4c43950689b3e5e95b60e7e472829fa0fb6d5e9215e0d
SHA5127510a0ca20c63283d75e9904f319a3998e6c88512948b142376ae5f691f6d77eb6d01261dc8f47ab154906b83960d250ebda8da588a7a71f342380c79157b74f
-
C:\Users\Admin\AppData\Local\Temp\CNXky.exeMD5
ab97379430925c314d088393a8b39e15
SHA1f6f67f43bedd372da5cfcb18dae42e7139d25c04
SHA256d3467bceb27c8533c1a904b34437aa2fd03963be8085f668a961b113feb75c5c
SHA51263b82abdf1db7c0ef80dd2cce925f2aafb0ed7d55931b35ea8f244153b5e027c689623024f114d13bcb31d189e6a8ddcec289f7a2cac9f8c4b2e38cd67c2922d
-
C:\Users\Admin\AppData\Local\Temp\CNXky.exeMD5
ab97379430925c314d088393a8b39e15
SHA1f6f67f43bedd372da5cfcb18dae42e7139d25c04
SHA256d3467bceb27c8533c1a904b34437aa2fd03963be8085f668a961b113feb75c5c
SHA51263b82abdf1db7c0ef80dd2cce925f2aafb0ed7d55931b35ea8f244153b5e027c689623024f114d13bcb31d189e6a8ddcec289f7a2cac9f8c4b2e38cd67c2922d
-
C:\Users\Admin\AppData\Local\Temp\GHTNSV~1.TMPMD5
279fd5be1ef6f78dceaea9160797d3ca
SHA102d83bb9752b2f9cb205fbba5ef084069204ce5c
SHA25679e7f889f4d8c8475bef4a94124ffcdc68d1b2f8b632a6f3539179945f481477
SHA5129459221ca625f4969ca4dbf68c9765f01b71d36b90cb5c0cee863e764da6c2fd2317581bdfdbfb0440133ed3435b90516ea36e06b20efd1267ca22bfe34bb216
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EMD5
4c5c7f3e7362720b4241f8efbb2be752
SHA1be23ecf084cbf60b0f7bab86701cff9dfb1c2760
SHA256c7b5fdd83644097869d2979a3827a210bed48967bbc56e3e64d6f88d0ae26ed3
SHA5122c3fdadb53319b6e64274b2d34026818539d227af86caa1440edd5b85e5158ce34489e6361590ff2ec6137da089b717d2c1010c2bee3bdb9f97a1ead68469e76
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Pensato.vsdmMD5
4c5e138f22c752587d27c5047f1c9adc
SHA164549847c05c5a08e2c66fc5591a5b1103714bd2
SHA256e260b4bb610bb0ddfa0889f497430539bd85a7928fc37002114e87091f2ead62
SHA5128c00eb836c230ae57465b1cde318c3d441327853d1685066fe91caa2ad7fef3c3be9cda549f5bb753e2fea5a41f798fec3d22075589144365b95eb9f64ad1011
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Poi.vsdmMD5
4c5c7f3e7362720b4241f8efbb2be752
SHA1be23ecf084cbf60b0f7bab86701cff9dfb1c2760
SHA256c7b5fdd83644097869d2979a3827a210bed48967bbc56e3e64d6f88d0ae26ed3
SHA5122c3fdadb53319b6e64274b2d34026818539d227af86caa1440edd5b85e5158ce34489e6361590ff2ec6137da089b717d2c1010c2bee3bdb9f97a1ead68469e76
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sfinge.vsdmMD5
2330ab365da0a8cf6c766b2c38b3704b
SHA1faded741162dc8c18b2fdb870b07d956ffb1558b
SHA25661342f8e9ea670d0d3f73273288ee0d67a10e0560e6a455cbf8d585a4119ec11
SHA512d3acac95e7fbbd47f5c45cde0737fdea200e4aa97f1e4fdad0d8e8b41b2c163e71798656eafe42338f018ca0d8507739841e5f39603e3d556ca452c46e72ded3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sorridente.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sorridente.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sorridente.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vorrei.vsdmMD5
88b40e7263e5a4a08f6e097581a400ad
SHA167fdbd36361a85edb562fd1dbb9227916a4a09c4
SHA2564f36363fb3bc37dc1fb6af3f450f509f47e201285b4815ef2e9bbba540fdf2fc
SHA512edf8da6848baf6f5e939be35bd7e27f3b2939b519b6d9c8388f6d5af68920c46b3c90a13a91041b0bd0b65b121ddda6554f10f387fd03655d7c9d7652e7ee51f
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exeMD5
1fc6818cdb44bf2bc9b2c645aea6bcdb
SHA175555d6dab5ce575d99cd19d97748ef0e27d7858
SHA2566cb2f66383a326920b7f66b41774e97731536ef7e469da80e2064d4aaddfaf42
SHA512bed683d5ae1dc2524c3b8512e2abca4439dd1d2e9b6f0d9e0391618fc6a00259ebd30ab324bc9ff564f7eb33c2f73f778a675ab46f3e724117634164ca75143e
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exeMD5
1fc6818cdb44bf2bc9b2c645aea6bcdb
SHA175555d6dab5ce575d99cd19d97748ef0e27d7858
SHA2566cb2f66383a326920b7f66b41774e97731536ef7e469da80e2064d4aaddfaf42
SHA512bed683d5ae1dc2524c3b8512e2abca4439dd1d2e9b6f0d9e0391618fc6a00259ebd30ab324bc9ff564f7eb33c2f73f778a675ab46f3e724117634164ca75143e
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exeMD5
51aebb77c703d0ee1f9246828af5105f
SHA1fe0710ab9e6663f2b76c5fe5ff76c9c9f7e741d2
SHA25653f273aa3da76fc6b2f4293bf11b2c4695f0afd777ee7467b1f67af65b0b61ff
SHA512d16449b33c43354bd082f9e37faf566f3a570445836227f104c99518c5ad8788ad5d5aa8db5e9fd0d7f9a2a48df381a6ec85a4fcba2f682a33295abaeff18012
-
C:\Users\Admin\AppData\Local\Temp\ghtnsvk.exeMD5
b99264446882d31a0f43d2b9c191e15d
SHA1ad073fae6f855a63228248d95134098cbedbe744
SHA256cb82efcaf39d3287d6767943f3923b85fdf796e96b37a2695dc413852b5af75c
SHA5128e4ffb8953d908aafe35c3f6690073bffb0a881566f9c7b3a9cefaf33a80b67ca3b7cc404af52d05541539de66d038a54216f4e5354f075268653f6d9f73c358
-
C:\Users\Admin\AppData\Local\Temp\ghtnsvk.exeMD5
b99264446882d31a0f43d2b9c191e15d
SHA1ad073fae6f855a63228248d95134098cbedbe744
SHA256cb82efcaf39d3287d6767943f3923b85fdf796e96b37a2695dc413852b5af75c
SHA5128e4ffb8953d908aafe35c3f6690073bffb0a881566f9c7b3a9cefaf33a80b67ca3b7cc404af52d05541539de66d038a54216f4e5354f075268653f6d9f73c358
-
C:\Users\Admin\AppData\Local\Temp\jXAkfFXt\OHJVIE~1.ZIPMD5
85c1ef761b269634cac29713248d75a7
SHA1b4fbea945f51863fab4356cb0332028edaa9736f
SHA256653870f4d1c0fc282c3534d82474b096c833f9d128d72816a606179f14d62ab8
SHA51269dd4da6802a9b0e8222718eaede4aef11d31549efd36f71495b6d144fa78b6489f51a55723879ac49195835289e2c9bb43db5e6a5ed2652935bc9dbe5956aaf
-
C:\Users\Admin\AppData\Local\Temp\jXAkfFXt\YCCWES~1.ZIPMD5
78ad5927190f5bd358beb1a98234db92
SHA1152a041ad24f014f1ad4859fe8143f69e56a3729
SHA25619aa3a6d7ff00eaf9867f4cc28362d9a45c28fb55fdad58021151a9ad216be26
SHA512d44e0bb6980508c5b3226877bc5a6efa1e8ab7b31398fdc17fa94700bd277fc2b3964cbdbfa9b2c8b87fb4f0654f51a00b68ed46bacc746bbb3a8f97021c515d
-
C:\Users\Admin\AppData\Local\Temp\jXAkfFXt\_Files\_INFOR~1.TXTMD5
39a4c7d78aea92e0b06cf2beca9533c1
SHA15f92bb4ec7f9a0aba48ffdf3f2e7c30bc87f876a
SHA25633137f6ce9df26df2d56e4dbae08bc5325f0e88b268902513329146d076c9fa5
SHA512c4ded4eb5f7b9a2f82c15f178fa9bfa8ca7847af433f34f8dff229f3cfeaa5c227efee8b44674db4eacad5b718a90514db3aee0bde3925e0c5cfa90c66310765
-
C:\Users\Admin\AppData\Local\Temp\jXAkfFXt\_Files\_SCREE~1.JPEMD5
d0794dbbbf33cde2428aebe27bf5eca5
SHA16c55019d8b1f8bcdb876a2d56e7cde2c65c8c161
SHA25646dac79bb918aae4164d1b5979f6714b164990ddc0d9cfa342f6da1477a62fe4
SHA512e10d4bbca0f0375f0421e25dd66cd86aea2c4628b648f664229cc8c5fdc545876f0eae411e51faf61cf3523ddc3789e09538b15edfd8c56e4b6f14ee76b6d893
-
C:\Users\Admin\AppData\Local\Temp\jXAkfFXt\files_\SCREEN~1.JPGMD5
d0794dbbbf33cde2428aebe27bf5eca5
SHA16c55019d8b1f8bcdb876a2d56e7cde2c65c8c161
SHA25646dac79bb918aae4164d1b5979f6714b164990ddc0d9cfa342f6da1477a62fe4
SHA512e10d4bbca0f0375f0421e25dd66cd86aea2c4628b648f664229cc8c5fdc545876f0eae411e51faf61cf3523ddc3789e09538b15edfd8c56e4b6f14ee76b6d893
-
C:\Users\Admin\AppData\Local\Temp\jXAkfFXt\files_\SYSTEM~1.TXTMD5
ad11ee2580f3b6efcd260941ed950795
SHA1da6737a74e0048134b3046db3ebb0fe10cccab16
SHA256b14c732cff1734d9834d58582f371728e63717e2aa03c5438dbd3046a2289891
SHA51288e297a62cee6540b78f878ec3d6e02b31444c32d15a92ccab1060128510d4966e0c20c93525d835b11614ea34be228cf4d695bfb081387314d373b93e966cbe
-
C:\Users\Admin\AppData\Local\Temp\pumapvsfuajc.vbsMD5
56383501119d6bede6511cd77b34c122
SHA11e69858d077b6f01701632aeef9bfa2f7ae58640
SHA256f9a373850fa1374536d45d66ccee173c22c688b0d22175bce59ed8a9fb663167
SHA512abab2bc78f22b3cb2ad62ef3c526dac3d49c20427f3e8adbbb81112f208c4b990aace6ceb8c465edb91395d31049cde2efed168890dc0bcd6e3b53408ca6870a
-
C:\Users\Admin\AppData\Local\Temp\tmp2036.tmp.ps1MD5
3432a06fe6bcea097c3d70225f757b45
SHA1afe2ca472556dc58585c815487b266617bcb3a42
SHA256e88fab1b7221fce5fc1e247995e08cd5c1a420e0e3b8df29f184b77bab5a694c
SHA5126c4b7ebdbcd3c3ae4074bbc958ac5bff43bb1957814baf36aa8bd7fa9cef974c3c571f857b7676e9cb9aad4aee3b8535515b7293b42cecc53d016000c70314f3
-
C:\Users\Admin\AppData\Local\Temp\tmp2037.tmpMD5
c416c12d1b2b1da8c8655e393b544362
SHA1fb1a43cd8e1c556c2d25f361f42a21293c29e447
SHA2560600d59103840dff210778179fdfba904dcb737a4bfdb35384608698c86ea046
SHA512cb6d3636be4330aa2fd577c3636d0b7165f92ee817e98f21180ba0c918eb76f4e38f025086593a0e508234ca981cfec2c53482b0e9cc0acfa885fefbdf89913c
-
C:\Users\Admin\AppData\Local\Temp\tmp3518.tmp.ps1MD5
ebf55543ae6de38b554960807903f2f7
SHA1274f319b0713a7bbc5cadb1761e86b5842e2dd1c
SHA2564a325bd43c2d14422b4361d0ea8074e90c54b084cd7d41c93e5d1eefdf3f2b64
SHA5126cf2fbe74b0124f7826d37bac3900ec887b24fb8ad06c977ad5cc7f5ebb081a112f3460f1b570025ca069a7ce2e9ddb426f8e64a944f1b18578e4b9ada3ebb35
-
C:\Users\Admin\AppData\Local\Temp\tmp3519.tmpMD5
1860260b2697808b80802352fe324782
SHA1f07b4cb6a8133d8dd942fc285d63cb3ce5a1ed6b
SHA2560c4bb6ae7726faa47aef8459bcf37bf9ca16f0b93fd52790932adaf7845d1fb1
SHA512d9fd458e2fe871e93199d7f3783133ded898d824024d9525e8c9af2af31892b13f3fb147d3bfda7dfd7659b7072f5cd1d6c3ebfe2dbf5893afd00e59a96aa94f
-
C:\Users\Admin\AppData\Local\Temp\wjwtxwxikqql.vbsMD5
88990bf94872665f2369c10044444e15
SHA129ef04ef387da67c5aa421c704e3b2baf8dff93f
SHA256cf9dc23266d92d0fc90b5b452038f33649735a2c1cd744a6beab8c72e8c6185b
SHA512ce457dca99ab831dada3c692b3735b420fdd1131b968158c90b2edd4bfb90d96073234c1bf55e75b7371f62fc3ff813079624832793d75c6b15bdfd4532d06bc
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
1fc6818cdb44bf2bc9b2c645aea6bcdb
SHA175555d6dab5ce575d99cd19d97748ef0e27d7858
SHA2566cb2f66383a326920b7f66b41774e97731536ef7e469da80e2064d4aaddfaf42
SHA512bed683d5ae1dc2524c3b8512e2abca4439dd1d2e9b6f0d9e0391618fc6a00259ebd30ab324bc9ff564f7eb33c2f73f778a675ab46f3e724117634164ca75143e
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
1fc6818cdb44bf2bc9b2c645aea6bcdb
SHA175555d6dab5ce575d99cd19d97748ef0e27d7858
SHA2566cb2f66383a326920b7f66b41774e97731536ef7e469da80e2064d4aaddfaf42
SHA512bed683d5ae1dc2524c3b8512e2abca4439dd1d2e9b6f0d9e0391618fc6a00259ebd30ab324bc9ff564f7eb33c2f73f778a675ab46f3e724117634164ca75143e
-
\Users\Admin\AppData\Local\Temp\GHTNSV~1.TMPMD5
279fd5be1ef6f78dceaea9160797d3ca
SHA102d83bb9752b2f9cb205fbba5ef084069204ce5c
SHA25679e7f889f4d8c8475bef4a94124ffcdc68d1b2f8b632a6f3539179945f481477
SHA5129459221ca625f4969ca4dbf68c9765f01b71d36b90cb5c0cee863e764da6c2fd2317581bdfdbfb0440133ed3435b90516ea36e06b20efd1267ca22bfe34bb216
-
\Users\Admin\AppData\Local\Temp\GHTNSV~1.TMPMD5
279fd5be1ef6f78dceaea9160797d3ca
SHA102d83bb9752b2f9cb205fbba5ef084069204ce5c
SHA25679e7f889f4d8c8475bef4a94124ffcdc68d1b2f8b632a6f3539179945f481477
SHA5129459221ca625f4969ca4dbf68c9765f01b71d36b90cb5c0cee863e764da6c2fd2317581bdfdbfb0440133ed3435b90516ea36e06b20efd1267ca22bfe34bb216
-
\Users\Admin\AppData\Local\Temp\nss66CF.tmp\UAC.dllMD5
adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
memory/336-129-0x0000000000000000-mapping.dmp
-
memory/428-241-0x0000000000000000-mapping.dmp
-
memory/492-157-0x0000000000000000-mapping.dmp
-
memory/492-166-0x0000000000400000-0x0000000000544000-memory.dmpFilesize
1.3MB
-
memory/492-165-0x00000000022D0000-0x00000000023CE000-memory.dmpFilesize
1016KB
-
memory/812-194-0x00000000064D0000-0x00000000064D1000-memory.dmpFilesize
4KB
-
memory/812-185-0x0000000004F70000-0x0000000006206000-memory.dmpFilesize
18.6MB
-
memory/812-175-0x0000000000000000-mapping.dmp
-
memory/1548-136-0x0000000000000000-mapping.dmp
-
memory/1792-124-0x0000000000000000-mapping.dmp
-
memory/1844-126-0x0000000000000000-mapping.dmp
-
memory/2160-153-0x0000000000570000-0x00000000006BA000-memory.dmpFilesize
1.3MB
-
memory/2160-148-0x0000000000000000-mapping.dmp
-
memory/2160-154-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/2604-130-0x0000000000000000-mapping.dmp
-
memory/2712-133-0x0000000000000000-mapping.dmp
-
memory/2732-145-0x0000000000000000-mapping.dmp
-
memory/2732-155-0x0000000001760000-0x00000000018AA000-memory.dmpFilesize
1.3MB
-
memory/2764-127-0x0000000000000000-mapping.dmp
-
memory/3176-246-0x0000000000000000-mapping.dmp
-
memory/3304-178-0x0000000004DF0000-0x0000000006086000-memory.dmpFilesize
18.6MB
-
memory/3304-162-0x0000000000000000-mapping.dmp
-
memory/3464-230-0x0000000008180000-0x0000000008181000-memory.dmpFilesize
4KB
-
memory/3464-245-0x0000000000F93000-0x0000000000F94000-memory.dmpFilesize
4KB
-
memory/3464-232-0x0000000000F92000-0x0000000000F93000-memory.dmpFilesize
4KB
-
memory/3464-231-0x0000000000F90000-0x0000000000F91000-memory.dmpFilesize
4KB
-
memory/3464-218-0x0000000000000000-mapping.dmp
-
memory/3464-227-0x0000000007800000-0x0000000007801000-memory.dmpFilesize
4KB
-
memory/3468-186-0x00007FF68BDE5FD0-mapping.dmp
-
memory/3468-195-0x0000000000E20000-0x0000000000FC0000-memory.dmpFilesize
1.6MB
-
memory/3468-196-0x000001AC56120000-0x000001AC562D1000-memory.dmpFilesize
1.7MB
-
memory/3496-116-0x0000000000000000-mapping.dmp
-
memory/3612-152-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/3612-151-0x0000000001F40000-0x0000000001F66000-memory.dmpFilesize
152KB
-
memory/3612-121-0x0000000000000000-mapping.dmp
-
memory/3652-244-0x0000000000000000-mapping.dmp
-
memory/3704-137-0x0000000000000000-mapping.dmp
-
memory/3860-193-0x0000000007350000-0x0000000007351000-memory.dmpFilesize
4KB
-
memory/3860-201-0x0000000007980000-0x0000000007981000-memory.dmpFilesize
4KB
-
memory/3860-205-0x00000000083D0000-0x00000000083D1000-memory.dmpFilesize
4KB
-
memory/3860-189-0x0000000000000000-mapping.dmp
-
memory/3860-207-0x0000000008480000-0x0000000008481000-memory.dmpFilesize
4KB
-
memory/3860-212-0x0000000009AE0000-0x0000000009AE1000-memory.dmpFilesize
4KB
-
memory/3860-213-0x0000000009060000-0x0000000009061000-memory.dmpFilesize
4KB
-
memory/3860-214-0x0000000006E90000-0x0000000006E91000-memory.dmpFilesize
4KB
-
memory/3860-203-0x0000000007A20000-0x0000000007A21000-memory.dmpFilesize
4KB
-
memory/3860-217-0x00000000013C3000-0x00000000013C4000-memory.dmpFilesize
4KB
-
memory/3860-202-0x0000000007C30000-0x0000000007C31000-memory.dmpFilesize
4KB
-
memory/3860-204-0x0000000008040000-0x0000000008041000-memory.dmpFilesize
4KB
-
memory/3860-200-0x0000000007A60000-0x0000000007A61000-memory.dmpFilesize
4KB
-
memory/3860-199-0x0000000007250000-0x0000000007251000-memory.dmpFilesize
4KB
-
memory/3860-198-0x00000000013C2000-0x00000000013C3000-memory.dmpFilesize
4KB
-
memory/3860-197-0x00000000013C0000-0x00000000013C1000-memory.dmpFilesize
4KB
-
memory/3860-192-0x0000000001380000-0x0000000001381000-memory.dmpFilesize
4KB
-
memory/3872-115-0x0000000000400000-0x0000000000919000-memory.dmpFilesize
5.1MB
-
memory/3872-114-0x0000000002560000-0x0000000002641000-memory.dmpFilesize
900KB
-
memory/4016-167-0x0000000000000000-mapping.dmp
-
memory/4020-160-0x0000000000000000-mapping.dmp
-
memory/4028-144-0x0000000000000000-mapping.dmp
-
memory/4032-117-0x0000000000000000-mapping.dmp