Analysis

  • max time kernel
    150s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    22-09-2021 07:45

General

  • Target

    AW QUOTE 21505 HQ1-Scan-068703_PDF.exe

  • Size

    1.1MB

  • MD5

    8a13608bb749ecaead86683f640007ef

  • SHA1

    c72f47b7a5c636b6ca58fbcf65a1d5bfeddada3d

  • SHA256

    e6e8bb23ac6b68e1d48dd81f6012451d62b292fda9140e6012fe9702ab283732

  • SHA512

    adefe0c05316a015d20c7aac8a394671b32c5b0f662103e74578a1149e1b053316a355c9999d5021802c6892d74d6072093979f0c7bd7592311dc3e94d9d1d9d

Malware Config

Extracted

Family

remcos

Version

3.2.1 Pro

Botnet

RemoteHost

C2

103.156.92.178:7006

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    windows.exe

  • copy_folder

    task manager

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    AppData-XFQ8F4

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Windows update

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Detected potential entity reuse from brand microsoft.
  • Suspicious use of SetThreadContext 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AW QUOTE 21505 HQ1-Scan-068703_PDF.exe
    "C:\Users\Admin\AppData\Local\Temp\AW QUOTE 21505 HQ1-Scan-068703_PDF.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Users\Admin\AppData\Local\Temp\AW QUOTE 21505 HQ1-Scan-068703_PDF.exe
      "{path}"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1784
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
        3⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:1380
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\task manager\windows.exe"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:436
          • C:\Users\Admin\AppData\Roaming\task manager\windows.exe
            "C:\Users\Admin\AppData\Roaming\task manager\windows.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:908
            • C:\Users\Admin\AppData\Roaming\task manager\windows.exe
              "{path}"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1840
              • \??\c:\program files\internet explorer\iexplore.exe
                "c:\program files\internet explorer\iexplore.exe"
                7⤵
                  PID:1612
                • C:\Windows\SysWOW64\svchost.exe
                  C:\Windows\SysWOW64\svchost.exe
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1828
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
                    8⤵
                    • Modifies Internet Explorer settings
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: GetForegroundWindowSpam
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SetWindowsHookEx
                    PID:1500
                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:275457 /prefetch:2
                      9⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of SetWindowsHookEx
                      PID:1792
                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:406543 /prefetch:2
                      9⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of SetWindowsHookEx
                      PID:984
                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:668686 /prefetch:2
                      9⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of SetWindowsHookEx
                      PID:1760
                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:668709 /prefetch:2
                      9⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of SetWindowsHookEx
                      PID:1632
                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:734235 /prefetch:2
                      9⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of SetWindowsHookEx
                      PID:2432
                • C:\Windows\SysWOW64\svchost.exe
                  C:\Windows\SysWOW64\svchost.exe
                  7⤵
                    PID:1444
                  • C:\Users\Admin\AppData\Roaming\task manager\windows.exe
                    "C:\Users\Admin\AppData\Roaming\task manager\windows.exe" /stext "C:\Users\Admin\AppData\Local\Temp\qvmomqstvdbxyvovcfdaukkutlx"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    PID:932
                  • C:\Users\Admin\AppData\Roaming\task manager\windows.exe
                    "C:\Users\Admin\AppData\Roaming\task manager\windows.exe" /stext "C:\Users\Admin\AppData\Local\Temp\apsgnjdvjltkijlzlqqbxpflcrhdvrx"
                    7⤵
                    • Executes dropped EXE
                    PID:1968
                  • C:\Users\Admin\AppData\Roaming\task manager\windows.exe
                    "C:\Users\Admin\AppData\Roaming\task manager\windows.exe" /stext "C:\Users\Admin\AppData\Local\Temp\crxzobnoxtlplpzddakdicsulgzmwcnjdx"
                    7⤵
                    • Executes dropped EXE
                    PID:2000
                  • C:\Windows\SysWOW64\svchost.exe
                    C:\Windows\SysWOW64\svchost.exe
                    7⤵
                      PID:1204
                    • C:\Windows\SysWOW64\svchost.exe
                      C:\Windows\SysWOW64\svchost.exe
                      7⤵
                        PID:1612
                      • C:\Windows\SysWOW64\svchost.exe
                        C:\Windows\SysWOW64\svchost.exe
                        7⤵
                          PID:1288
                        • C:\Windows\SysWOW64\svchost.exe
                          C:\Windows\SysWOW64\svchost.exe
                          7⤵
                            PID:2324
                          • C:\Windows\SysWOW64\svchost.exe
                            C:\Windows\SysWOW64\svchost.exe
                            7⤵
                              PID:2444
                            • C:\Windows\SysWOW64\svchost.exe
                              C:\Windows\SysWOW64\svchost.exe
                              7⤵
                                PID:2704
                              • C:\Windows\SysWOW64\svchost.exe
                                C:\Windows\SysWOW64\svchost.exe
                                7⤵
                                  PID:2696
                                • C:\Windows\SysWOW64\svchost.exe
                                  C:\Windows\SysWOW64\svchost.exe
                                  7⤵
                                    PID:2712

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Persistence

                      Registry Run Keys / Startup Folder

                      1
                      T1060

                      Defense Evasion

                      Modify Registry

                      2
                      T1112

                      Credential Access

                      Credentials in Files

                      1
                      T1081

                      Discovery

                      System Information Discovery

                      1
                      T1082

                      Collection

                      Data from Local System

                      1
                      T1005

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3
                        MD5

                        ff653377521bcd092209ef2805deefa6

                        SHA1

                        2a2e1bb465275fca6a15ee436321a543f2e8a47f

                        SHA256

                        80f234ad79398b65cda97a414b1580d101e82aa55ca3851ced5ae5a4a7fd1f30

                        SHA512

                        e80755fc2e250085910c27ef376017f9ab49bdda0a7b4144eb1e617bd7871880be553608af6c250775f3929501044f1fcd5a46727df759cfa9dfb9d35e673aa8

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1
                        MD5

                        c981829fd9a6466fed2a569b4759cb69

                        SHA1

                        44381574795d103f1f1fead9656a25a8ca5fe476

                        SHA256

                        00cb7275f1cce7de89a5c7778409fb3b111f93ef50c3e78f55f26878e6fe857d

                        SHA512

                        ee32a0e527fcb51bea149b3ada4a70bcd18a753cc1d2c5c8a4799b8e801f4dd0875b465f409f6697a795c090fd49d26cf063b338cf8deb9dcadec42110e800fa

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
                        MD5

                        e4a68ac854ac5242460afd72481b2a44

                        SHA1

                        df3c24f9bfd666761b268073fe06d1cc8d4f82a4

                        SHA256

                        cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

                        SHA512

                        5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                        MD5

                        ab5c36d10261c173c5896f3478cdc6b7

                        SHA1

                        87ac53810ad125663519e944bc87ded3979cbee4

                        SHA256

                        f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9

                        SHA512

                        e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
                        MD5

                        38bdfed7f2a6b2923608e3eeb1214ae0

                        SHA1

                        94278781090bd2cb7691f8b16f4f1a89cb6860d6

                        SHA256

                        769aa6f3b4747bd5bdb049065c45f8e294bf0bf8d84cf8f3fdb49210e35f1b10

                        SHA512

                        029cb5c9ceb8bafcd5e5792f07094b4baaa9907a1150ea9051f02b2dc39c5fd0a64ba4e1c52ce27a86353d8ffdf179e21455398a49b0f9a2834d427b09b11d8c

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3
                        MD5

                        849c8fa341937b55e635423bd346facc

                        SHA1

                        3adfafd427ac4950cd69c3dfc3b6a2f26f8a616a

                        SHA256

                        c05cc5047bfac600fc3745e82b9750307b086278f2f0e4a6a77125fbb028c9ac

                        SHA512

                        db53c72f03a8b3bba62d39b79a8d242466434b7f8146ca317de5d9800385dbaf9f8c838360d517c06e4cf56a6b8696853cb75e43f88ccd0e34c27a4add37cf63

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1
                        MD5

                        83d7a565e4017ca32163f7ca75da13b6

                        SHA1

                        0d26e1cf2791ece935629096e82f7b214fc4cf48

                        SHA256

                        1b9334e9073a2c76ffd9d465176f5569e4b663bdea4b0825825b6aff9c107580

                        SHA512

                        3d1721dc22c2c429702772b399d66cf155351f8ead3bf37205be5623c52a3cc2266d74cff6dc35b5a4a71ebf26f5921a961a8ae26096ed82577948b74a0bb75e

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
                        MD5

                        0bd10a06fb4e0db90d494431205a21d7

                        SHA1

                        cde0ac97f72fdb7e539919e4048ff2bc4a01303b

                        SHA256

                        bb374053d0b71feeae247295be4fac50c8bc16e2337b49536a6100dd45d82b0e

                        SHA512

                        2ec4796e4911af96b49fb8cd8f87b30b4caa07464685d2ecf941c0189dfeb193d76ce0a5764476415d4dc17ed7cae89f147be5f63247590273b96037d27ad33b

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
                        MD5

                        53c66eb32d82e3faa7f267ad72e2f34d

                        SHA1

                        154a2cdb1072ac4c5d52a0feaeeee9a2ac008eb1

                        SHA256

                        d56659371d4b4fc492151ed3c196dbb90bc98059f7630fcdc2f154b966654262

                        SHA512

                        bef371ee6b673138885cc5846943c326e6354c2e5cb35f5bd88e094778e0d2c7df9fec75b8008db4cc2d897e6293978aff00cdb305971484dac900b81136b8d4

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                        MD5

                        50e37e7e3f9d063f763638e9cce43413

                        SHA1

                        c6e1fdd7389d42b0924936229f6d7ac5901914be

                        SHA256

                        e1275f96f8724957a31d1a8d5a9e7c38cff9e3d605ed182e9b8c84dfdf2e46f0

                        SHA512

                        2fdd13cbe0e2e88a24696cce9d8b4d60d1e374cef83d1558d5cb177013b41d26961fbac47050372e9aa49c3194b17f8893f49be060ac78c99368fd63be876445

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                        MD5

                        92542cb2f2a8883be680cfcd24c34bc3

                        SHA1

                        3d1c98251b309ebed7c24b0052223d2eb165c401

                        SHA256

                        abf3fd8f35e82a2a1ccd8add9b06b207953c7a2f87281a9f85321e47b456ebc0

                        SHA512

                        4e1a46070d8d45ada3bc9644ef72a586663b5dfdbf32023a7b21012018245e96ad4e312ad689e45802c5e02d70014913a1f2420c2a44bd01a9b6eb82b3139192

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                        MD5

                        fda7aa8db6811bed5956a5c07da9b94e

                        SHA1

                        ea55b99aaf868feb28d641d47a81271545d2cb84

                        SHA256

                        8e6dd40114ab499b33c14b28dce193070162d8254a583aab2979095961537164

                        SHA512

                        e4540cc330e86b0f31a31b1f3d885056d534a743cf819716c1265ba7bfd0285d385c4529352f0ec74da8332ec5f40b859659aebc7120637f7abe376aac0af8de

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                        MD5

                        67020dea4146604a9562f0148e17860f

                        SHA1

                        a6e349b24a0349c114bd4370c082967c2800e527

                        SHA256

                        1440e803d74383699b665a1704d9b04b33c7821dc55f492c11b1c3724569fd7d

                        SHA512

                        1bb317f5ba646cc17016a7a185867059bebcfe5836abe7ab92ac4c9b9fd07aca5e11296f815aed119b224671bce7a3f59c929433fad5f9fb7b6b8fca34892c48

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                        MD5

                        3d4a8f3cd2a98d7c4e2a9f0f12611233

                        SHA1

                        d1c71a66f3a3b5456757402550744cba50e95605

                        SHA256

                        d3064f09f791143711e98ddbb8def59f763a3e5b6c01d5eea7eba26c9d3de21a

                        SHA512

                        58657e01b51550906596674617fb5ce3d13e831e30ca18afc3932d035493eaabc4dd6d701095d97af97cd02e8e6107298c9dbca3fa59da423e38fb8813c15441

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                        MD5

                        81c32f3418921f6957499208c2e9c93f

                        SHA1

                        3a34531e1dc9b333b3b35ea36f8adbbff03c5e2f

                        SHA256

                        f7b73dd317f0922cc8806515a359f3935d1cbd944a574b1942a8a70d2887f7a7

                        SHA512

                        08de602f9bd570fd0878d658bf0f708ef01379ce9baf25fc518231b9702b46d4ea2753093515c1448c7b31af5da7d160488a954b8759660836337896e459a867

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                        MD5

                        6dfd75e52d53aa019178402b3967adbb

                        SHA1

                        ed54c8699d2aa0680453eb2947540b49712b09b7

                        SHA256

                        a842033108715b582c4bbf313fe0469cb444362bf8d5323913a59b06a927670c

                        SHA512

                        61ed560586099f87c3e702a61c4da3f0f59c51d97ffdfc3cee9275053fb598229ff82dc97482fbc0ce2595f7bdd07681c2feee6e9157014aaee4c97e2cfed552

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
                        MD5

                        7ebf492f83736510aa6074cd5a46b871

                        SHA1

                        3c5ff3d3c5ec19dd10a4226585ed4fd8d3f303f6

                        SHA256

                        75f5c35133f6f6dc2129247e583b16f25a4f49e5e80838c7b290231871e9b077

                        SHA512

                        e7df5cb4c1a36395c767186bf6ab8f502276f734f3490bc74373b6a486b1c8bf45a964c31f77d3fde5192a698ca8066daf2461d61dc94434e00c808b8d73386c

                      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\wkz58mr\imagestore.dat
                        MD5

                        f8a6d326db61533d381935723268da08

                        SHA1

                        01de838cac68cea9d1e077c32d5f376097988f6b

                        SHA256

                        e103b9a0c397844f61c1d530ced532bd5cbad5782025fc04c9c780c8e9c2df41

                        SHA512

                        f9c93ed0ec52b961775036e64e70a4e49150feeacab2af8bb3a6326633d00582c2931f726e87d850e4597cbe53ad3397d755b408425920b4007ba1194ebc7c46

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\20FS0QLA\12971179[1].jpg
                        MD5

                        0e4994ae0e03d9611e7655286675f156

                        SHA1

                        e650534844a7197b328371318f288ae081448a97

                        SHA256

                        07b979b12f1cb506df7675efe227a2e78accfa1f5954af2b7bb66295e5cf881c

                        SHA512

                        07aaae5347fa8e82f86d0ba7c28127fac952d84bad3dce119654b5ba1cd2550c8d064770473f34f89fc383847b2f1594b3600d9fd01e6275d67868c41638e34a

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\20FS0QLA\24882762[1].jpg
                        MD5

                        ca711d527e0e1be012a3105699592812

                        SHA1

                        f02534ce002f6d734a897491a1ebcc825da565c7

                        SHA256

                        e68e548a3cc404e84af3fd7529c21d64a238ba5d0857feb8fa1652b439b36e6f

                        SHA512

                        a56a1266a76ee7c95424f5beaed9d65ea569e7d187beae3c4bc1fb3a018ac728f419a2b08b62c51a70e18ee82d54e1d7714092e609135bb455060ab7d01830b5

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\20FS0QLA\2672110[1].png
                        MD5

                        7dc91895d24c825c361387611f6593e9

                        SHA1

                        fc0d26031ba690ac7748c759c35005fe627beb8f

                        SHA256

                        f37ad9b56d806d06267f9a290196dfe4200edb7729b41d789b8f1ec8adc5cdbf

                        SHA512

                        ba27fdbf02294cc78ede7972f20da383c20027ab172a4ea6ad5006ff58e404032d92f875e642dfe73985428c28bbbe1befc546c2666a672afacf23195425d7c2

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\20FS0QLA\31348972[1].jpg
                        MD5

                        c09597bbae67e58e38228f9e8fa06175

                        SHA1

                        85aec568955ad5d9165364d37a9a141dd899eca9

                        SHA256

                        f62142fd084d46df32d9d8a340855fcb17b14376c36549b825670451ea7cae73

                        SHA512

                        b7592dcf34487e3ddbffd32e8d03cb5665330f8f687e10f39f16c67673238e340cf4633b8e921932c65e3c891286349378bb70ad9a8026046653c4cf8fa2efff

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\20FS0QLA\3bb4018f.site-ltr[1].css
                        MD5

                        0cc207b5e2134cef689288c5df5d945d

                        SHA1

                        394f88591e6b5affa1d4c64e8b621a54d4f74aa9

                        SHA256

                        78e1ff94196648506f0e8eca96115660d7a7784a0a05852873d77af6694e51de

                        SHA512

                        77692d89bdb8e49c77ae161975af8fc323159877a1168a7305d80ebe6aeb83b56a8e09a3c90e3c87e570bdd13e8753af4a0fdcd7ddd3da8d60970ab01b202344

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\20FS0QLA\jsll-4[1].js
                        MD5

                        211e123b593464f3fef68f0b6e00127a

                        SHA1

                        0fae8254d06b487f09a003cb8f610f96a95465d1

                        SHA256

                        589303ca15fba4fe95432dbb456ff614d0f2ad12d99f8671f0443a7f0cf48dff

                        SHA512

                        dad54d7941a7588675ea9dd11275a60fb6290e1582d1c7a4acb50642af3c2a4aa35e32edd8fa9dd01ce7fd777247d2706d5672a201633bf918b525936e93b14b

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\324ZA0K5\5cce29c0.deprecation[1].js
                        MD5

                        55bb21475c9d3a6d3c00f2c26a075e7d

                        SHA1

                        59696ef8addd5cfb642ad99521a8aed9420e0859

                        SHA256

                        3ceddaf5a1ed02614ec6b4edd5881a3ffb7ec08116154dff8eb9897230bf5e59

                        SHA512

                        35261ddaf86da82d27a29f39a7c6074a5f0e66f5b0a8098c7502289fb70b186371a7fe71410baab6cc6b726e9338afecee9f8bb075047a055723fb5e2f09b9c7

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\324ZA0K5\MathJax[1].js
                        MD5

                        7a3737a82ea79217ebe20f896bceb623

                        SHA1

                        96b575bbae7dac6a442095996509b498590fbbf7

                        SHA256

                        002a60f162fd4d3081f435860d408ffce6f6ef87398f75bd791cadc8dae0771d

                        SHA512

                        e0d1f62bae160008e486a6f4ef8b57aa74c1945980c00deb37b083958f4291f0a47b994e5fdb348c2d4618346b93636ce4c323c6f510ab2fbd7a6547359d28d5

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\324ZA0K5\app-could-not-be-started[1].png
                        MD5

                        522037f008e03c9448ae0aaaf09e93cb

                        SHA1

                        8a32997eab79246beed5a37db0c92fbfb006bef2

                        SHA256

                        983c35607c4fb0b529ca732be42115d3fcaac947cee9c9632f7cacdbdecaf5a7

                        SHA512

                        643ec613b2e7bdbb2f61e1799c189b0e3392ea5ae10845eb0b1f1542a03569e886f4b54d5b38af10e78db49c71357108c94589474b181f6a4573b86cf2d6f0d8

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\324ZA0K5\repair-tool-changes-complete[1].png
                        MD5

                        512625cf8f40021445d74253dc7c28c0

                        SHA1

                        f6b27ce0f7d4e48e34fddca8a96337f07cffe730

                        SHA256

                        1d4dcee8511d5371fec911660d6049782e12901c662b409a5c675772e9b87369

                        SHA512

                        ae02319d03884d758a86c286b6f593bdffd067885d56d82eeb8215fdcb41637c7bb9109039e7fbc93ad246d030c368fb285b3161976ed485abc5a8df6df9a38c

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\324ZA0K5\repair-tool-no-resolution[1].png
                        MD5

                        240c4cc15d9fd65405bb642ab81be615

                        SHA1

                        5a66783fe5dd932082f40811ae0769526874bfd3

                        SHA256

                        030272ce6ba1beca700ec83fded9dbdc89296fbde0633a7f5943ef5831876c07

                        SHA512

                        267fe31bc25944dd7b6071c2c2c271ccc188ae1f6a0d7e587dcf9198b81598da6b058d1b413f228df0cb37c8304329e808089388359651e81b5f3dec566d0ee0

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\324ZA0K5\repair-tool-recommended-changes[1].png
                        MD5

                        3062488f9d119c0d79448be06ed140d8

                        SHA1

                        8a148951c894fc9e968d3e46589a2e978267650e

                        SHA256

                        c47a383de6dd60149b37dd24825d42d83cb48be0ed094e3fc3b228d0a7bb9332

                        SHA512

                        00bba6bcbfbf44b977129594a47f732809dce7d4e2d22d050338e4eea91fcc02a9b333c45eeb4c9024df076cbda0b46b621bf48309c0d037d19bbeae0367f5ed

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BFJBPSVS\SegoeUI-Roman-VF_web[1].woff
                        MD5

                        9681ce357ba1f36c1857c537e836c731

                        SHA1

                        5016de608a6454af21dd7c83ac1bf6dbeecdb902

                        SHA256

                        f12bf457762d19a0af14283a631bc2a6fd9182fc29860b2be5dbb247936056a1

                        SHA512

                        6915db2d90c585f8bc572aef58830ab918d36b7cddb95344045953dfdf0786945bf9830f94cff5d2a8c6accf42410a012ba2cf8151cab18b0013c712702f07a9

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BFJBPSVS\TeX-AMS_CHTML[1].js
                        MD5

                        a7d2b67197a986636d79842a081ea85e

                        SHA1

                        b5e05ef7d8028a2741ec475f21560cf4e8cb2136

                        SHA256

                        9e0394a3a7bf16a1effb14fcc5557be82d9b2d662ba83bd84e303b4bdf791ef9

                        SHA512

                        ad234df68e34eb185222c24c30b384201f1e1793ad6c3dca2f54d510c7baa67eabdc39225f10e6b783757c0db859ce2ea32d6e78317c30a02d1765aee9f07109

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BFJBPSVS\latest[1].woff
                        MD5

                        6237055cf17409602a5306ad1dd27d41

                        SHA1

                        2eba7a19baef802ee4c0408d8cb3083cbb974301

                        SHA256

                        75ef750fbca3b07aafa26272e6bc53f357dbd73b99bcc29c6a6030cfa71b5b2e

                        SHA512

                        b35b3bf91cd4d38d8f2c2bb28dfa257ff4290e9fd2436895c99c8728919a89a09ecea7f999a3916b4dd89b78b4baeea25478e4d957ef0b693cfe8e43ae55d5c7

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K8CH4PHC\ab05050c.index-docs[1].js
                        MD5

                        9f5759e30866f25b0fd72bf0a7253989

                        SHA1

                        ddb0b05998d9567c5933a624844781010e63b595

                        SHA256

                        1b857475b083bc0c34feb5d2dd90a2e013ed865042354dab015486a12339952a

                        SHA512

                        fb3057de1a92319dc008e57f620480e335a1437419ce9e8e01afa3cc02a91639d4c741f1ed3d929892e411b75aa5ce5e3eea1532a648227874c418fc45851821

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K8CH4PHC\application-not-started[1].htm
                        MD5

                        07eab4817b0cb514fafbef00a8eb48b1

                        SHA1

                        40bf18c2b3a2f266302bdcfee7b6238672c44752

                        SHA256

                        7e3b27ffc2598d6a4d500ebd19de75611c029fbddffbd21371aaf5c5b9a818de

                        SHA512

                        a25a4e21f51bbe1a1a9075d638a4c8f47bf4d330f8fc9c401dca11cf5f8df262ff274e256a14b0d724e5c537fa16f156534d92db0a0e3304a4c4b85f22ec9fe3

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K8CH4PHC\docons.b9051540[1].eot
                        MD5

                        574428b8121dfb2205fa5d8eb9051540

                        SHA1

                        06af6c3ba02a9c27a293e85cafe840b8af5c0b1a

                        SHA256

                        5694b997eb999dfb7b782d13c9aa7ddac5f6b40bdcfb1b59c2fb2bed18ab8c52

                        SHA512

                        f5e08eb717ad86a092dca4235e15b46ea80cb2882ee51c049d6409ac48bfc85b61b8d98f408ad6eaff73f423071e35322fd55d016a1c81596f6530fa526bd7c5

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K8CH4PHC\favicon[1].ico
                        MD5

                        12e3dac858061d088023b2bd48e2fa96

                        SHA1

                        e08ce1a144eceae0c3c2ea7a9d6fbc5658f24ce5

                        SHA256

                        90cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21

                        SHA512

                        c5030c55a855e7a9e20e22f4c70bf1e0f3c558a9b7d501cfab6992ac2656ae5e41b050ccac541efa55f9603e0d349b247eb4912ee169d44044271789c719cd01

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K8CH4PHC\install-3-5[1].png
                        MD5

                        f6ec97c43480d41695065ad55a97b382

                        SHA1

                        d9c3d0895a5ed1a3951b8774b519b8217f0a54c5

                        SHA256

                        07a599fab1e66babc430e5fed3029f25ff3f4ea2dd0ec8968ffba71ef1872f68

                        SHA512

                        22462763178409d60609761a2af734f97b35b9a818ec1fd9046afab489aad83ce34896ee8586efe402ea7739ecf088bc2db5c1c8e4fb39e6a0fc5b3adc6b4a9b

                      • C:\Users\Admin\AppData\Local\Temp\install.vbs
                        MD5

                        631dbf620f0baf84cb6f65188a82f684

                        SHA1

                        c19a72c768f5850df304f8f2c83e8fcb86e400e9

                        SHA256

                        52ae78f718ed72d0f4abb53023913f2ef6a89fc282d7efb93700723b8a62ee46

                        SHA512

                        c4f242cc1106bdf74a2f596dd36c4728c3bdb9e7352451c38e5d51a32c33a7b845e8bc49110ea15d8861e6c66cb79631276b40aaf41ee2e439c378ae88b6e69f

                      • C:\Users\Admin\AppData\Local\Temp\qvmomqstvdbxyvovcfdaukkutlx
                        MD5

                        f3b25701fe362ec84616a93a45ce9998

                        SHA1

                        d62636d8caec13f04e28442a0a6fa1afeb024bbb

                        SHA256

                        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                        SHA512

                        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\B6N4Q7YV.txt
                        MD5

                        ab7d4c05b0b7381ee175edd88198a4bf

                        SHA1

                        bd9716c00610eb9d92cea064fc64b13a33c75ec6

                        SHA256

                        df1e7ab1df24bf48f7b1d0421c12254e49b81ce4242b6dc816adfe4b9a25fb34

                        SHA512

                        b6b343eba2a4b04b29fc1622092e30007978216593a3cdf9651ee105c65804827c3fccb459c5ab40957914ef4fd70801c42540d8db2421ef1bfa6ac74d17bae2

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JGY8RH0G.txt
                        MD5

                        90afc361031df69f3d38b4dca0e761e6

                        SHA1

                        9f4ed98f4ac429c9f9f7eb99d3fca801c1742fe6

                        SHA256

                        902f743d62f087e2b2cef05f82654fc759aa08da1de423d3fa523cb5482296ac

                        SHA512

                        9a1cd9f603454d428bebd65ca9c7e606ab8a60332155ddfed4fdd11ea9800e2bc7d8ca915b70c9fc1092668bd2ceb6932b2807bd5aaa17dae63783f7be1a65e1

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\P1AHRLU7.txt
                        MD5

                        2151f5d5cd39d5ebce9470364873ecd6

                        SHA1

                        3d2ee1388eb217bb248513f255d23335ad634099

                        SHA256

                        ee561bfa5dd77fa5db20f8a1433a6694207505d7b6b5343cdd96f3950d9f4be8

                        SHA512

                        a9c4e94ecde3316f6e52a0f917f9f5cd24cc974ad8d49950c425a5d4f795a4da8baf05279d17d6863bb230b01a25f2c8348d5e31ccd1dd6e0751041332dcd37f

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PKF0I6LR.txt
                        MD5

                        266b50e1e6bf2ad0d97416d30f7f38ff

                        SHA1

                        2f61b6150b3c34fb97cb74a5ddfdd0009f858719

                        SHA256

                        75099afc415c5f707b8b0237fb5db8f28e725d145ab96b0551af79c62a53314e

                        SHA512

                        0360fef12570c4c2606c032c02700924f85b4d028fe096acad5c4e758db42709ebb8deaea75eb5dd7bb84cb27a36dc8f4dcac044a46db985938d74e5202a5547

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Q5NNTQ0O.txt
                        MD5

                        3e78cd1aaa3af71bbd3004a152fc3814

                        SHA1

                        591c923d7296098a6c388cb93793c10b6ec607b1

                        SHA256

                        384aa194465a44170732b36290cc7b3cbf4c24e4078d355f562c85d8847d62a5

                        SHA512

                        67ec56d113e0ffcfae4542d628fdecd9b215013217353997511388f8007457bde8c1d003205bdb2a1c2d79a9bce1c2871491d35b5b255a542e86041d8d120a3a

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QMNIC72I.txt
                        MD5

                        e0a35c428f6fc2b3f4682f5c0fb15571

                        SHA1

                        005e494f60c555b2e472ed3384eeef192f310129

                        SHA256

                        8af74ebb0af9b1dc698b4834dc331c1d707505280378994e091fe03ce5a85e62

                        SHA512

                        0cc79e2ceef6e0b9184ae280ce34cc4322246ca5aad9bb5c8e8f0502dbbe30a5435dd7f96562be2cd77b5e8ba9eed52696cb7a689a4e29a738b695ab5d465ba1

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TONJ4TZ6.txt
                        MD5

                        384f04528603369ff787155baeb444d9

                        SHA1

                        81ddb13b5865bb96b857227fedca53d89bccab63

                        SHA256

                        4158b68dc6119ff5768d1c3c26a040f39f62978c99962149a7fd1ab138bfe4e2

                        SHA512

                        0158510a3eecf7c869be655f20b5540d601eed06aca691040d85d6b7fdb059972b96f289529efe90d2e26482e985ace75e0a0eacc9f58928ebabe3fffe955076

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UV7Z7GXR.txt
                        MD5

                        6cfc2fd147e2b2d1790a779f1878af29

                        SHA1

                        05bd85de203b90fd674a659f9897366733ec0c95

                        SHA256

                        ab7cce92988ade2b092432d0bce4ab5872560160e3b78e0f40b1483bf8a39576

                        SHA512

                        ec8d592d1a035ce7eab0f5d9c4813a888b707d3ed461de9cb60b2235df44dac3895f928767d201d6a489a8463d913997dc87b6eccff8197578ed507d38e39acb

                      • C:\Users\Admin\AppData\Roaming\task manager\windows.exe
                        MD5

                        8a13608bb749ecaead86683f640007ef

                        SHA1

                        c72f47b7a5c636b6ca58fbcf65a1d5bfeddada3d

                        SHA256

                        e6e8bb23ac6b68e1d48dd81f6012451d62b292fda9140e6012fe9702ab283732

                        SHA512

                        adefe0c05316a015d20c7aac8a394671b32c5b0f662103e74578a1149e1b053316a355c9999d5021802c6892d74d6072093979f0c7bd7592311dc3e94d9d1d9d

                      • C:\Users\Admin\AppData\Roaming\task manager\windows.exe
                        MD5

                        8a13608bb749ecaead86683f640007ef

                        SHA1

                        c72f47b7a5c636b6ca58fbcf65a1d5bfeddada3d

                        SHA256

                        e6e8bb23ac6b68e1d48dd81f6012451d62b292fda9140e6012fe9702ab283732

                        SHA512

                        adefe0c05316a015d20c7aac8a394671b32c5b0f662103e74578a1149e1b053316a355c9999d5021802c6892d74d6072093979f0c7bd7592311dc3e94d9d1d9d

                      • C:\Users\Admin\AppData\Roaming\task manager\windows.exe
                        MD5

                        8a13608bb749ecaead86683f640007ef

                        SHA1

                        c72f47b7a5c636b6ca58fbcf65a1d5bfeddada3d

                        SHA256

                        e6e8bb23ac6b68e1d48dd81f6012451d62b292fda9140e6012fe9702ab283732

                        SHA512

                        adefe0c05316a015d20c7aac8a394671b32c5b0f662103e74578a1149e1b053316a355c9999d5021802c6892d74d6072093979f0c7bd7592311dc3e94d9d1d9d

                      • C:\Users\Admin\AppData\Roaming\task manager\windows.exe
                        MD5

                        8a13608bb749ecaead86683f640007ef

                        SHA1

                        c72f47b7a5c636b6ca58fbcf65a1d5bfeddada3d

                        SHA256

                        e6e8bb23ac6b68e1d48dd81f6012451d62b292fda9140e6012fe9702ab283732

                        SHA512

                        adefe0c05316a015d20c7aac8a394671b32c5b0f662103e74578a1149e1b053316a355c9999d5021802c6892d74d6072093979f0c7bd7592311dc3e94d9d1d9d

                      • C:\Users\Admin\AppData\Roaming\task manager\windows.exe
                        MD5

                        8a13608bb749ecaead86683f640007ef

                        SHA1

                        c72f47b7a5c636b6ca58fbcf65a1d5bfeddada3d

                        SHA256

                        e6e8bb23ac6b68e1d48dd81f6012451d62b292fda9140e6012fe9702ab283732

                        SHA512

                        adefe0c05316a015d20c7aac8a394671b32c5b0f662103e74578a1149e1b053316a355c9999d5021802c6892d74d6072093979f0c7bd7592311dc3e94d9d1d9d

                      • C:\Users\Admin\AppData\Roaming\task manager\windows.exe
                        MD5

                        8a13608bb749ecaead86683f640007ef

                        SHA1

                        c72f47b7a5c636b6ca58fbcf65a1d5bfeddada3d

                        SHA256

                        e6e8bb23ac6b68e1d48dd81f6012451d62b292fda9140e6012fe9702ab283732

                        SHA512

                        adefe0c05316a015d20c7aac8a394671b32c5b0f662103e74578a1149e1b053316a355c9999d5021802c6892d74d6072093979f0c7bd7592311dc3e94d9d1d9d

                      • \Users\Admin\AppData\Roaming\task manager\windows.exe
                        MD5

                        8a13608bb749ecaead86683f640007ef

                        SHA1

                        c72f47b7a5c636b6ca58fbcf65a1d5bfeddada3d

                        SHA256

                        e6e8bb23ac6b68e1d48dd81f6012451d62b292fda9140e6012fe9702ab283732

                        SHA512

                        adefe0c05316a015d20c7aac8a394671b32c5b0f662103e74578a1149e1b053316a355c9999d5021802c6892d74d6072093979f0c7bd7592311dc3e94d9d1d9d

                      • memory/436-67-0x0000000000000000-mapping.dmp
                      • memory/852-55-0x0000000004EA0000-0x0000000004EA1000-memory.dmp
                        Filesize

                        4KB

                      • memory/852-53-0x00000000012E0000-0x00000000012E1000-memory.dmp
                        Filesize

                        4KB

                      • memory/852-56-0x0000000000540000-0x000000000054E000-memory.dmp
                        Filesize

                        56KB

                      • memory/852-57-0x000000007EF40000-0x000000007EF41000-memory.dmp
                        Filesize

                        4KB

                      • memory/852-58-0x0000000007DF0000-0x0000000007EA8000-memory.dmp
                        Filesize

                        736KB

                      • memory/852-59-0x0000000005CA0000-0x0000000005D15000-memory.dmp
                        Filesize

                        468KB

                      • memory/908-72-0x0000000001150000-0x0000000001151000-memory.dmp
                        Filesize

                        4KB

                      • memory/908-74-0x0000000004D70000-0x0000000004D71000-memory.dmp
                        Filesize

                        4KB

                      • memory/908-70-0x0000000000000000-mapping.dmp
                      • memory/908-76-0x000000007EF40000-0x000000007EF41000-memory.dmp
                        Filesize

                        4KB

                      • memory/932-92-0x0000000000476274-mapping.dmp
                      • memory/932-91-0x0000000000400000-0x0000000000478000-memory.dmp
                        Filesize

                        480KB

                      • memory/932-103-0x0000000000400000-0x0000000000478000-memory.dmp
                        Filesize

                        480KB

                      • memory/984-107-0x0000000000000000-mapping.dmp
                      • memory/1204-109-0x00000000005137B6-mapping.dmp
                      • memory/1288-152-0x00000000005137B6-mapping.dmp
                      • memory/1380-63-0x0000000000000000-mapping.dmp
                      • memory/1444-89-0x00000000005137B6-mapping.dmp
                      • memory/1500-87-0x0000000000000000-mapping.dmp
                      • memory/1612-143-0x00000000005137B6-mapping.dmp
                      • memory/1632-150-0x0000000000000000-mapping.dmp
                      • memory/1760-141-0x0000000000000000-mapping.dmp
                      • memory/1784-60-0x0000000000400000-0x0000000000479000-memory.dmp
                        Filesize

                        484KB

                      • memory/1784-61-0x000000000042F71D-mapping.dmp
                      • memory/1784-62-0x0000000074B41000-0x0000000074B43000-memory.dmp
                        Filesize

                        8KB

                      • memory/1784-66-0x0000000000400000-0x0000000000479000-memory.dmp
                        Filesize

                        484KB

                      • memory/1792-90-0x0000000000000000-mapping.dmp
                      • memory/1828-84-0x00000000005137B6-mapping.dmp
                      • memory/1828-83-0x0000000000400000-0x0000000000518000-memory.dmp
                        Filesize

                        1.1MB

                      • memory/1840-80-0x000000000042F71D-mapping.dmp
                      • memory/1840-85-0x0000000000400000-0x0000000000479000-memory.dmp
                        Filesize

                        484KB

                      • memory/1968-96-0x0000000000422206-mapping.dmp
                      • memory/1968-93-0x0000000000400000-0x0000000000424000-memory.dmp
                        Filesize

                        144KB

                      • memory/2000-98-0x0000000000400000-0x0000000000457000-memory.dmp
                        Filesize

                        348KB

                      • memory/2000-100-0x0000000000455238-mapping.dmp
                      • memory/2000-104-0x0000000000400000-0x0000000000457000-memory.dmp
                        Filesize

                        348KB

                      • memory/2324-157-0x00000000005137B6-mapping.dmp
                      • memory/2432-161-0x0000000000000000-mapping.dmp
                      • memory/2444-163-0x00000000005137B6-mapping.dmp
                      • memory/2712-171-0x00000000005137B6-mapping.dmp