Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    03-07-2022 05:53

General

  • Target

    3c9ddede86b3ca6b22210fcb408f2bde4f18e3f5db616641ce00ff36c8ceeb71.exe

  • Size

    598KB

  • MD5

    0e67a6a09c8fca068be23a60619c6c25

  • SHA1

    4b71251a5ad3b8b6505c868bd4fd32df4854e8e8

  • SHA256

    3c9ddede86b3ca6b22210fcb408f2bde4f18e3f5db616641ce00ff36c8ceeb71

  • SHA512

    69202bb98817b5611bc8395c5eeb8fa0e3fe585fbb2883b38c7cd806e635f4aa3264004a8f85d11b18d41682c96f72cd7b0237be4598c7403366a913a4e293ad

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

109.230.215.181:1604

127.0.0.1:1604

Mutex

aeb8afad-ce72-4ffa-af99-8b0ffae2c85e

Attributes
  • activate_away_mode

    false

  • backup_connection_host

    127.0.0.1

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2018-06-13T22:26:17.321176636Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    false

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    1604

  • default_group

    Nulled

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    aeb8afad-ce72-4ffa-af99-8b0ffae2c85e

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    109.230.215.181

  • primary_dns_server

    8.8.8.8

  • request_elevation

    false

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    false

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Extracted

Family

njrat

Version

0.7d

Botnet

Nulled

C2

109.230.215.181:5552

Mutex

2299bf68477490aa84f3d4216e925074

Attributes
  • reg_key

    2299bf68477490aa84f3d4216e925074

  • splitter

    |'|'|

Signatures

  • Detect Neshta Payload 42 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • suricata: ET MALWARE Common RAT Connectivity Check Observed

    suricata: ET MALWARE Common RAT Connectivity Check Observed

  • Executes dropped EXE 12 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c9ddede86b3ca6b22210fcb408f2bde4f18e3f5db616641ce00ff36c8ceeb71.exe
    "C:\Users\Admin\AppData\Local\Temp\3c9ddede86b3ca6b22210fcb408f2bde4f18e3f5db616641ce00ff36c8ceeb71.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Users\Admin\AppData\Local\Temp\wininit.exe
      "C:\Users\Admin\AppData\Local\Temp\wininit.exe"
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Checks computer location settings
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      PID:1796
    • C:\Users\Admin\AppData\Local\Temp\Godaddy Account Checker.exe
      "C:\Users\Admin\AppData\Local\Temp\Godaddy Account Checker.exe"
      2⤵
      • Executes dropped EXE
      PID:1304
    • C:\Users\Admin\AppData\Local\Temp\Client-built1.exe
      "C:\Users\Admin\AppData\Local\Temp\Client-built1.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4432
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CLIENT~1.EXE"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1528
        • C:\Users\Admin\AppData\Local\Temp\3582-490\CLIENT~1.EXE
          C:\Users\Admin\AppData\Local\Temp\3582-490\CLIENT~1.EXE
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4544
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks" /create /tn "GayPorn" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\3582-490\CLIENT~1.EXE" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:3896
          • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
            5⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Adds Run key to start application
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:656
            • C:\Windows\SYSTEM32\schtasks.exe
              "schtasks" /create /tn "GayPorn" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
              6⤵
              • Creates scheduled task(s)
              PID:1532
            • C:\Windows\svchost.com
              "C:\Windows\svchost.com" "C:\Windows\System32\schtasks.exe" /create /tn "WINDOWSSYSTEMHOST" /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /sc MINUTE /MO 1
              6⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of WriteProcessMemory
              PID:4828
              • C:\Windows\SysWOW64\schtasks.exe
                C:\Windows\System32\schtasks.exe /create /tn WINDOWSSYSTEMHOST /tr C:\Users\Admin\AppData\Roaming\SubDir\Client.exe /sc MINUTE /MO 1
                7⤵
                • Creates scheduled task(s)
                PID:1640
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3976
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\csrss.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4716
        • C:\Users\Admin\AppData\Local\Temp\csrss.exe
          C:\Users\Admin\AppData\Local\Temp\csrss.exe
          4⤵
          • Executes dropped EXE
          • Drops startup file
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1648
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\csrss.exe" "csrss.exe" ENABLE
            5⤵
            • Modifies Windows Firewall
            PID:1816
  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
    C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
    1⤵
    • Executes dropped EXE
    PID:3240
  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
    C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
    1⤵
    • Executes dropped EXE
    PID:2124

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Change Default File Association

1
T1042

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE
    Filesize

    5.7MB

    MD5

    09acdc5bbec5a47e8ae47f4a348541e2

    SHA1

    658f64967b2a9372c1c0bdd59c6fb2a18301d891

    SHA256

    1b5c715d71384f043843ea1785a6873a9f39d2daae112ccdeffcd88b10a3a403

    SHA512

    3867bf98e1a0e253114a98b78b047b0d8282b5abf4aaf836f31cc0e26224e2a1b802c65df9d90dc7696a6dbcb9a8e4b900f1d1299e1b11e36f095ebaf8a2e5b8

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe
    Filesize

    175KB

    MD5

    576410de51e63c3b5442540c8fdacbee

    SHA1

    8de673b679e0fee6e460cbf4f21ab728e41e0973

    SHA256

    3f00404dd591c2856e6f71bd78423ed47199902e0b85f228e6c4de72c59ddffe

    SHA512

    f7761f3878775b30cc3d756fa122e74548dfc0a27e38fa4109e34a59a009df333d074bf14a227549ae347605f271be47984c55148685faac479aeb481f7191db

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE
    Filesize

    183KB

    MD5

    9dfcdd1ab508b26917bb2461488d8605

    SHA1

    4ba6342bcf4942ade05fb12db83da89dc8c56a21

    SHA256

    ecd5e94da88c653e4c34b6ab325e0aca8824247b290336f75c410caa16381bc5

    SHA512

    1afc1b95f160333f1ff2fa14b3f22a28ae33850699c6b5498915a8b6bec1cfc40f33cb69583240aa9206bc2ea7ab14e05e071275b836502a92aa8c529fc1b137

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe
    Filesize

    131KB

    MD5

    5791075058b526842f4601c46abd59f5

    SHA1

    b2748f7542e2eebcd0353c3720d92bbffad8678f

    SHA256

    5c3ef3ec7594c040146e908014791dd15201ba58b4d70032770bb661b6a0e394

    SHA512

    83e303971ed64019fde9e4ba6f6e889f8fb105088490dfa7dcf579a12baff20ef491f563d132d60c7b24a4fd3cac29bd9dc974571cd162000fae8fba4e0e54fb

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE
    Filesize

    254KB

    MD5

    4ddc609ae13a777493f3eeda70a81d40

    SHA1

    8957c390f9b2c136d37190e32bccae3ae671c80a

    SHA256

    16d65f2463658a72dba205dcaa18bc3d0bab4453e726233d68bc176e69db0950

    SHA512

    9d7f90d1529cab20078c2690bf7bffab5a451a41d8993781effe807e619da0e7292f991da2f0c5c131b111d028b3e6084e5648c90816e74dfb664e7f78181bc5

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe
    Filesize

    125KB

    MD5

    cce8964848413b49f18a44da9cb0a79b

    SHA1

    0b7452100d400acebb1c1887542f322a92cbd7ae

    SHA256

    fe44ca8d5050932851aa54c23133277e66db939501af58e5aeb7b67ec1dde7b5

    SHA512

    bf8fc270229d46a083ced30da6637f3ca510b0ce44624a9b21ec6aacac81666dffd41855053a936aa9e8ea6e745a09b820b506ec7bf1173b6f1837828a35103d

  • C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE
    Filesize

    191KB

    MD5

    dd5586c90fad3d0acb402c1aab8f6642

    SHA1

    3440cd9e78d4e4b3c2f5ba31435cedaa559e5c7f

    SHA256

    fba2b9270ade0ce80e8dfc5e3279db683324502f6103e451cd090c69da56415e

    SHA512

    e56f6d6b446411ba4ed24f0d113953d9c9e874b2ac4511d33e5c5b85dddd81216579695e35c34b6054c187b00ee214d5648594dad498297f487f2fd47f040a4d

  • C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE
    Filesize

    251KB

    MD5

    33cb4562e84c8bbbc8184b961e2e49ee

    SHA1

    d6549a52911eaeebcceb5bc39d71272d3b8f5111

    SHA256

    1f455ea6bab09377e5fdfbd5df102f79c5cbbb5fe5ce456f2fbb34f94ec848bb

    SHA512

    0b638a6e86816ba5d83de5fc381c85371f2f4fe0a2fdff40141859a42e255a082903e5692a49ef253265a42ec99924e5a0aa150cb7ed6cd5521f42f6c9fe27a9

  • C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE
    Filesize

    404KB

    MD5

    ea78ed9e7eb4cc64544163627476fe4b

    SHA1

    67aed91a59742a36c0ff635b15c692cde3eb3a9d

    SHA256

    d5adfd6c8160892716ad5f2907cc66888aee97e1d296404503e1d42dd30ba562

    SHA512

    eeee54e5ffbd243fe7ef6c93744c754bc238e5b05e85c7ca3b25edc02a8692cd10225edff40444fe2536608d0ed25578573e309503cb8f90f43d089d86f8710f

  • C:\PROGRA~2\MICROS~1\EDGEUP~1\13157~1.61\MICROS~2.EXE
    Filesize

    287KB

    MD5

    748fc9c2ffb9200f05fe163041cb3fac

    SHA1

    6f654ec414f855d67dfdfcfc029cec4a0cd40186

    SHA256

    2ef40c8797547f8411e4428edfcd90ba0ba499a183632d1d87acada5a9968bb9

    SHA512

    5c525020645b41290d4fc3a5959fd24fa17abb92c67cd1ac1324c5d1627d4cc52722af4b767328c9d43ce2c43d7016676c864a9a31ba07d131c23428832d2914

  • C:\PROGRA~2\MICROS~1\EDGEUP~1\13157~1.61\MICROS~3.EXE
    Filesize

    244KB

    MD5

    d36d29fce977e2a4df731d36a2ecfe82

    SHA1

    2efedf15318b0f6b176b2afbed7d981991ab33b5

    SHA256

    63f61df4f82596933c92001d9716a3f76ce9e36ad50ff32b8db400cda430a14c

    SHA512

    5e7ab07afead7743f6727ba04e82fe9d9ea0d4013e2f6ff31c2019799d20f9bfafff9894648e3b4c18dfaf4b693e421443def0d27dcf7156dcc533cc92fc6c32

  • C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13157~1.61\MICROS~1.EXE
    Filesize

    1.8MB

    MD5

    7ec462aaaa3835ed25e55cb9e5133db3

    SHA1

    964f067e97298571454a57412d14ff363c1875a0

    SHA256

    69bde6230bbbe972f0be05b3d7e8580965a74dac45a455c0b80636eecbfdc168

    SHA512

    b31dbe6565983b7d171c5b1b0793076ac9b9b328026ee67077df4cb1755e9cebd29b373261d6ec3f3d9f16936ad143813431ce6c75546df3048f3ebd67292746

  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE
    Filesize

    509KB

    MD5

    7c73e01bd682dc67ef2fbb679be99866

    SHA1

    ad3834bd9f95f8bf64eb5be0a610427940407117

    SHA256

    da333c92fdfd2e8092f5b56686b94f713f8fa27ef8f333e7222259ad1eb08f5d

    SHA512

    b2f3398e486cde482cb6bea18f4e5312fa2db7382ca25cea17bcba5ab1ff0e891d59328bc567641a9da05caca4d7c61dc102289d46e7135f947ce6155e295711

  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE
    Filesize

    1.1MB

    MD5

    301d7f5daa3b48c83df5f6b35de99982

    SHA1

    17e68d91f3ec1eabde1451351cc690a1978d2cd4

    SHA256

    abe398284d90be5e5e78f98654b88664e2e14478f7eb3f55c5fd1c1bcf1bebee

    SHA512

    4a72a24dec461d116fe8324c651913273ccaa50cb036ccdacb3ae300e417cf4a64aa458869b8d2f3b4c298c59977437d11b241d08b391a481c3226954bba22e4

  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe
    Filesize

    3.6MB

    MD5

    6ce350ad38c8f7cbe5dd8fda30d11fa1

    SHA1

    4f232b8cccd031c25378b4770f85e8038e8655d8

    SHA256

    06a3bb0bdd2da870bc8dc2c6b760855cea7821273ce59fc0be158149e52915ba

    SHA512

    4c18a112fec391f443a4ae217ac6d1850e0cfdad4b2d2cbe3f61cb01c0a1400ea6bd5c3ffe0a9978ead50e7f6cfab96ae5090bb9a611f988f1a86ccaa5d4cd4f

  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE
    Filesize

    1.1MB

    MD5

    a5d9eaa7d52bffc494a5f58203c6c1b5

    SHA1

    97928ba7b61b46a1a77a38445679d040ffca7cc8

    SHA256

    34b8662d38e7d3d6394fa6c965d943d2c82ea06ba9d7a0af4f8e0571fb5a9c48

    SHA512

    b6fdc8389bb4d736d608600469be6a4b0452aa3ea082f9a0791022a14c02b8fb7dcd62df133b0518e91283094eaba2be9318316f72d2c4aae6286d3e8686e787

  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE
    Filesize

    2.8MB

    MD5

    eb008f1890fed6dc7d13a25ff9c35724

    SHA1

    751d3b944f160b1f77c1c8852af25b65ae9d649c

    SHA256

    a9b7b9155af49d651b092bb1665447059f7a1d0061f88fa320d4f956b9723090

    SHA512

    9cfe3480f24bf8970ad5773cb9df51d132ee90ada35cbf8ec1222e09a60ae46b2ff4b96862fea19085b1c32f93c47c69f604589fa3f4af17e5d67bef893b6bf1

  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE
    Filesize

    1.1MB

    MD5

    5c78384d8eb1f6cb8cb23d515cfe7c98

    SHA1

    b732ab6c3fbf2ded8a4d6c8962554d119f59082e

    SHA256

    9abd7f0aa942ee6b263cdc4b32a4110ddb95e43ad411190f0ea48c0064884564

    SHA512

    99324af5f8fb70a9d01f97d845a4c6999053d6567ba5b80830a843a1634b02eaf3c0c04ced924cf1b1be9b4d1dbbcb95538385f7f85ad84d3eaaa6dcdebcc8a6

  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe
    Filesize

    3.2MB

    MD5

    5119e350591269f44f732b470024bb7c

    SHA1

    4ccd48e4c6ba6e162d1520760ee3063e93e2c014

    SHA256

    2b3aa9642b291932ba7f9f3d85221402a9d27078f56ef0e9c6bca633616e3873

    SHA512

    599b4ec673169d42a348d1117737b4ad4d7539574153df5a5c7689130c9ac5ff5cd00f3c8ec39adf32ff2b56be074081efcabb6456272c649703c3ea6cdaded4

  • C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe
    Filesize

    3.2MB

    MD5

    5119e350591269f44f732b470024bb7c

    SHA1

    4ccd48e4c6ba6e162d1520760ee3063e93e2c014

    SHA256

    2b3aa9642b291932ba7f9f3d85221402a9d27078f56ef0e9c6bca633616e3873

    SHA512

    599b4ec673169d42a348d1117737b4ad4d7539574153df5a5c7689130c9ac5ff5cd00f3c8ec39adf32ff2b56be074081efcabb6456272c649703c3ea6cdaded4

  • C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE
    Filesize

    279KB

    MD5

    f2056a3543ba9b6b6dde4346614b7f82

    SHA1

    139129616c3a9025a5cb16f9ad69018246bd9e2d

    SHA256

    2bab7d64d5327ca21ffd13df88b30431d0b8c0dd6cad8f4bb4db33eeb2b37d1e

    SHA512

    e11d1c65e046a0a6817cec4d17df1b7f5849fdb5b95527fdef78f0c433294fd2186037116a581ec3a66b07f1ab75cd8e60e408005cd64bc5eacc61a582da0942

  • C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE
    Filesize

    6.7MB

    MD5

    63dc05e27a0b43bf25f151751b481b8c

    SHA1

    b20321483dac62bce0aa0cef1d193d247747e189

    SHA256

    7d607fb69c69a72a5bf4305599279f46318312ce1082b6a34ac9100b8c7762ce

    SHA512

    374d705704d456cc5f9f79b7f465f6ec7c775dc43001c840e9d6efbbdef20926ed1fa97f8a9b1e73161e17f72520b96c05fa58ac86b3945208b405f9166e7ba3

  • C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE
    Filesize

    536KB

    MD5

    bcb5db16e576464d3d8d93e1907bf946

    SHA1

    b10f3c3dc4baef4655ae2c30543be9d3c40b9781

    SHA256

    24c9b3b4cf5e45a56c90d7fd112b05f07dd89cf96e98729beb2f6081fca758c0

    SHA512

    c36339b06a00938c8a63ba4d54a766dc3ca3d1e34d69e9b4b2bfa9ca79c5c65d07f216f84af2b60be0c9cbdccadc5c271018efed52def8bd778dc01743d61229

  • C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE
    Filesize

    485KB

    MD5

    87f15006aea3b4433e226882a56f188d

    SHA1

    e3ad6beb8229af62b0824151dbf546c0506d4f65

    SHA256

    8d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919

    SHA512

    b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1

  • C:\Users\ALLUSE~1\Adobe\Setup\{AC76B~1\setup.exe
    Filesize

    494KB

    MD5

    05bdfd8a3128ab14d96818f43ebe9c0e

    SHA1

    495cbbd020391e05d11c52aa23bdae7b89532eb7

    SHA256

    7b945c7e6b8bfbb489f003ecd1d0dcd4803042003de4646d4206114361a0fbbb

    SHA512

    8d9b9fc407986bd53fe3b56c96b7371cc782b4bac705253bfb0a2b0b1e6883fdb022f1ac87b8bfd7005291991b6a3dfbaceab54f5d494e0af70f0435a0b8b0da

  • C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE
    Filesize

    485KB

    MD5

    86749cd13537a694795be5d87ef7106d

    SHA1

    538030845680a8be8219618daee29e368dc1e06c

    SHA256

    8c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5

    SHA512

    7b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c

  • C:\Users\ALLUSE~1\PACKAG~1\{4D8DC~1\VC_RED~1.EXE
    Filesize

    674KB

    MD5

    97510a7d9bf0811a6ea89fad85a9f3f3

    SHA1

    2ac0c49b66a92789be65580a38ae9798237711db

    SHA256

    c48abbc29405559e68cc9f8fc6d218aa317a9d0023839c7846ca509c1f563fea

    SHA512

    2a93e2a3bd187fdde160f87ef777ccd1d1c398d547b7c869e6b64469b9418ad04d887cdfe94af7407476377bf2d009f576de3935c025b7aefbab26fbcd8f90fb

  • C:\Users\ALLUSE~1\PACKAG~1\{57A73~1\VC_RED~1.EXE
    Filesize

    674KB

    MD5

    9c10a5ec52c145d340df7eafdb69c478

    SHA1

    57f3d99e41d123ad5f185fc21454367a7285db42

    SHA256

    ccf37e88447a7afdb0ba4351b8c5606dbb05b984fb133194d71bcc00d7be4e36

    SHA512

    2704cfd1a708bfca6db7c52467d3abf0b09313db0cdd1ea8e5d48504c8240c4bf24e677f17c5df9e3ac1f6a678e0328e73e951dc4481f35027cb03b2966dc38f

  • C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE
    Filesize

    536KB

    MD5

    bcb5db16e576464d3d8d93e1907bf946

    SHA1

    b10f3c3dc4baef4655ae2c30543be9d3c40b9781

    SHA256

    24c9b3b4cf5e45a56c90d7fd112b05f07dd89cf96e98729beb2f6081fca758c0

    SHA512

    c36339b06a00938c8a63ba4d54a766dc3ca3d1e34d69e9b4b2bfa9ca79c5c65d07f216f84af2b60be0c9cbdccadc5c271018efed52def8bd778dc01743d61229

  • C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE
    Filesize

    536KB

    MD5

    91490c78c45cbd686ac759b6a252e898

    SHA1

    51bb6c5aa14cf478b0b6fa0329c7366d1f6fb480

    SHA256

    47f3331b4f35012d38bc11cdeae0ff7b4ae1186d4e916e3e48a9440438296821

    SHA512

    f7d44cd6df2c0c492731c14ca27e26605e8cddb9cb9287bf083fe1e43f753cafa11c341f0915510ad1d189466e92bb3f4e219b3599e9df72878bde14518bee35

  • C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\181510~1.001\FILECO~1.EXE
    Filesize

    499KB

    MD5

    346d2ff654d6257364a7c32b1ec53c09

    SHA1

    224301c0f56a870f20383c45801ec16d01dc48d1

    SHA256

    a811042693bc2b31be7e3f454b12312f67bc97f2b15335a97e8d8f2ba0a6b255

    SHA512

    223545e3fc9f3cd66c5cbcb50dd7103743788f03a9db398da6dd2744ccaeee291f385ce4f2758d4504fc0f6b968fabbfe16ba03b5f546b743c51dacad7a049c3

  • C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\ONEDRI~1.EXE
    Filesize

    2.4MB

    MD5

    1319acbba64ecbcd5e3f16fc3acd693c

    SHA1

    f5d64f97194846bd0564d20ee290d35dd3df40b0

    SHA256

    8c6f9493c2045bb7c08630cf3709a63e221001f04289b311efb259de3eb76bce

    SHA512

    abbbb0abfff1698e2d3c4d27d84421b90abba1238b45884b82ace20d11ddfdd92bf206519fc01714235fb840258bb1c647c544b9a19d36f155bf3224916805b8

  • C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\OneDrive.exe
    Filesize

    1.7MB

    MD5

    e25ffbddf046809226ea738583fd29f9

    SHA1

    ebda60d1f49cd1c2559d6c0f0a760dac7f38ce98

    SHA256

    91630469f3d18ebf1be43522b6dcb6547c3b67ab7a17a246e1b2122628dfcd80

    SHA512

    4417cba81c77c2a60e448b69dc615574ed4862fd97af014ebdf3ffbdde8a6c9bc32aca4881f59037f908a67b674d9e49b817fc1e6865e8f08e374f36baade101

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Client.exe.log
    Filesize

    1KB

    MD5

    2362dcc9d262d0969898b143fb7fc91a

    SHA1

    2240860a675c86425f5702b501eac121bfb744eb

    SHA256

    4f7cff601d97caf1e0040bc2d63ccadd27294b2e551ff4167e0b080c69a915b0

    SHA512

    59cb7e53dc9cc02f25216cc87115403ed67fb5d24947ef2e803cd54e9f118d5d65a71817b05642c238ca48eb7bfd228d008d92e42023f2c15755c64c88f5b0d6

  • C:\Users\Admin\AppData\Local\Temp\3582-490\CLIENT~1.EXE
    Filesize

    341KB

    MD5

    22f0df01449ab75a278677e2a5e45290

    SHA1

    4bdcebdc66daf1d6caedd39ec5973d341fcebabe

    SHA256

    8402c22cce0b65a602a3cc6d8f12b27f3a287c1a884f387d5e82e65604d534d6

    SHA512

    0e954d9b505ed34acd40870252e57d1404d845f89750a2ae00052c949283f3eb9143b268fa76288349f0d10683e3e4b25bd7df7764b29739e6133a8eaf4e7a36

  • C:\Users\Admin\AppData\Local\Temp\3582-490\Client-built1.exe
    Filesize

    341KB

    MD5

    22f0df01449ab75a278677e2a5e45290

    SHA1

    4bdcebdc66daf1d6caedd39ec5973d341fcebabe

    SHA256

    8402c22cce0b65a602a3cc6d8f12b27f3a287c1a884f387d5e82e65604d534d6

    SHA512

    0e954d9b505ed34acd40870252e57d1404d845f89750a2ae00052c949283f3eb9143b268fa76288349f0d10683e3e4b25bd7df7764b29739e6133a8eaf4e7a36

  • C:\Users\Admin\AppData\Local\Temp\3582-490\wininit.exe
    Filesize

    202KB

    MD5

    d5b15a205981192cbc8637d5b99f6bb0

    SHA1

    e856a5df79d4df21725085081e6f1776df4911ef

    SHA256

    49324734384150681dca13ea5038734bb054ecdf46dd43afbd3e34a72b623bad

    SHA512

    cc2d24b1bf7644dad90689ca0452967c7f23f01d9a39559555f68202abb42001e83f4bbbc9f123ce191addf8bc126b802112e37b9399ce043307991e1221b02a

  • C:\Users\Admin\AppData\Local\Temp\Client-built1.exe
    Filesize

    381KB

    MD5

    465f70a133c76f049a613c48dcc6a0f7

    SHA1

    0e5545e2ba9b60aa9b1361c8723208520c901dbd

    SHA256

    822dcbbc97c3416f8f87541769c8784ff8ce45f37a4793ae0d20ed28f36b07f4

    SHA512

    6f8e5827ff58ffdce640e2183fcb7b6b2690c032ff327eccfc66fe993120bc0da9db907941e046847c1a05603c28922789afa33157db2049d14012f3a9017352

  • C:\Users\Admin\AppData\Local\Temp\Client-built1.exe
    Filesize

    381KB

    MD5

    465f70a133c76f049a613c48dcc6a0f7

    SHA1

    0e5545e2ba9b60aa9b1361c8723208520c901dbd

    SHA256

    822dcbbc97c3416f8f87541769c8784ff8ce45f37a4793ae0d20ed28f36b07f4

    SHA512

    6f8e5827ff58ffdce640e2183fcb7b6b2690c032ff327eccfc66fe993120bc0da9db907941e046847c1a05603c28922789afa33157db2049d14012f3a9017352

  • C:\Users\Admin\AppData\Local\Temp\Godaddy Account Checker.exe
    Filesize

    38KB

    MD5

    62ba0947816b4d767b6109f721e4346a

    SHA1

    c539eb0d6404381dc274fee541b7fc636f89b381

    SHA256

    21ace99c9682e8abbafaca1a75dea9f2aa66bbdc5439adb2c36c2f3badfa335d

    SHA512

    e08b8e17ed9f76577b075723c19863b493bfc49fe539362b8c3bde6b6cea841e0a69f6bad19a8ca364f04a3089ee811a8103d2123c6df177eb0f44afaf52c19e

  • C:\Users\Admin\AppData\Local\Temp\Godaddy Account Checker.exe
    Filesize

    38KB

    MD5

    62ba0947816b4d767b6109f721e4346a

    SHA1

    c539eb0d6404381dc274fee541b7fc636f89b381

    SHA256

    21ace99c9682e8abbafaca1a75dea9f2aa66bbdc5439adb2c36c2f3badfa335d

    SHA512

    e08b8e17ed9f76577b075723c19863b493bfc49fe539362b8c3bde6b6cea841e0a69f6bad19a8ca364f04a3089ee811a8103d2123c6df177eb0f44afaf52c19e

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    Filesize

    22KB

    MD5

    ccf62ad3dfd8e548453cf1f7df8d1857

    SHA1

    17a1c844f58b1f41ca8106521d42e4b176e324f5

    SHA256

    3a5e456be5dc18abad8de0760ba84d3dffc84a4d8af395d0e4afe688b3fa08cd

    SHA512

    dde62c64beb81d91f1f8ef6023e4172e2e088456e0faf4fa7187b35f41ac781f4f669065dc57e472a2dacc591837b6bbf30a90a58203a803bd42677d43b02981

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    Filesize

    22KB

    MD5

    ccf62ad3dfd8e548453cf1f7df8d1857

    SHA1

    17a1c844f58b1f41ca8106521d42e4b176e324f5

    SHA256

    3a5e456be5dc18abad8de0760ba84d3dffc84a4d8af395d0e4afe688b3fa08cd

    SHA512

    dde62c64beb81d91f1f8ef6023e4172e2e088456e0faf4fa7187b35f41ac781f4f669065dc57e472a2dacc591837b6bbf30a90a58203a803bd42677d43b02981

  • C:\Users\Admin\AppData\Local\Temp\csrss.exe
    Filesize

    22KB

    MD5

    ccf62ad3dfd8e548453cf1f7df8d1857

    SHA1

    17a1c844f58b1f41ca8106521d42e4b176e324f5

    SHA256

    3a5e456be5dc18abad8de0760ba84d3dffc84a4d8af395d0e4afe688b3fa08cd

    SHA512

    dde62c64beb81d91f1f8ef6023e4172e2e088456e0faf4fa7187b35f41ac781f4f669065dc57e472a2dacc591837b6bbf30a90a58203a803bd42677d43b02981

  • C:\Users\Admin\AppData\Local\Temp\csrss.exe
    Filesize

    22KB

    MD5

    ccf62ad3dfd8e548453cf1f7df8d1857

    SHA1

    17a1c844f58b1f41ca8106521d42e4b176e324f5

    SHA256

    3a5e456be5dc18abad8de0760ba84d3dffc84a4d8af395d0e4afe688b3fa08cd

    SHA512

    dde62c64beb81d91f1f8ef6023e4172e2e088456e0faf4fa7187b35f41ac781f4f669065dc57e472a2dacc591837b6bbf30a90a58203a803bd42677d43b02981

  • C:\Users\Admin\AppData\Local\Temp\tmp5023.tmp
    Filesize

    8B

    MD5

    e9f50e7819b6e54a8dadcff1e1f3832b

    SHA1

    267d56bf84913c2ff9ac7301f43d0703aca6e810

    SHA256

    0356bfc3cbed5b4e99aa0df8fdf207b5d5de2b8d3746cc387fe87de72a5a098b

    SHA512

    f0808467e518cb9e26fae6dd8c41e61864e40422e973e85db256518210a46717777bed2e5259244badcbfa5d953ac836cbaa6540c45ae675386ccdf502a8e13a

  • C:\Users\Admin\AppData\Local\Temp\wininit.exe
    Filesize

    243KB

    MD5

    fbedb86513285d9260d98b144d442279

    SHA1

    5498e0011f73d3f6dc4c44c33725f332769539cd

    SHA256

    27526b2ea29fdd5fb723ff562654585f2d660edf5305fa6b9ec1122a5a858cbb

    SHA512

    d646446dd769173c9bcd4d6c82c508ad5db55e2cff7216fbadbc0d3e3811b228b50428fd8fe32b6bcd0d87c3a647d69f3ceff6d1bf89f5bc0af5117c8f1fb5b9

  • C:\Users\Admin\AppData\Local\Temp\wininit.exe
    Filesize

    243KB

    MD5

    fbedb86513285d9260d98b144d442279

    SHA1

    5498e0011f73d3f6dc4c44c33725f332769539cd

    SHA256

    27526b2ea29fdd5fb723ff562654585f2d660edf5305fa6b9ec1122a5a858cbb

    SHA512

    d646446dd769173c9bcd4d6c82c508ad5db55e2cff7216fbadbc0d3e3811b228b50428fd8fe32b6bcd0d87c3a647d69f3ceff6d1bf89f5bc0af5117c8f1fb5b9

  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
    Filesize

    341KB

    MD5

    22f0df01449ab75a278677e2a5e45290

    SHA1

    4bdcebdc66daf1d6caedd39ec5973d341fcebabe

    SHA256

    8402c22cce0b65a602a3cc6d8f12b27f3a287c1a884f387d5e82e65604d534d6

    SHA512

    0e954d9b505ed34acd40870252e57d1404d845f89750a2ae00052c949283f3eb9143b268fa76288349f0d10683e3e4b25bd7df7764b29739e6133a8eaf4e7a36

  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
    Filesize

    341KB

    MD5

    22f0df01449ab75a278677e2a5e45290

    SHA1

    4bdcebdc66daf1d6caedd39ec5973d341fcebabe

    SHA256

    8402c22cce0b65a602a3cc6d8f12b27f3a287c1a884f387d5e82e65604d534d6

    SHA512

    0e954d9b505ed34acd40870252e57d1404d845f89750a2ae00052c949283f3eb9143b268fa76288349f0d10683e3e4b25bd7df7764b29739e6133a8eaf4e7a36

  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
    Filesize

    341KB

    MD5

    22f0df01449ab75a278677e2a5e45290

    SHA1

    4bdcebdc66daf1d6caedd39ec5973d341fcebabe

    SHA256

    8402c22cce0b65a602a3cc6d8f12b27f3a287c1a884f387d5e82e65604d534d6

    SHA512

    0e954d9b505ed34acd40870252e57d1404d845f89750a2ae00052c949283f3eb9143b268fa76288349f0d10683e3e4b25bd7df7764b29739e6133a8eaf4e7a36

  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
    Filesize

    341KB

    MD5

    22f0df01449ab75a278677e2a5e45290

    SHA1

    4bdcebdc66daf1d6caedd39ec5973d341fcebabe

    SHA256

    8402c22cce0b65a602a3cc6d8f12b27f3a287c1a884f387d5e82e65604d534d6

    SHA512

    0e954d9b505ed34acd40870252e57d1404d845f89750a2ae00052c949283f3eb9143b268fa76288349f0d10683e3e4b25bd7df7764b29739e6133a8eaf4e7a36

  • C:\Windows\directx.sys
    Filesize

    45B

    MD5

    a62f32124091491b016946443a07b497

    SHA1

    82ba33a0b1c543f35d11de856d6d249d36c4a4b1

    SHA256

    c0e668b04ee2ce8d0996bf17560f11e2d0770ca2001a656960cd265b57673d1e

    SHA512

    5b31b7602199bc44ab4a119e44a10303f112dbc8dc63e336894a35f2f569010f1e864851633d943b28ae9bb5d723b26a130dad6877b51937dc08cb99b62900ae

  • C:\Windows\directx.sys
    Filesize

    84B

    MD5

    14cbc2ef7c752eeb0631ac41faa70e70

    SHA1

    feb214f5c4876b8af0fe3e44c17282a172692cca

    SHA256

    9fc149719efce4677c1e04f7b4edb4ec58d5719bd3cc0abd0134860b7c4852dc

    SHA512

    7c15746855a2c57ddf136c988903c2de3c46aaa9409cfd9ea5fac5ba8ce6591d3eae602e5b3099460a8312e41eba77adae592f3c5b3354a2997814b4c98bbdfd

  • C:\Windows\svchost.com
    Filesize

    40KB

    MD5

    36fd5e09c417c767a952b4609d73a54b

    SHA1

    299399c5a2403080a5bf67fb46faec210025b36d

    SHA256

    980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

    SHA512

    1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

  • C:\Windows\svchost.com
    Filesize

    40KB

    MD5

    36fd5e09c417c767a952b4609d73a54b

    SHA1

    299399c5a2403080a5bf67fb46faec210025b36d

    SHA256

    980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

    SHA512

    1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

  • C:\Windows\svchost.com
    Filesize

    40KB

    MD5

    36fd5e09c417c767a952b4609d73a54b

    SHA1

    299399c5a2403080a5bf67fb46faec210025b36d

    SHA256

    980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

    SHA512

    1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

  • C:\Windows\svchost.com
    Filesize

    40KB

    MD5

    36fd5e09c417c767a952b4609d73a54b

    SHA1

    299399c5a2403080a5bf67fb46faec210025b36d

    SHA256

    980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

    SHA512

    1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

  • C:\odt\OFFICE~1.EXE
    Filesize

    5.1MB

    MD5

    02c3d242fe142b0eabec69211b34bc55

    SHA1

    ea0a4a6d6078b362f7b3a4ad1505ce49957dc16e

    SHA256

    2a1ed24be7e3859b46ec3ebc316789ead5f12055853f86a9656e04b4bb771842

    SHA512

    0efb08492eaaa2e923beddc21566e98fbbef3a102f9415ff310ec616f5c84fd2ba3a7025b05e01c0bdf37e5e2f64dfd845f9254a376144cc7d827e7577dbb099

  • memory/656-215-0x00007FFAAAC70000-0x00007FFAAB731000-memory.dmp
    Filesize

    10.8MB

  • memory/656-190-0x0000000000000000-mapping.dmp
  • memory/656-199-0x00007FFAAAC70000-0x00007FFAAB731000-memory.dmp
    Filesize

    10.8MB

  • memory/1304-158-0x0000000005860000-0x00000000058B6000-memory.dmp
    Filesize

    344KB

  • memory/1304-150-0x0000000000CE0000-0x0000000000CF0000-memory.dmp
    Filesize

    64KB

  • memory/1304-133-0x0000000000000000-mapping.dmp
  • memory/1304-151-0x00000000054E0000-0x000000000557C000-memory.dmp
    Filesize

    624KB

  • memory/1304-153-0x0000000005BF0000-0x0000000006194000-memory.dmp
    Filesize

    5.6MB

  • memory/1304-154-0x0000000005640000-0x00000000056D2000-memory.dmp
    Filesize

    584KB

  • memory/1304-156-0x00000000055E0000-0x00000000055EA000-memory.dmp
    Filesize

    40KB

  • memory/1528-143-0x0000000000000000-mapping.dmp
  • memory/1532-208-0x0000000000000000-mapping.dmp
  • memory/1640-213-0x0000000000000000-mapping.dmp
  • memory/1648-193-0x0000000073780000-0x0000000073D31000-memory.dmp
    Filesize

    5.7MB

  • memory/1648-214-0x0000000073780000-0x0000000073D31000-memory.dmp
    Filesize

    5.7MB

  • memory/1648-187-0x0000000000000000-mapping.dmp
  • memory/1796-130-0x0000000000000000-mapping.dmp
  • memory/1816-209-0x0000000000000000-mapping.dmp
  • memory/2124-223-0x00007FFAAAC70000-0x00007FFAAB731000-memory.dmp
    Filesize

    10.8MB

  • memory/2124-222-0x00007FFAAAC70000-0x00007FFAAB731000-memory.dmp
    Filesize

    10.8MB

  • memory/3240-218-0x00007FFAAAC70000-0x00007FFAAB731000-memory.dmp
    Filesize

    10.8MB

  • memory/3240-217-0x00007FFAAAC70000-0x00007FFAAB731000-memory.dmp
    Filesize

    10.8MB

  • memory/3896-178-0x0000000000000000-mapping.dmp
  • memory/3976-155-0x0000000073780000-0x0000000073D31000-memory.dmp
    Filesize

    5.7MB

  • memory/3976-189-0x0000000073780000-0x0000000073D31000-memory.dmp
    Filesize

    5.7MB

  • memory/3976-140-0x0000000000000000-mapping.dmp
  • memory/4432-136-0x0000000000000000-mapping.dmp
  • memory/4544-148-0x0000000000000000-mapping.dmp
  • memory/4544-170-0x000000001CFA0000-0x000000001CFDC000-memory.dmp
    Filesize

    240KB

  • memory/4544-152-0x0000000000D60000-0x0000000000D68000-memory.dmp
    Filesize

    32KB

  • memory/4544-165-0x0000000001540000-0x0000000001552000-memory.dmp
    Filesize

    72KB

  • memory/4544-157-0x00007FFAAAC70000-0x00007FFAAB731000-memory.dmp
    Filesize

    10.8MB

  • memory/4544-195-0x00007FFAAAC70000-0x00007FFAAB731000-memory.dmp
    Filesize

    10.8MB

  • memory/4716-182-0x0000000000000000-mapping.dmp
  • memory/4828-210-0x0000000000000000-mapping.dmp