Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2022 05:40

General

  • Target

    tmp.exe

  • Size

    260KB

  • MD5

    2c7eeef34a1b35c0b025c43c7233f453

  • SHA1

    82e361e77aaf426fcc8d18a46391ce2bf064f493

  • SHA256

    cc7dc07df5e85f948998b1d711b7ea362e529799b2f47d35f256ccd901ab3af9

  • SHA512

    50178b34dadedcd370d031b668906ed3016fd79706b87fd665cfdab942a487625d552629d7ec97a300b63b012a412226b0c128a88e96a17f6189896cb2473010

  • SSDEEP

    6144:8ea7tvhFs3Huy3Pu2eAHNabHtqY+dpEnPM43:67FPeOy3Pu8hNdpEk4

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

SKYNET

C2

173.225.115.99:7702

Mutex

938cda17-a814-4925-8420-83a35a350164

Attributes
  • encryption_key

    F04A75E6507173FAEEC2BB82C564030A5E8413FF

  • install_name

    FileHistory.exe

  • log_directory

    Logs

  • reconnect_delay

    4000

  • startup_key

    FileHistory

  • subdirectory

    FileHistory

Extracted

Family

orcus

C2

146.70.143.176:81

Mutex

712d31c7a3f54904a08d968a15b836e9

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %programfiles%\orc\orc.exe

  • reconnect_delay

    10000

  • registry_keyname

    orc

  • taskscheduler_taskname

    orc

  • watchdog_path

    AppData\Watchdog.exe

Signatures

  • Contains code to disable Windows Defender 3 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus main payload 6 IoCs
  • PlagueBot

    PlagueBot is an open source Bot written in Pascal.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 7 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Orcurs Rat Executable 7 IoCs
  • PlagueBot Executable 7 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 20 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    PID:1300
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\Users\Admin\AppData\Local\Temp\joined.exe
        "C:\Users\Admin\AppData\Local\Temp\joined.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Users\Admin\AppData\Local\Temp\sqls677.exe
          "C:\Users\Admin\AppData\Local\Temp\sqls677.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Modifies security service
          • Executes dropped EXE
          • Windows security modification
          • Suspicious use of WriteProcessMemory
          PID:1812
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "powershell" Get-MpPreference -verbose
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1492
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\sqls677.exe" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:324
      • C:\Users\Admin\AppData\Local\Temp\FileHistory.exe
        "C:\Users\Admin\AppData\Local\Temp\FileHistory.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1904
      • C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe
        "C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:544
        • C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe
          "C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:932
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Users\Admin\AppData\Local\Temp\nitrsso64.exe
        "C:\Users\Admin\AppData\Local\Temp\nitrsso64.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1440
        • C:\Windows\system32\schtasks.exe
          schtasks /create /sc minute /mo 1 /tn "nitro64" /tr "C:\Users\Admin\AppData\Local\nitrsso64.exe"
          4⤵
          • Creates scheduled task(s)
          PID:584
      • C:\Users\Admin\AppData\Local\Temp\FileHistory.exe
        "C:\Users\Admin\AppData\Local\Temp\FileHistory.exe"
        3⤵
        • Executes dropped EXE
        PID:956
        • C:\Windows\system32\schtasks.exe
          "schtasks" /create /tn "FileHistory" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\FileHistory.exe" /rl HIGHEST /f
          4⤵
          • Creates scheduled task(s)
          PID:840
        • C:\Users\Admin\AppData\Roaming\FileHistory\FileHistory.exe
          "C:\Users\Admin\AppData\Roaming\FileHistory\FileHistory.exe"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:824
          • C:\Windows\system32\schtasks.exe
            "schtasks" /create /tn "FileHistory" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\FileHistory\FileHistory.exe" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:1396
      • C:\Users\Admin\AppData\Local\Temp\orc.exe
        "C:\Users\Admin\AppData\Local\Temp\orc.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1732
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\di5ep0or.cmdline"
          4⤵
            PID:1220
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES56D9.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC56D8.tmp"
              5⤵
                PID:1056
            • C:\Windows\SysWOW64\WindowsInput.exe
              "C:\Windows\SysWOW64\WindowsInput.exe" --install
              4⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              PID:1492
            • C:\Program Files\orc\orc.exe
              "C:\Program Files\orc\orc.exe"
              4⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1928
              • C:\Users\Admin\AppData\Roaming\Watchdog.exe
                "C:\Users\Admin\AppData\Roaming\Watchdog.exe" /launchSelfAndExit "C:\Program Files\orc\orc.exe" 1928 /protectFile
                5⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1224
                • C:\Users\Admin\AppData\Roaming\Watchdog.exe
                  "C:\Users\Admin\AppData\Roaming\Watchdog.exe" /watchProcess "C:\Program Files\orc\orc.exe" 1928 "/protectFile"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1104
          • C:\Users\Admin\Downloads\plage.exe
            "C:\Users\Admin\Downloads\plage.exe"
            3⤵
            • Executes dropped EXE
            • Drops startup file
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1908
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Create /TN "WinManager" /XML "C:\Users\Admin\AppData\Local\Temp\NewTask.xml"
              4⤵
              • Creates scheduled task(s)
              PID:1508
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Query /FO "LIST" /TN "WinManager"
              4⤵
                PID:1236
              • C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe
                "C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe" /wait
                4⤵
                • Executes dropped EXE
                PID:952
            • C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe
              "C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe"
              3⤵
              • Executes dropped EXE
              PID:564
        • C:\Windows\SysWOW64\WindowsInput.exe
          "C:\Windows\SysWOW64\WindowsInput.exe"
          1⤵
          • Executes dropped EXE
          PID:1912
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {2EF301BD-7814-434E-8753-F728C16BCA33} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]
          1⤵
          • Loads dropped DLL
          PID:2028
          • C:\Program Files\orc\orc.exe
            "C:\Program Files\orc\orc.exe"
            2⤵
            • Executes dropped EXE
            PID:948
          • C:\Users\Admin\AppData\Local\nitrsso64.exe
            C:\Users\Admin\AppData\Local\nitrsso64.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:700
          • C:\Users\Admin\AppData\Local\nitrsso64.exe
            C:\Users\Admin\AppData\Local\nitrsso64.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:932

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scheduled Task

        1
        T1053

        Persistence

        Modify Existing Service

        2
        T1031

        Registry Run Keys / Startup Folder

        1
        T1060

        Scheduled Task

        1
        T1053

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Defense Evasion

        Modify Registry

        4
        T1112

        Disabling Security Tools

        2
        T1089

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\orc\orc.exe
          Filesize

          916KB

          MD5

          ac0431f34683bcbbb2cf23aaf29ea8cf

          SHA1

          275ec0e362cb074d5f080aaa41c25a8ecebe3205

          SHA256

          1780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb

          SHA512

          156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c

        • C:\Program Files\orc\orc.exe
          Filesize

          916KB

          MD5

          ac0431f34683bcbbb2cf23aaf29ea8cf

          SHA1

          275ec0e362cb074d5f080aaa41c25a8ecebe3205

          SHA256

          1780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb

          SHA512

          156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c

        • C:\Program Files\orc\orc.exe
          Filesize

          916KB

          MD5

          ac0431f34683bcbbb2cf23aaf29ea8cf

          SHA1

          275ec0e362cb074d5f080aaa41c25a8ecebe3205

          SHA256

          1780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb

          SHA512

          156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c

        • C:\Program Files\orc\orc.exe.config
          Filesize

          357B

          MD5

          a2b76cea3a59fa9af5ea21ff68139c98

          SHA1

          35d76475e6a54c168f536e30206578babff58274

          SHA256

          f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

          SHA512

          b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3XPFXPM5\nitro64[1].exe
          Filesize

          54KB

          MD5

          ebd7887003feaad033856253c14de51c

          SHA1

          1ef092f6c79df2e57c8a49469e4b44815d384948

          SHA256

          faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315

          SHA512

          969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a

        • C:\Users\Admin\AppData\Local\Temp\FileHistory.exe
          Filesize

          2.8MB

          MD5

          a73e083297e46d8e23f012d66a08f3a3

          SHA1

          83527df5a484494894ad2c71908a170a115751af

          SHA256

          0ef4667fb2bd5b2184048913181bd7b03bf63d0e7959214b879efa4d6b75ad5d

          SHA512

          78c2231eb48ed1f246b960b1afbd2b6b1c9b99495b2a1e8b45ea1aa90a21fbd23fd10223dbc7eba9aa057b5932290e20cdcfe2df583b1a93d2cea2bf350495f2

        • C:\Users\Admin\AppData\Local\Temp\FileHistory.exe
          Filesize

          2.8MB

          MD5

          a73e083297e46d8e23f012d66a08f3a3

          SHA1

          83527df5a484494894ad2c71908a170a115751af

          SHA256

          0ef4667fb2bd5b2184048913181bd7b03bf63d0e7959214b879efa4d6b75ad5d

          SHA512

          78c2231eb48ed1f246b960b1afbd2b6b1c9b99495b2a1e8b45ea1aa90a21fbd23fd10223dbc7eba9aa057b5932290e20cdcfe2df583b1a93d2cea2bf350495f2

        • C:\Users\Admin\AppData\Local\Temp\FileHistory.exe
          Filesize

          2.8MB

          MD5

          a73e083297e46d8e23f012d66a08f3a3

          SHA1

          83527df5a484494894ad2c71908a170a115751af

          SHA256

          0ef4667fb2bd5b2184048913181bd7b03bf63d0e7959214b879efa4d6b75ad5d

          SHA512

          78c2231eb48ed1f246b960b1afbd2b6b1c9b99495b2a1e8b45ea1aa90a21fbd23fd10223dbc7eba9aa057b5932290e20cdcfe2df583b1a93d2cea2bf350495f2

        • C:\Users\Admin\AppData\Local\Temp\NewTask.xml
          Filesize

          1KB

          MD5

          2538af6b04d2fe91508f51cbdb515bfc

          SHA1

          1ce23c8189281448060c2800bea8256589f420fe

          SHA256

          4d307abeab169dcb5e63064e9ce2327ab989d9552ca91df68c2ae37d7dc5a5c0

          SHA512

          a3a10ce4f79ffbef9ee8901980f48a77a0470bcd1dffba5117504a3c29d27c26f1e91544f8be3ab9441f266f6f28a7bbc22e809dc38177f9aa44fa608d64f739

        • C:\Users\Admin\AppData\Local\Temp\RES56D9.tmp
          Filesize

          1KB

          MD5

          25ead29088fdf7b62ff09c5ad88197b6

          SHA1

          d31f8cde397c68833a2b4144698f139cc19a0b0d

          SHA256

          c09742ed3b2a05164602200d40409f7987e8343480cd270fa67560873b282136

          SHA512

          9b9ae12ff66dc1737bb8126bbe3d952c2306b510dd2381e370019ebe926fdc74bfe449287661914377194e821777ebd2b43ad6dd29341e154058c6cc807fa51f

        • C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe
          Filesize

          7.6MB

          MD5

          cb565c1afd8469f43dd6917af55b733f

          SHA1

          e71a56a7b13536d686ab9f4f2492d60c02a7790e

          SHA256

          4a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056

          SHA512

          d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645

        • C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe
          Filesize

          7.6MB

          MD5

          cb565c1afd8469f43dd6917af55b733f

          SHA1

          e71a56a7b13536d686ab9f4f2492d60c02a7790e

          SHA256

          4a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056

          SHA512

          d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645

        • C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe
          Filesize

          7.6MB

          MD5

          cb565c1afd8469f43dd6917af55b733f

          SHA1

          e71a56a7b13536d686ab9f4f2492d60c02a7790e

          SHA256

          4a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056

          SHA512

          d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645

        • C:\Users\Admin\AppData\Local\Temp\blmkgrp.exe
          Filesize

          7.6MB

          MD5

          cb565c1afd8469f43dd6917af55b733f

          SHA1

          e71a56a7b13536d686ab9f4f2492d60c02a7790e

          SHA256

          4a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056

          SHA512

          d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645

        • C:\Users\Admin\AppData\Local\Temp\di5ep0or.dll
          Filesize

          76KB

          MD5

          001291751646b3a0b04cae543e0f7776

          SHA1

          3e5102398e2b690dc4d5a2d71451f89517d67904

          SHA256

          b468c736a346b982040e4fd839461b2a73696a8eb92aae40f9bb508ed1ee4f93

          SHA512

          78b3e7dd7325b1188e2b6506c60178069e6f71ef9eba2c7736822d612bc65e376e259d0a46b89107f6b5851b8578d58ef54c31ed81a63a1011560b4e36520fc1

        • C:\Users\Admin\AppData\Local\Temp\github.com_Blank-c_5442\python310.dll
          Filesize

          1.5MB

          MD5

          e06ce8146da66871aa8aeedc950fd12b

          SHA1

          6ee749bdd0bc857a41ac8018c5553e895784b961

          SHA256

          aabd51782e4edb80561dd2ff065079a8381c7c86a6db1c6884bc09c73cde07a4

          SHA512

          0d8c16832d5242595eff4993a1563de09f1eba988ca6e9bcd9afdb0891a164ea2972ac9df40f575e8e1021d535c3b807ce025bc15788f08f84c71246d64f1198

        • C:\Users\Admin\AppData\Local\Temp\joined.exe
          Filesize

          56KB

          MD5

          cf96dc2c8aa103b404761701c0e9e38e

          SHA1

          84c300ec07b1182ee095e9550395e1d5669934ca

          SHA256

          6dc79af279e0324e3afb2621d812510d47fe29226cf3af1b37beee37fe2cada8

          SHA512

          2e66127e212f014da3cb2f2e0fd2b969639d3e7ffb18d343e107e0449d889ebc262d96ac7b47ca8b95909790d7175afd509b9e3a1d7f34d5cb0bcb49058a9ca5

        • C:\Users\Admin\AppData\Local\Temp\joined.exe
          Filesize

          56KB

          MD5

          cf96dc2c8aa103b404761701c0e9e38e

          SHA1

          84c300ec07b1182ee095e9550395e1d5669934ca

          SHA256

          6dc79af279e0324e3afb2621d812510d47fe29226cf3af1b37beee37fe2cada8

          SHA512

          2e66127e212f014da3cb2f2e0fd2b969639d3e7ffb18d343e107e0449d889ebc262d96ac7b47ca8b95909790d7175afd509b9e3a1d7f34d5cb0bcb49058a9ca5

        • C:\Users\Admin\AppData\Local\Temp\nitrsso64.exe
          Filesize

          54KB

          MD5

          ebd7887003feaad033856253c14de51c

          SHA1

          1ef092f6c79df2e57c8a49469e4b44815d384948

          SHA256

          faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315

          SHA512

          969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a

        • C:\Users\Admin\AppData\Local\Temp\nitrsso64.exe
          Filesize

          54KB

          MD5

          ebd7887003feaad033856253c14de51c

          SHA1

          1ef092f6c79df2e57c8a49469e4b44815d384948

          SHA256

          faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315

          SHA512

          969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a

        • C:\Users\Admin\AppData\Local\Temp\orc.exe
          Filesize

          916KB

          MD5

          ac0431f34683bcbbb2cf23aaf29ea8cf

          SHA1

          275ec0e362cb074d5f080aaa41c25a8ecebe3205

          SHA256

          1780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb

          SHA512

          156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c

        • C:\Users\Admin\AppData\Local\Temp\orc.exe
          Filesize

          916KB

          MD5

          ac0431f34683bcbbb2cf23aaf29ea8cf

          SHA1

          275ec0e362cb074d5f080aaa41c25a8ecebe3205

          SHA256

          1780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb

          SHA512

          156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c

        • C:\Users\Admin\AppData\Local\Temp\sqls677.exe
          Filesize

          16KB

          MD5

          d7f2c50640108c104286ef71923c70d7

          SHA1

          7ccd84daed8ca9572ae3a8c98c38adf753fb8f33

          SHA256

          53aef6261df3f802393d9196a5c87e69d1e07e2aaff45a606344b91f5801255a

          SHA512

          eeb34a038920d0ff833f3140afd256dd6a0ea589052223d9bf61135d4557e8302e582782893348a7d40ef07af0c68a3068a052822d244ad65b7365cd0aeea0f0

        • C:\Users\Admin\AppData\Local\Temp\sqls677.exe
          Filesize

          16KB

          MD5

          d7f2c50640108c104286ef71923c70d7

          SHA1

          7ccd84daed8ca9572ae3a8c98c38adf753fb8f33

          SHA256

          53aef6261df3f802393d9196a5c87e69d1e07e2aaff45a606344b91f5801255a

          SHA512

          eeb34a038920d0ff833f3140afd256dd6a0ea589052223d9bf61135d4557e8302e582782893348a7d40ef07af0c68a3068a052822d244ad65b7365cd0aeea0f0

        • C:\Users\Admin\AppData\Local\nitrsso64.exe
          Filesize

          54KB

          MD5

          ebd7887003feaad033856253c14de51c

          SHA1

          1ef092f6c79df2e57c8a49469e4b44815d384948

          SHA256

          faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315

          SHA512

          969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a

        • C:\Users\Admin\AppData\Local\nitrsso64.exe
          Filesize

          54KB

          MD5

          ebd7887003feaad033856253c14de51c

          SHA1

          1ef092f6c79df2e57c8a49469e4b44815d384948

          SHA256

          faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315

          SHA512

          969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a

        • C:\Users\Admin\AppData\Local\nitrsso64.exe
          Filesize

          54KB

          MD5

          ebd7887003feaad033856253c14de51c

          SHA1

          1ef092f6c79df2e57c8a49469e4b44815d384948

          SHA256

          faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315

          SHA512

          969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a

        • C:\Users\Admin\AppData\Roaming\Watchdog.exe
          Filesize

          9KB

          MD5

          913967b216326e36a08010fb70f9dba3

          SHA1

          7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

          SHA256

          8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

          SHA512

          c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

        • C:\Users\Admin\AppData\Roaming\Watchdog.exe
          Filesize

          9KB

          MD5

          913967b216326e36a08010fb70f9dba3

          SHA1

          7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

          SHA256

          8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

          SHA512

          c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

        • C:\Users\Admin\AppData\Roaming\Watchdog.exe
          Filesize

          9KB

          MD5

          913967b216326e36a08010fb70f9dba3

          SHA1

          7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

          SHA256

          8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

          SHA512

          c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

        • C:\Users\Admin\AppData\Roaming\Watchdog.exe.config
          Filesize

          357B

          MD5

          a2b76cea3a59fa9af5ea21ff68139c98

          SHA1

          35d76475e6a54c168f536e30206578babff58274

          SHA256

          f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

          SHA512

          b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

        • C:\Users\Admin\AppData\Roaming\discordnitro\winmgr.exe
          Filesize

          967KB

          MD5

          b63bb68654e7be72058398809d6c4754

          SHA1

          4a7b43488029a2d4c960c9ee4431b99c8640a4b0

          SHA256

          8db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe

          SHA512

          c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a

        • C:\Users\Admin\Downloads\plage.exe
          Filesize

          967KB

          MD5

          b03ccade490854df220914c4430967e2

          SHA1

          1911a59e8c4b427d3fbc8fc9c794886bd2d81305

          SHA256

          81cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961

          SHA512

          0c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36

        • C:\Users\Admin\Downloads\plage.exe
          Filesize

          967KB

          MD5

          b03ccade490854df220914c4430967e2

          SHA1

          1911a59e8c4b427d3fbc8fc9c794886bd2d81305

          SHA256

          81cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961

          SHA512

          0c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36

        • C:\Windows\SysWOW64\WindowsInput.exe
          Filesize

          21KB

          MD5

          e6fcf516d8ed8d0d4427f86e08d0d435

          SHA1

          c7691731583ab7890086635cb7f3e4c22ca5e409

          SHA256

          8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

          SHA512

          c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

        • C:\Windows\SysWOW64\WindowsInput.exe
          Filesize

          21KB

          MD5

          e6fcf516d8ed8d0d4427f86e08d0d435

          SHA1

          c7691731583ab7890086635cb7f3e4c22ca5e409

          SHA256

          8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

          SHA512

          c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

        • C:\Windows\SysWOW64\WindowsInput.exe
          Filesize

          21KB

          MD5

          e6fcf516d8ed8d0d4427f86e08d0d435

          SHA1

          c7691731583ab7890086635cb7f3e4c22ca5e409

          SHA256

          8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

          SHA512

          c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

        • C:\Windows\SysWOW64\WindowsInput.exe.config
          Filesize

          357B

          MD5

          a2b76cea3a59fa9af5ea21ff68139c98

          SHA1

          35d76475e6a54c168f536e30206578babff58274

          SHA256

          f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

          SHA512

          b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

        • \??\c:\Users\Admin\AppData\Local\Temp\CSC56D8.tmp
          Filesize

          676B

          MD5

          d9d8221bc9cb74d1b8e11d38cee18653

          SHA1

          4246d717fde1a5fc07bad686913d9faa263b39d7

          SHA256

          29b5b2650a384d61223eb4a84a6b5c78be401021c7ea7f2cb91e6a71b7ad162c

          SHA512

          0b889e90b6a2bf1204b3e4c4cb1326784acb5a6901026e9ef95ac625ebdabbf74f87d95d374f310cc44c2459d5e4e5795b1844947eeb614ef2cd33b694fc2408

        • \??\c:\Users\Admin\AppData\Local\Temp\di5ep0or.0.cs
          Filesize

          208KB

          MD5

          2b14ae8b54d216abf4d228493ceca44a

          SHA1

          d134351498e4273e9d6391153e35416bc743adef

          SHA256

          4e1cc3da1f7bf92773aae6cffa6d61bfc3e25aead3ad947f6215f93a053f346c

          SHA512

          5761b605add10ae3ef80f3b8706c8241b4e8abe4ac3ce36b7be8a97d08b08da5a72fedd5e976b3c9e1c463613a943ebb5d323e6a075ef6c7c3b1abdc0d53ac05

        • \??\c:\Users\Admin\AppData\Local\Temp\di5ep0or.cmdline
          Filesize

          349B

          MD5

          e2cdd3bf7b4ea92e8afc189221657b25

          SHA1

          b37fb02bc361ef8d7821435522714e64ab447637

          SHA256

          3bd6c9e026e44c80163a7548ea7ff6791f10855c20262741dffe67473ce267db

          SHA512

          41f2cf941c31690f686f9f1975623fdf501930860209aca0af095c67936ec4ef4304d649d459d56d5f84e8ba629c2c5be723236f51903deedbbe5d929499247f

        • \Users\Admin\AppData\Local\Temp\FileHistory.exe
          Filesize

          2.8MB

          MD5

          a73e083297e46d8e23f012d66a08f3a3

          SHA1

          83527df5a484494894ad2c71908a170a115751af

          SHA256

          0ef4667fb2bd5b2184048913181bd7b03bf63d0e7959214b879efa4d6b75ad5d

          SHA512

          78c2231eb48ed1f246b960b1afbd2b6b1c9b99495b2a1e8b45ea1aa90a21fbd23fd10223dbc7eba9aa057b5932290e20cdcfe2df583b1a93d2cea2bf350495f2

        • \Users\Admin\AppData\Local\Temp\FileHistory.exe
          Filesize

          2.8MB

          MD5

          a73e083297e46d8e23f012d66a08f3a3

          SHA1

          83527df5a484494894ad2c71908a170a115751af

          SHA256

          0ef4667fb2bd5b2184048913181bd7b03bf63d0e7959214b879efa4d6b75ad5d

          SHA512

          78c2231eb48ed1f246b960b1afbd2b6b1c9b99495b2a1e8b45ea1aa90a21fbd23fd10223dbc7eba9aa057b5932290e20cdcfe2df583b1a93d2cea2bf350495f2

        • \Users\Admin\AppData\Local\Temp\blmkgrp.exe
          Filesize

          7.6MB

          MD5

          cb565c1afd8469f43dd6917af55b733f

          SHA1

          e71a56a7b13536d686ab9f4f2492d60c02a7790e

          SHA256

          4a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056

          SHA512

          d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645

        • \Users\Admin\AppData\Local\Temp\blmkgrp.exe
          Filesize

          7.6MB

          MD5

          cb565c1afd8469f43dd6917af55b733f

          SHA1

          e71a56a7b13536d686ab9f4f2492d60c02a7790e

          SHA256

          4a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056

          SHA512

          d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645

        • \Users\Admin\AppData\Local\Temp\blmkgrp.exe
          Filesize

          7.6MB

          MD5

          cb565c1afd8469f43dd6917af55b733f

          SHA1

          e71a56a7b13536d686ab9f4f2492d60c02a7790e

          SHA256

          4a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056

          SHA512

          d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645

        • \Users\Admin\AppData\Local\Temp\blmkgrp.exe
          Filesize

          7.6MB

          MD5

          cb565c1afd8469f43dd6917af55b733f

          SHA1

          e71a56a7b13536d686ab9f4f2492d60c02a7790e

          SHA256

          4a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056

          SHA512

          d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645

        • \Users\Admin\AppData\Local\Temp\blmkgrp.exe
          Filesize

          7.6MB

          MD5

          cb565c1afd8469f43dd6917af55b733f

          SHA1

          e71a56a7b13536d686ab9f4f2492d60c02a7790e

          SHA256

          4a6b790629a17abb31de40da6a9faafdedbbc794f3e23816776621a83b068056

          SHA512

          d4ae535bdc800581c0fbcd186edd9d03067c08280376f06ec2e96e3118eb682663de260be6e756a85c4f6240fa9ba2c1ab265b54a56b57865b273af68d650645

        • \Users\Admin\AppData\Local\Temp\github.com_Blank-c_5442\python310.dll
          Filesize

          1.5MB

          MD5

          e06ce8146da66871aa8aeedc950fd12b

          SHA1

          6ee749bdd0bc857a41ac8018c5553e895784b961

          SHA256

          aabd51782e4edb80561dd2ff065079a8381c7c86a6db1c6884bc09c73cde07a4

          SHA512

          0d8c16832d5242595eff4993a1563de09f1eba988ca6e9bcd9afdb0891a164ea2972ac9df40f575e8e1021d535c3b807ce025bc15788f08f84c71246d64f1198

        • \Users\Admin\AppData\Local\Temp\joined.exe
          Filesize

          56KB

          MD5

          cf96dc2c8aa103b404761701c0e9e38e

          SHA1

          84c300ec07b1182ee095e9550395e1d5669934ca

          SHA256

          6dc79af279e0324e3afb2621d812510d47fe29226cf3af1b37beee37fe2cada8

          SHA512

          2e66127e212f014da3cb2f2e0fd2b969639d3e7ffb18d343e107e0449d889ebc262d96ac7b47ca8b95909790d7175afd509b9e3a1d7f34d5cb0bcb49058a9ca5

        • \Users\Admin\AppData\Local\Temp\joined.exe
          Filesize

          56KB

          MD5

          cf96dc2c8aa103b404761701c0e9e38e

          SHA1

          84c300ec07b1182ee095e9550395e1d5669934ca

          SHA256

          6dc79af279e0324e3afb2621d812510d47fe29226cf3af1b37beee37fe2cada8

          SHA512

          2e66127e212f014da3cb2f2e0fd2b969639d3e7ffb18d343e107e0449d889ebc262d96ac7b47ca8b95909790d7175afd509b9e3a1d7f34d5cb0bcb49058a9ca5

        • \Users\Admin\AppData\Local\Temp\nitrsso64.exe
          Filesize

          54KB

          MD5

          ebd7887003feaad033856253c14de51c

          SHA1

          1ef092f6c79df2e57c8a49469e4b44815d384948

          SHA256

          faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315

          SHA512

          969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a

        • \Users\Admin\AppData\Local\Temp\orc.exe
          Filesize

          916KB

          MD5

          ac0431f34683bcbbb2cf23aaf29ea8cf

          SHA1

          275ec0e362cb074d5f080aaa41c25a8ecebe3205

          SHA256

          1780430ff5ad71b8c89b9c59d2924b16cb7fd07da479b8b394846c792f7523cb

          SHA512

          156da3158d29d293daf9a74cf04d855ec162836fef87473afcc861688630f2da01234e1f40a4f84235ba457c0a6ae1770c3cc55fb0375cbea6813d0186a87b9c

        • \Users\Admin\AppData\Local\nitrsso64.exe
          Filesize

          54KB

          MD5

          ebd7887003feaad033856253c14de51c

          SHA1

          1ef092f6c79df2e57c8a49469e4b44815d384948

          SHA256

          faca607d5b505b97923a02c6a7b92517aaa6523d611126609663b0deaf23a315

          SHA512

          969b45cad215ce2632e044b0d5712a7dfdd1c43083477fc1277a981d3771d2738e0972dc81c82cc8fb198c345b5afa235c306ffb85b8c5f493482fc70d8d929a

        • \Users\Admin\AppData\Roaming\discordnitro\winmgr.exe
          Filesize

          967KB

          MD5

          b63bb68654e7be72058398809d6c4754

          SHA1

          4a7b43488029a2d4c960c9ee4431b99c8640a4b0

          SHA256

          8db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe

          SHA512

          c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a

        • \Users\Admin\AppData\Roaming\discordnitro\winmgr.exe
          Filesize

          967KB

          MD5

          b63bb68654e7be72058398809d6c4754

          SHA1

          4a7b43488029a2d4c960c9ee4431b99c8640a4b0

          SHA256

          8db43542d501e7d65d0f1db96785d875bc7da5a51a76ae943fcd3222b66412fe

          SHA512

          c67280896aa63894933a6058d17a2eb9cea484f5293c095704baaf9f177d9e2779951d803548294584070eb95a3428b52eec9fd5fc1a7da74a6305e7c496e48a

        • \Users\Admin\Downloads\plage.exe
          Filesize

          967KB

          MD5

          b03ccade490854df220914c4430967e2

          SHA1

          1911a59e8c4b427d3fbc8fc9c794886bd2d81305

          SHA256

          81cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961

          SHA512

          0c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36

        • \Users\Admin\Downloads\plage.exe
          Filesize

          967KB

          MD5

          b03ccade490854df220914c4430967e2

          SHA1

          1911a59e8c4b427d3fbc8fc9c794886bd2d81305

          SHA256

          81cb1fa3507209f360261e795cc68622c4163cbb0c6082dc7d8358a04492f961

          SHA512

          0c05ff99f2d2f448c431073b9a339e6dc1ccab43c9442be44edfd493c3d4d9bd604a0deb792b91295571817113c309bafc6d230b470a4874493561bd5aa9bc36

        • memory/324-82-0x0000000000000000-mapping.dmp
        • memory/544-144-0x0000000000000000-mapping.dmp
        • memory/564-137-0x0000000000000000-mapping.dmp
        • memory/584-105-0x0000000000000000-mapping.dmp
        • memory/700-178-0x0000000000000000-mapping.dmp
        • memory/700-181-0x00000000010F0000-0x0000000001102000-memory.dmp
          Filesize

          72KB

        • memory/824-107-0x0000000000F90000-0x000000000125A000-memory.dmp
          Filesize

          2.8MB

        • memory/868-55-0x0000000075131000-0x0000000075133000-memory.dmp
          Filesize

          8KB

        • memory/868-54-0x0000000000400000-0x0000000000444000-memory.dmp
          Filesize

          272KB

        • memory/932-182-0x0000000000000000-mapping.dmp
        • memory/932-159-0x000007FEEEF50000-0x000007FEEF3BF000-memory.dmp
          Filesize

          4.4MB

        • memory/932-154-0x0000000000000000-mapping.dmp
        • memory/948-164-0x0000000000000000-mapping.dmp
        • memory/952-121-0x0000000000000000-mapping.dmp
        • memory/956-91-0x0000000000000000-mapping.dmp
        • memory/1056-127-0x0000000000000000-mapping.dmp
        • memory/1104-172-0x0000000000000000-mapping.dmp
        • memory/1220-124-0x0000000000000000-mapping.dmp
        • memory/1224-170-0x0000000000BD0000-0x0000000000BD8000-memory.dmp
          Filesize

          32KB

        • memory/1224-166-0x0000000000000000-mapping.dmp
        • memory/1236-118-0x0000000000000000-mapping.dmp
        • memory/1396-114-0x0000000000000000-mapping.dmp
        • memory/1440-87-0x0000000001240000-0x0000000001252000-memory.dmp
          Filesize

          72KB

        • memory/1440-89-0x0000000000180000-0x000000000018A000-memory.dmp
          Filesize

          40KB

        • memory/1440-84-0x0000000000000000-mapping.dmp
        • memory/1440-88-0x0000000000150000-0x0000000000166000-memory.dmp
          Filesize

          88KB

        • memory/1492-135-0x0000000000A30000-0x0000000000A3C000-memory.dmp
          Filesize

          48KB

        • memory/1492-131-0x0000000000000000-mapping.dmp
        • memory/1492-78-0x0000000000000000-mapping.dmp
        • memory/1492-80-0x0000000071060000-0x000000007160B000-memory.dmp
          Filesize

          5.7MB

        • memory/1492-81-0x0000000071060000-0x000000007160B000-memory.dmp
          Filesize

          5.7MB

        • memory/1508-116-0x0000000000000000-mapping.dmp
        • memory/1732-104-0x000007FEEBA80000-0x000007FEEC4A3000-memory.dmp
          Filesize

          10.1MB

        • memory/1732-106-0x000007FEEA9E0000-0x000007FEEBA76000-memory.dmp
          Filesize

          16.6MB

        • memory/1732-101-0x0000000000000000-mapping.dmp
        • memory/1812-74-0x0000000000000000-mapping.dmp
        • memory/1812-77-0x0000000000890000-0x000000000089A000-memory.dmp
          Filesize

          40KB

        • memory/1896-71-0x0000000000400000-0x0000000000408000-memory.dmp
          Filesize

          32KB

        • memory/1896-61-0x0000000000400000-0x0000000000408000-memory.dmp
          Filesize

          32KB

        • memory/1896-62-0x0000000000400000-0x0000000000408000-memory.dmp
          Filesize

          32KB

        • memory/1896-65-0x0000000000400000-0x0000000000408000-memory.dmp
          Filesize

          32KB

        • memory/1896-66-0x0000000000400000-0x0000000000408000-memory.dmp
          Filesize

          32KB

        • memory/1896-67-0x0000000000400000-0x0000000000408000-memory.dmp
          Filesize

          32KB

        • memory/1896-68-0x0000000000401000-mapping.dmp
        • memory/1896-70-0x0000000000400000-0x0000000000408000-memory.dmp
          Filesize

          32KB

        • memory/1904-98-0x0000000000E80000-0x000000000114A000-memory.dmp
          Filesize

          2.8MB

        • memory/1904-95-0x0000000000000000-mapping.dmp
        • memory/1908-111-0x0000000000000000-mapping.dmp
        • memory/1928-151-0x00000000002C0000-0x000000000031C000-memory.dmp
          Filesize

          368KB

        • memory/1928-173-0x000000001B246000-0x000000001B265000-memory.dmp
          Filesize

          124KB

        • memory/1928-142-0x0000000000000000-mapping.dmp
        • memory/1928-160-0x0000000000550000-0x0000000000562000-memory.dmp
          Filesize

          72KB

        • memory/1928-150-0x0000000000090000-0x000000000017A000-memory.dmp
          Filesize

          936KB

        • memory/1928-161-0x0000000000820000-0x000000000086E000-memory.dmp
          Filesize

          312KB

        • memory/1928-152-0x0000000000510000-0x000000000051E000-memory.dmp
          Filesize

          56KB

        • memory/1928-163-0x0000000000890000-0x00000000008A0000-memory.dmp
          Filesize

          64KB

        • memory/1928-162-0x0000000000870000-0x0000000000888000-memory.dmp
          Filesize

          96KB

        • memory/2032-64-0x000007FEF3D10000-0x000007FEF4733000-memory.dmp
          Filesize

          10.1MB

        • memory/2032-73-0x000007FEFB6B1000-0x000007FEFB6B3000-memory.dmp
          Filesize

          8KB

        • memory/2032-58-0x0000000000000000-mapping.dmp