Analysis

  • max time kernel
    185s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-05-2022 02:46

General

  • Target

    ecb96ba977acddb3efab76321b53e4fbd7c31a6b873aca015c2cbecc01008103.exe

  • Size

    18.8MB

  • MD5

    3f585b6e93ceacfe8a68e475b86ffc60

  • SHA1

    c13519911988d0423c6c531c5ce7f2ba27394cad

  • SHA256

    ecb96ba977acddb3efab76321b53e4fbd7c31a6b873aca015c2cbecc01008103

  • SHA512

    f8245c7e729f0ec2e7b0bbf3942089fcd02021adb49d4e625faa8bfb4028b2b5ae7d9183ef3409178d3acd314df8197acc9b5560adaa9374be72099d83c04e82

Malware Config

Extracted

Family

raccoon

Botnet

c763e433ef51ff4b6c545800e4ba3b3b1a2ea077

Attributes
  • url4cnc

    https://telete.in/jbitchsucks

rc4.plain
rc4.plain

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Modifies security service 2 TTPs 1 IoCs
  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Raccoon Stealer Payload 3 IoCs
  • Executes dropped EXE 13 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 14 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecb96ba977acddb3efab76321b53e4fbd7c31a6b873aca015c2cbecc01008103.exe
    "C:\Users\Admin\AppData\Local\Temp\ecb96ba977acddb3efab76321b53e4fbd7c31a6b873aca015c2cbecc01008103.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Users\Admin\AppData\Local\Temp\is-BL0CC.tmp\ecb96ba977acddb3efab76321b53e4fbd7c31a6b873aca015c2cbecc01008103.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-BL0CC.tmp\ecb96ba977acddb3efab76321b53e4fbd7c31a6b873aca015c2cbecc01008103.tmp" /SL5="$80066,18987350,788992,C:\Users\Admin\AppData\Local\Temp\ecb96ba977acddb3efab76321b53e4fbd7c31a6b873aca015c2cbecc01008103.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe
        "C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3448
        • C:\Users\Admin\AppData\Local\Temp\is-QHUAR.tmp\Revo Uninstaller Pro 4.2.3.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-QHUAR.tmp\Revo Uninstaller Pro 4.2.3.tmp" /SL5="$401EE,14850568,138240,C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:4256
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\ProgramData\Ncpd\MMF.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:5108
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Ncpd\DisableOAVProtection.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4444
          • C:\Windows\SysWOW64\reg.exe
            reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
            5⤵
              PID:1120
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
              5⤵
                PID:1760
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
                5⤵
                  PID:3948
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
                  5⤵
                    PID:2284
                  • C:\Windows\SysWOW64\reg.exe
                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
                    5⤵
                      PID:3748
                    • C:\Windows\SysWOW64\reg.exe
                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
                      5⤵
                        PID:616
                      • C:\Windows\SysWOW64\reg.exe
                        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
                        5⤵
                          PID:4840
                        • C:\Windows\SysWOW64\reg.exe
                          reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
                          5⤵
                            PID:5096
                          • C:\Windows\SysWOW64\reg.exe
                            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
                            5⤵
                              PID:4912
                            • C:\Windows\SysWOW64\reg.exe
                              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
                              5⤵
                                PID:2512
                              • C:\Windows\SysWOW64\reg.exe
                                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
                                5⤵
                                  PID:328
                                • C:\Windows\SysWOW64\reg.exe
                                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
                                  5⤵
                                    PID:1992
                                  • C:\Windows\SysWOW64\reg.exe
                                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f
                                    5⤵
                                      PID:1892
                                    • C:\Windows\SysWOW64\reg.exe
                                      reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
                                      5⤵
                                        PID:3580
                                      • C:\Windows\SysWOW64\reg.exe
                                        reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
                                        5⤵
                                          PID:2340
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
                                          5⤵
                                            PID:3456
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                                            5⤵
                                              PID:4864
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                                              5⤵
                                                PID:4968
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                                                5⤵
                                                  PID:3340
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                                                  5⤵
                                                    PID:3276
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f
                                                    5⤵
                                                      PID:2164
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f
                                                      5⤵
                                                        PID:3320
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f
                                                        5⤵
                                                          PID:1368
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
                                                          5⤵
                                                            PID:660
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
                                                            5⤵
                                                              PID:1956
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
                                                              5⤵
                                                                PID:5072
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
                                                                5⤵
                                                                  PID:2428
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
                                                                  5⤵
                                                                    PID:1172
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
                                                                    5⤵
                                                                      PID:4536
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
                                                                      5⤵
                                                                      • Modifies security service
                                                                      PID:4600
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      reg add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f
                                                                      5⤵
                                                                        PID:4016
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
                                                                        5⤵
                                                                          PID:2392
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Ncpd\main.bat" "
                                                                        4⤵
                                                                          PID:2784
                                                                          • C:\Windows\SysWOW64\mode.com
                                                                            mode 65,10
                                                                            5⤵
                                                                              PID:4736
                                                                            • C:\ProgramData\Ncpd\7z.exe
                                                                              7z.exe e file.zip -p___________9904pwd11302pwd25907___________ -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2288
                                                                            • C:\ProgramData\Ncpd\7z.exe
                                                                              7z.exe e extracted/file_7.zip -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:5008
                                                                            • C:\ProgramData\Ncpd\7z.exe
                                                                              7z.exe e extracted/file_6.zip -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:3560
                                                                            • C:\ProgramData\Ncpd\7z.exe
                                                                              7z.exe e extracted/file_4.zip -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:3184
                                                                            • C:\ProgramData\Ncpd\7z.exe
                                                                              7z.exe e extracted/file_5.zip -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:3864
                                                                            • C:\ProgramData\Ncpd\7z.exe
                                                                              7z.exe e extracted/file_3.zip -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2656
                                                                            • C:\ProgramData\Ncpd\7z.exe
                                                                              7z.exe e extracted/file_2.zip -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:4192
                                                                            • C:\ProgramData\Ncpd\7z.exe
                                                                              7z.exe e extracted/file_1.zip -oextracted
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2600
                                                                            • C:\ProgramData\Ncpd\111222.exe
                                                                              "111222.exe"
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of SetThreadContext
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:1320
                                                                              • C:\ProgramData\Ncpd\111222.exe
                                                                                "111222.exe"
                                                                                6⤵
                                                                                • Executes dropped EXE
                                                                                PID:2232
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 488
                                                                                  7⤵
                                                                                  • Program crash
                                                                                  PID:4940
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 488
                                                                                  7⤵
                                                                                  • Program crash
                                                                                  PID:2456
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Ncpd\DiskRemoval.bat" "
                                                                            4⤵
                                                                              PID:1576
                                                                              • C:\Windows\SysWOW64\timeout.exe
                                                                                timeout /T 60 /NOBREAK
                                                                                5⤵
                                                                                • Delays execution with timeout.exe
                                                                                PID:3000
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2232 -ip 2232
                                                                        1⤵
                                                                          PID:2356

                                                                        Network

                                                                        MITRE ATT&CK Matrix ATT&CK v6

                                                                        Persistence

                                                                        Modify Existing Service

                                                                        2
                                                                        T1031

                                                                        Defense Evasion

                                                                        Modify Registry

                                                                        2
                                                                        T1112

                                                                        Disabling Security Tools

                                                                        1
                                                                        T1089

                                                                        Discovery

                                                                        Query Registry

                                                                        1
                                                                        T1012

                                                                        System Information Discovery

                                                                        2
                                                                        T1082

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe
                                                                          Filesize

                                                                          14.5MB

                                                                          MD5

                                                                          493943915518088e25f11ed7ab26e7fb

                                                                          SHA1

                                                                          3893a5d5de263f9960c34714baa41aa54a66318a

                                                                          SHA256

                                                                          3845c4e3e1e72155f95b0d3282dd6d73bd81dbf9ffc23255ffd9ad3d807bc141

                                                                          SHA512

                                                                          04426e6ea0ec491ae8185eeba9a5571c5b1363c28264588cb2ded8e57bea2065ff32237770af9efc6ee9745144cbccbd8ccceb1380a0f7cc7604e01ccbcc5637

                                                                        • C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe
                                                                          Filesize

                                                                          14.5MB

                                                                          MD5

                                                                          493943915518088e25f11ed7ab26e7fb

                                                                          SHA1

                                                                          3893a5d5de263f9960c34714baa41aa54a66318a

                                                                          SHA256

                                                                          3845c4e3e1e72155f95b0d3282dd6d73bd81dbf9ffc23255ffd9ad3d807bc141

                                                                          SHA512

                                                                          04426e6ea0ec491ae8185eeba9a5571c5b1363c28264588cb2ded8e57bea2065ff32237770af9efc6ee9745144cbccbd8ccceb1380a0f7cc7604e01ccbcc5637

                                                                        • C:\ProgramData\Ncpd\111222.exe
                                                                          Filesize

                                                                          874KB

                                                                          MD5

                                                                          453ec7e4e6e4746852cb38171f1059eb

                                                                          SHA1

                                                                          eaee0d5bb07b3d37168cf894303e0d3aeb59bfe5

                                                                          SHA256

                                                                          7f9332eb45f1c1268c4cb363ff8d284e15a9dd021839c54d78087bb319aadec6

                                                                          SHA512

                                                                          097900098322aeea60bbc204a2c061b7ca0d3c373d3717050c78de805830dad015977259a5c0d9d800e1286773458c6e9a0a7ee1b20d5f9e262fa9d096c8e704

                                                                        • C:\ProgramData\Ncpd\111222.exe
                                                                          Filesize

                                                                          874KB

                                                                          MD5

                                                                          453ec7e4e6e4746852cb38171f1059eb

                                                                          SHA1

                                                                          eaee0d5bb07b3d37168cf894303e0d3aeb59bfe5

                                                                          SHA256

                                                                          7f9332eb45f1c1268c4cb363ff8d284e15a9dd021839c54d78087bb319aadec6

                                                                          SHA512

                                                                          097900098322aeea60bbc204a2c061b7ca0d3c373d3717050c78de805830dad015977259a5c0d9d800e1286773458c6e9a0a7ee1b20d5f9e262fa9d096c8e704

                                                                        • C:\ProgramData\Ncpd\7z.dll
                                                                          Filesize

                                                                          1.6MB

                                                                          MD5

                                                                          72491c7b87a7c2dd350b727444f13bb4

                                                                          SHA1

                                                                          1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                          SHA256

                                                                          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                          SHA512

                                                                          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                                        • C:\ProgramData\Ncpd\7z.dll
                                                                          Filesize

                                                                          1.6MB

                                                                          MD5

                                                                          72491c7b87a7c2dd350b727444f13bb4

                                                                          SHA1

                                                                          1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                          SHA256

                                                                          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                          SHA512

                                                                          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                                        • C:\ProgramData\Ncpd\7z.dll
                                                                          Filesize

                                                                          1.6MB

                                                                          MD5

                                                                          72491c7b87a7c2dd350b727444f13bb4

                                                                          SHA1

                                                                          1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                          SHA256

                                                                          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                          SHA512

                                                                          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                                        • C:\ProgramData\Ncpd\7z.dll
                                                                          Filesize

                                                                          1.6MB

                                                                          MD5

                                                                          72491c7b87a7c2dd350b727444f13bb4

                                                                          SHA1

                                                                          1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                          SHA256

                                                                          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                          SHA512

                                                                          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                                        • C:\ProgramData\Ncpd\7z.dll
                                                                          Filesize

                                                                          1.6MB

                                                                          MD5

                                                                          72491c7b87a7c2dd350b727444f13bb4

                                                                          SHA1

                                                                          1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                          SHA256

                                                                          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                          SHA512

                                                                          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                                        • C:\ProgramData\Ncpd\7z.dll
                                                                          Filesize

                                                                          1.6MB

                                                                          MD5

                                                                          72491c7b87a7c2dd350b727444f13bb4

                                                                          SHA1

                                                                          1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                          SHA256

                                                                          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                          SHA512

                                                                          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                                        • C:\ProgramData\Ncpd\7z.dll
                                                                          Filesize

                                                                          1.6MB

                                                                          MD5

                                                                          72491c7b87a7c2dd350b727444f13bb4

                                                                          SHA1

                                                                          1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                          SHA256

                                                                          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                          SHA512

                                                                          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                                        • C:\ProgramData\Ncpd\7z.dll
                                                                          Filesize

                                                                          1.6MB

                                                                          MD5

                                                                          72491c7b87a7c2dd350b727444f13bb4

                                                                          SHA1

                                                                          1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                          SHA256

                                                                          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                          SHA512

                                                                          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                                        • C:\ProgramData\Ncpd\7z.dll
                                                                          Filesize

                                                                          1.6MB

                                                                          MD5

                                                                          72491c7b87a7c2dd350b727444f13bb4

                                                                          SHA1

                                                                          1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                          SHA256

                                                                          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                          SHA512

                                                                          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                                        • C:\ProgramData\Ncpd\7z.exe
                                                                          Filesize

                                                                          458KB

                                                                          MD5

                                                                          619f7135621b50fd1900ff24aade1524

                                                                          SHA1

                                                                          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                          SHA256

                                                                          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                          SHA512

                                                                          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                        • C:\ProgramData\Ncpd\7z.exe
                                                                          Filesize

                                                                          458KB

                                                                          MD5

                                                                          619f7135621b50fd1900ff24aade1524

                                                                          SHA1

                                                                          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                          SHA256

                                                                          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                          SHA512

                                                                          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                        • C:\ProgramData\Ncpd\7z.exe
                                                                          Filesize

                                                                          458KB

                                                                          MD5

                                                                          619f7135621b50fd1900ff24aade1524

                                                                          SHA1

                                                                          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                          SHA256

                                                                          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                          SHA512

                                                                          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                        • C:\ProgramData\Ncpd\7z.exe
                                                                          Filesize

                                                                          458KB

                                                                          MD5

                                                                          619f7135621b50fd1900ff24aade1524

                                                                          SHA1

                                                                          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                          SHA256

                                                                          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                          SHA512

                                                                          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                        • C:\ProgramData\Ncpd\7z.exe
                                                                          Filesize

                                                                          458KB

                                                                          MD5

                                                                          619f7135621b50fd1900ff24aade1524

                                                                          SHA1

                                                                          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                          SHA256

                                                                          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                          SHA512

                                                                          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                        • C:\ProgramData\Ncpd\7z.exe
                                                                          Filesize

                                                                          458KB

                                                                          MD5

                                                                          619f7135621b50fd1900ff24aade1524

                                                                          SHA1

                                                                          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                          SHA256

                                                                          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                          SHA512

                                                                          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                        • C:\ProgramData\Ncpd\7z.exe
                                                                          Filesize

                                                                          458KB

                                                                          MD5

                                                                          619f7135621b50fd1900ff24aade1524

                                                                          SHA1

                                                                          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                          SHA256

                                                                          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                          SHA512

                                                                          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                        • C:\ProgramData\Ncpd\7z.exe
                                                                          Filesize

                                                                          458KB

                                                                          MD5

                                                                          619f7135621b50fd1900ff24aade1524

                                                                          SHA1

                                                                          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                          SHA256

                                                                          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                          SHA512

                                                                          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                        • C:\ProgramData\Ncpd\7z.exe
                                                                          Filesize

                                                                          458KB

                                                                          MD5

                                                                          619f7135621b50fd1900ff24aade1524

                                                                          SHA1

                                                                          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                          SHA256

                                                                          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                          SHA512

                                                                          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                        • C:\ProgramData\Ncpd\DisableOAVProtection.bat
                                                                          Filesize

                                                                          136KB

                                                                          MD5

                                                                          ed77c2b2866fc09850a317f2620f4f9c

                                                                          SHA1

                                                                          ed1d7485a1111bd553ffe81927260652718a1c39

                                                                          SHA256

                                                                          763c290bbc1bfaedb53c909a63453d88204680ff6b5e50d7c68b14accc706c17

                                                                          SHA512

                                                                          4ed12352142c38750656780acf836805f3190a21aeab117e1c62fa06cf54920754c598daba3e02a981b6440261ce211e5717f6f1183cfebf6c8805d8201fa0e2

                                                                        • C:\ProgramData\Ncpd\DiskRemoval.bat
                                                                          Filesize

                                                                          211B

                                                                          MD5

                                                                          0f00552cee3a31dc4e8adc2738ca6d76

                                                                          SHA1

                                                                          85f0353b58b6749eee6b06101b05db242d44d0c2

                                                                          SHA256

                                                                          1094424ae118bb1060b5f4057c6b1d8b2eef2213bab3cf2b0a2cc6a4009552d8

                                                                          SHA512

                                                                          137c48422710fc898cfc1dd5f70f8fe2a505de030594c732255de62c73b22305acdd5340ff5a49fa8ddc3af5285f5a970158e53d0b74f9728ec0844e2587d835

                                                                        • C:\ProgramData\Ncpd\MMF.vbs
                                                                          Filesize

                                                                          67KB

                                                                          MD5

                                                                          62c210400fef1cb41efa4c8b2c963964

                                                                          SHA1

                                                                          fa471dcf721b5f61a8794a75e3a9226e79b3ec80

                                                                          SHA256

                                                                          ac5fa9691beee8045bc5b4e4ede4816339cbef901f4d7c83f70e64e8c5f10d10

                                                                          SHA512

                                                                          64d99cd6a739bee853820172b24408173c4799f6c61037ad212cb56434fba7f014f58b2f88bcd209fdfd5976a183cd3d91588fc8f274fced444e726cf8e25d5a

                                                                        • C:\ProgramData\Ncpd\extracted\111222.exe
                                                                          Filesize

                                                                          874KB

                                                                          MD5

                                                                          453ec7e4e6e4746852cb38171f1059eb

                                                                          SHA1

                                                                          eaee0d5bb07b3d37168cf894303e0d3aeb59bfe5

                                                                          SHA256

                                                                          7f9332eb45f1c1268c4cb363ff8d284e15a9dd021839c54d78087bb319aadec6

                                                                          SHA512

                                                                          097900098322aeea60bbc204a2c061b7ca0d3c373d3717050c78de805830dad015977259a5c0d9d800e1286773458c6e9a0a7ee1b20d5f9e262fa9d096c8e704

                                                                        • C:\ProgramData\Ncpd\extracted\ANTIAV~1.DAT
                                                                          Filesize

                                                                          2.0MB

                                                                          MD5

                                                                          a58cb25aacd6c7cf56dcdc26e0724367

                                                                          SHA1

                                                                          2ec8abba1fa3aec4994e1d61f564efe0de118314

                                                                          SHA256

                                                                          ea817ed58e4fc933fdcef0f9037374a452108a973016a3ac39293e0755bb164a

                                                                          SHA512

                                                                          28a3ffd97e2979574aedef54b3901618d24dfcfc19509c6566a861aa3db01a8e11c9352662eb2e579bd595283d9106449ecec4a62ab6310f7192445e939cf207

                                                                        • C:\ProgramData\Ncpd\extracted\file_1.zip
                                                                          Filesize

                                                                          586KB

                                                                          MD5

                                                                          309d0687c864f887f0cebf386073ce25

                                                                          SHA1

                                                                          262ab2e9cc3b7242f2d842e17ffd24a384d8e719

                                                                          SHA256

                                                                          427039c1bd625bf3b7f996c59053efb29ad1d3b9c044e2a70a2b7b31a0907c94

                                                                          SHA512

                                                                          9b055d1a1b9ec637b9032b15a226325e92b5fa8967a7ec90e2ab9c68eca26f3bedba227b902052355ea1bf75c267a6966eaec15ec93bed01535c04e6b4b369fe

                                                                        • C:\ProgramData\Ncpd\extracted\file_2.zip
                                                                          Filesize

                                                                          586KB

                                                                          MD5

                                                                          252a216d6fcbcf0a58451b329229b319

                                                                          SHA1

                                                                          861d5bfe992efb64b0727ba4325f0dc151e10857

                                                                          SHA256

                                                                          86ee793f6eadfdee6a1c3bd28c40f9ff3cb595173222dcd9c426f075d2654b6f

                                                                          SHA512

                                                                          c5217f643aa0d6df225a78fc243a26adf7172527645534dab572ccc44397a0604f9ad09fbba83ec22d056b4228ec917167301bc3c18a3c93dc9f2b6e1582c00d

                                                                        • C:\ProgramData\Ncpd\extracted\file_3.zip
                                                                          Filesize

                                                                          586KB

                                                                          MD5

                                                                          5a29000095efe18354ad32d89febcd53

                                                                          SHA1

                                                                          a8ec5d49920224c499463048f8cd04ce00a88b99

                                                                          SHA256

                                                                          17e255f31d58ac9b50fda5231fb9d69b95be8b69a8a69f0d7272bde30213bcf5

                                                                          SHA512

                                                                          cac9475cd808879991b27bb7003c7850852550a3e5267913e03f04ca038851dcfcb454c5d126a3dc7302dfd9fafeca5385bdae0af1cf7506512db44cc6ea3840

                                                                        • C:\ProgramData\Ncpd\extracted\file_4.zip
                                                                          Filesize

                                                                          586KB

                                                                          MD5

                                                                          5d52c2ec5e2d1dcc9d33420032085179

                                                                          SHA1

                                                                          e63e4dcfee6f5cfa1dec4feba3a2e448767388b6

                                                                          SHA256

                                                                          2a1ccf6463749f2943f9ee25e9d1b879e71414ceb90108d16706c42a06f07ccc

                                                                          SHA512

                                                                          c62d812d82787247afb10a0be348cd2bdafa9f9e92ad61ca2802d2f3976be844786a36e568dc25af2e61277d8b7f08082894467433b8238c9425520f22e7dd87

                                                                        • C:\ProgramData\Ncpd\extracted\file_5.zip
                                                                          Filesize

                                                                          586KB

                                                                          MD5

                                                                          52963ad6d565b2f014af4b6044aed358

                                                                          SHA1

                                                                          bb2e8e76b741289d07a494b0358e5a7af7a60aa7

                                                                          SHA256

                                                                          d32cc2be7821f3e0de704fc1099234e400d563f1ca0c456a6e03100e0f5c061f

                                                                          SHA512

                                                                          d03f5055fb1db5de08622ffdb7d7a5e3f8e12a21a49c046f73ba3fd4b4189702153ed1c33a15e34c4b227fce21cdc55b37cd3aa5459228860628cfaf88a4bebb

                                                                        • C:\ProgramData\Ncpd\extracted\file_6.zip
                                                                          Filesize

                                                                          587KB

                                                                          MD5

                                                                          e0388c5c8289c6612c393aa9cc616cc3

                                                                          SHA1

                                                                          d6801f5879c7006f5f23812306c122793afc24e5

                                                                          SHA256

                                                                          da7e6c6bed92a29c2b9a9e227491f9547b03fcd89cd99587984dcb17591607a3

                                                                          SHA512

                                                                          fd01af652b4efde487e759f3a24044dfd2bde2f36120412d0f86fb6532b0d1625d9a3adc5be5c25350a2a7f91d8f8d7d2e3666a755160b39974fe5b601d3858b

                                                                        • C:\ProgramData\Ncpd\extracted\file_7.zip
                                                                          Filesize

                                                                          2.0MB

                                                                          MD5

                                                                          2b8edd8ecde255d234ce1344f06977b3

                                                                          SHA1

                                                                          45948706ff71addfe57d38891010244b257312df

                                                                          SHA256

                                                                          07b33bd29e59b43e21fedb354b547f6f441e526d2371db99b1bb2ad9faa9279d

                                                                          SHA512

                                                                          f3068f8ffeb467c42cc675519d05e0db3c1dccd5172861cf236f3fcfdc8657d2f09088e89202231d5e2b790384b56ca70efcef948ad0a4accf139bf1285203a5

                                                                        • C:\ProgramData\Ncpd\file.bin
                                                                          Filesize

                                                                          2.0MB

                                                                          MD5

                                                                          95c066187b5f602b9039bab5b08fe1d1

                                                                          SHA1

                                                                          fa338ecf3388a3345ae791e432e6c5a68625171c

                                                                          SHA256

                                                                          5df699a602904461b27e4b2548792fc38a7d822cdd00e6a3245ef251dd6f5bd4

                                                                          SHA512

                                                                          ff38de9a16866e680064426d1316fa0d10fe0b3c5c893ce3c2085b856c1108bb5f381795da2ebe7098b9ed786c456293ccd828589d5c4a8f15811ad2cf44398d

                                                                        • C:\ProgramData\Ncpd\main.bat
                                                                          Filesize

                                                                          399B

                                                                          MD5

                                                                          d35d9526038b5859b4334285ab76b5ca

                                                                          SHA1

                                                                          86d731332338596eb8ab437675853d48746d2450

                                                                          SHA256

                                                                          607ba2d57942663a01d4b7774eebe78e3128e48a98b66a6bf73f620c04a40728

                                                                          SHA512

                                                                          bb433c547ca269454ad29c606bc841a408dbaf67320997a9b61931c2857e6b2d0288e4211ebc49036473628092fe410816eeffbb1f93785694d8bde671cfb143

                                                                        • C:\Users\Admin\AppData\Local\Temp\19f93e2a-4d97-4e0c-ade5-972e41ee6cf8\f.dll
                                                                          Filesize

                                                                          94KB

                                                                          MD5

                                                                          14ff402962ad21b78ae0b4c43cd1f194

                                                                          SHA1

                                                                          f8a510eb26666e875a5bdd1cadad40602763ad72

                                                                          SHA256

                                                                          fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b

                                                                          SHA512

                                                                          daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

                                                                        • C:\Users\Admin\AppData\Local\Temp\is-5VL6P.tmp\b2p.dll
                                                                          Filesize

                                                                          22KB

                                                                          MD5

                                                                          ab35386487b343e3e82dbd2671ff9dab

                                                                          SHA1

                                                                          03591d07aea3309b631a7d3a6e20a92653e199b8

                                                                          SHA256

                                                                          c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2

                                                                          SHA512

                                                                          b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09

                                                                        • C:\Users\Admin\AppData\Local\Temp\is-5VL6P.tmp\botva2.dll
                                                                          Filesize

                                                                          37KB

                                                                          MD5

                                                                          67965a5957a61867d661f05ae1f4773e

                                                                          SHA1

                                                                          f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

                                                                          SHA256

                                                                          450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

                                                                          SHA512

                                                                          c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

                                                                        • C:\Users\Admin\AppData\Local\Temp\is-5VL6P.tmp\botva2.dll
                                                                          Filesize

                                                                          37KB

                                                                          MD5

                                                                          67965a5957a61867d661f05ae1f4773e

                                                                          SHA1

                                                                          f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

                                                                          SHA256

                                                                          450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

                                                                          SHA512

                                                                          c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

                                                                        • C:\Users\Admin\AppData\Local\Temp\is-5VL6P.tmp\iswin7logo.dll
                                                                          Filesize

                                                                          39KB

                                                                          MD5

                                                                          1ea948aad25ddd347d9b80bef6df9779

                                                                          SHA1

                                                                          0be971e67a6c3b1297e572d97c14f74b05dafed3

                                                                          SHA256

                                                                          30eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488

                                                                          SHA512

                                                                          f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545

                                                                        • C:\Users\Admin\AppData\Local\Temp\is-BL0CC.tmp\ecb96ba977acddb3efab76321b53e4fbd7c31a6b873aca015c2cbecc01008103.tmp
                                                                          Filesize

                                                                          2.5MB

                                                                          MD5

                                                                          d0e24e6d7017127bea02bb0160229bee

                                                                          SHA1

                                                                          34350e5b7f268797b2a7ec56390c2228f841b37b

                                                                          SHA256

                                                                          ca0a5b43e255d0fa7205be3437ea706eda966dd1839ae01d1de1d3b62f832994

                                                                          SHA512

                                                                          f5c2edc35c2e43e199c2d4d1d904d9b06cc238b99a6f691f5a9c820c8ed0db77346158ae41237f0086a5009012202bdab4b533b42223f72837c461a499be5c86

                                                                        • C:\Users\Admin\AppData\Local\Temp\is-CJ5NA.tmp\_isetup\_iscrypt.dll
                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          a69559718ab506675e907fe49deb71e9

                                                                          SHA1

                                                                          bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                          SHA256

                                                                          2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                          SHA512

                                                                          e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                        • C:\Users\Admin\AppData\Local\Temp\is-QHUAR.tmp\Revo Uninstaller Pro 4.2.3.tmp
                                                                          Filesize

                                                                          982KB

                                                                          MD5

                                                                          74f1186a6d3bc01716681712c6b24a74

                                                                          SHA1

                                                                          9c015d4a4d4a9c7ee4619ea2e2068143c3b81e18

                                                                          SHA256

                                                                          d4c2a4940f43e5bdab3963fb2a357f52ae6866e6dc4426909f828b2228af814d

                                                                          SHA512

                                                                          bea8504e1b2244ac425cde33a34d6ac5e6f77d75050c6646d7abebbdaf9d0eab91ca7e4e41abea2aed9c55c445d1c924a62d46a9b08bfe81661982fdf14e20e0

                                                                        • memory/328-163-0x0000000000000000-mapping.dmp
                                                                        • memory/616-158-0x0000000000000000-mapping.dmp
                                                                        • memory/660-182-0x0000000000000000-mapping.dmp
                                                                        • memory/1120-153-0x0000000000000000-mapping.dmp
                                                                        • memory/1172-198-0x0000000000000000-mapping.dmp
                                                                        • memory/1320-231-0x0000000004E70000-0x0000000004F02000-memory.dmp
                                                                          Filesize

                                                                          584KB

                                                                        • memory/1320-226-0x0000000000000000-mapping.dmp
                                                                        • memory/1320-233-0x00000000741D0000-0x0000000074259000-memory.dmp
                                                                          Filesize

                                                                          548KB

                                                                        • memory/1320-229-0x0000000005420000-0x00000000059C4000-memory.dmp
                                                                          Filesize

                                                                          5.6MB

                                                                        • memory/1320-230-0x0000000004D60000-0x0000000004DA4000-memory.dmp
                                                                          Filesize

                                                                          272KB

                                                                        • memory/1320-228-0x00000000002D0000-0x00000000003AC000-memory.dmp
                                                                          Filesize

                                                                          880KB

                                                                        • memory/1368-180-0x0000000000000000-mapping.dmp
                                                                        • memory/1576-177-0x0000000000000000-mapping.dmp
                                                                        • memory/1760-154-0x0000000000000000-mapping.dmp
                                                                        • memory/1892-165-0x0000000000000000-mapping.dmp
                                                                        • memory/1956-186-0x0000000000000000-mapping.dmp
                                                                        • memory/1992-164-0x0000000000000000-mapping.dmp
                                                                        • memory/2124-132-0x0000000000400000-0x00000000004CE000-memory.dmp
                                                                          Filesize

                                                                          824KB

                                                                        • memory/2124-130-0x0000000000400000-0x00000000004CE000-memory.dmp
                                                                          Filesize

                                                                          824KB

                                                                        • memory/2164-175-0x0000000000000000-mapping.dmp
                                                                        • memory/2232-243-0x0000000000920000-0x00000000009B3000-memory.dmp
                                                                          Filesize

                                                                          588KB

                                                                        • memory/2232-237-0x0000000000000000-mapping.dmp
                                                                        • memory/2232-240-0x0000000000920000-0x00000000009B3000-memory.dmp
                                                                          Filesize

                                                                          588KB

                                                                        • memory/2232-246-0x0000000000920000-0x00000000009B3000-memory.dmp
                                                                          Filesize

                                                                          588KB

                                                                        • memory/2284-156-0x0000000000000000-mapping.dmp
                                                                        • memory/2288-184-0x0000000000000000-mapping.dmp
                                                                        • memory/2340-167-0x0000000000000000-mapping.dmp
                                                                        • memory/2392-195-0x0000000000000000-mapping.dmp
                                                                        • memory/2428-191-0x0000000000000000-mapping.dmp
                                                                        • memory/2512-162-0x0000000000000000-mapping.dmp
                                                                        • memory/2576-133-0x0000000000000000-mapping.dmp
                                                                        • memory/2600-220-0x0000000000000000-mapping.dmp
                                                                        • memory/2656-212-0x0000000000000000-mapping.dmp
                                                                        • memory/2784-173-0x0000000000000000-mapping.dmp
                                                                        • memory/3000-181-0x0000000000000000-mapping.dmp
                                                                        • memory/3184-208-0x0000000000000000-mapping.dmp
                                                                        • memory/3276-174-0x0000000000000000-mapping.dmp
                                                                        • memory/3320-178-0x0000000000000000-mapping.dmp
                                                                        • memory/3340-171-0x0000000000000000-mapping.dmp
                                                                        • memory/3448-141-0x0000000000400000-0x0000000000429000-memory.dmp
                                                                          Filesize

                                                                          164KB

                                                                        • memory/3448-136-0x0000000000000000-mapping.dmp
                                                                        • memory/3448-138-0x0000000000400000-0x0000000000429000-memory.dmp
                                                                          Filesize

                                                                          164KB

                                                                        • memory/3456-168-0x0000000000000000-mapping.dmp
                                                                        • memory/3560-196-0x0000000000000000-mapping.dmp
                                                                        • memory/3580-166-0x0000000000000000-mapping.dmp
                                                                        • memory/3748-157-0x0000000000000000-mapping.dmp
                                                                        • memory/3864-202-0x0000000000000000-mapping.dmp
                                                                        • memory/3948-155-0x0000000000000000-mapping.dmp
                                                                        • memory/4016-207-0x0000000000000000-mapping.dmp
                                                                        • memory/4192-216-0x0000000000000000-mapping.dmp
                                                                        • memory/4256-149-0x00000000073C0000-0x00000000073CF000-memory.dmp
                                                                          Filesize

                                                                          60KB

                                                                        • memory/4256-142-0x0000000000000000-mapping.dmp
                                                                        • memory/4256-236-0x0000000007260000-0x0000000007263000-memory.dmp
                                                                          Filesize

                                                                          12KB

                                                                        • memory/4256-235-0x0000000073E20000-0x0000000073E3B000-memory.dmp
                                                                          Filesize

                                                                          108KB

                                                                        • memory/4444-152-0x0000000000000000-mapping.dmp
                                                                        • memory/4536-199-0x0000000000000000-mapping.dmp
                                                                        • memory/4600-204-0x0000000000000000-mapping.dmp
                                                                        • memory/4736-179-0x0000000000000000-mapping.dmp
                                                                        • memory/4840-159-0x0000000000000000-mapping.dmp
                                                                        • memory/4864-169-0x0000000000000000-mapping.dmp
                                                                        • memory/4912-161-0x0000000000000000-mapping.dmp
                                                                        • memory/4940-247-0x0000000000000000-mapping.dmp
                                                                        • memory/4968-170-0x0000000000000000-mapping.dmp
                                                                        • memory/5008-190-0x0000000000000000-mapping.dmp
                                                                        • memory/5072-189-0x0000000000000000-mapping.dmp
                                                                        • memory/5096-160-0x0000000000000000-mapping.dmp
                                                                        • memory/5108-145-0x0000000000000000-mapping.dmp