Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    108s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/11/2022, 20:10

General

  • Target

    1e73ab6337d7bc6dc4fcbb583c4730bb367a588c6585ab8578f5cca47a9efe47.exe

  • Size

    28KB

  • MD5

    66ec4cc9f416f28027e33b6859cef6dd

  • SHA1

    3963deb836da64cf5284b54ab7fb320c61cefc57

  • SHA256

    1e73ab6337d7bc6dc4fcbb583c4730bb367a588c6585ab8578f5cca47a9efe47

  • SHA512

    304fe2e7397508ae057f29685adc79e47181cae4f7cf7ce470343e3dd2f2e9b7692e5f450eb51ae6b3530db82b7d292e417c4161c5614e8724383b62b844d16a

  • SSDEEP

    768:dPIjlBNB+BFBoBsB4BTBHBAC86oLjEMcaNoNl9/NOIc:5SW/CF/i

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • UAC bypass 3 TTPs 1 IoCs
  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 54 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 10 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e73ab6337d7bc6dc4fcbb583c4730bb367a588c6585ab8578f5cca47a9efe47.exe
    "C:\Users\Admin\AppData\Local\Temp\1e73ab6337d7bc6dc4fcbb583c4730bb367a588c6585ab8578f5cca47a9efe47.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Users\Default\Desktop\nnloader.exe
      C:\Users\Default\Desktop\nnloader.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1540
      • C:\Users\Default\Desktop\LowDaWinar.dll
        C:\Users\Default\Desktop\LowDaWinar.dll -idq x -or -hppxUj6FXrxGgmZ3i4 C:\Users\Default\Desktop\qvlnk.bbo C:\Users\Admin\AppData\Roaming\
        3⤵
        • Executes dropped EXE
        PID:1180
      • C:\Users\Default\Desktop\LowDaWinar.dll
        C:\Users\Default\Desktop\LowDaWinar.dll -idq x -or -hppxUj6FXrxGgmZ3i4 C:\Users\Default\Desktop\Power.olg C:\Users\Admin\AppData\Roaming\
        3⤵
        • Executes dropped EXE
        PID:924
      • C:\Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\Haloonoroff.exe
        "C:\Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\Haloonoroff.exe"
        3⤵
        • UAC bypass
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:844
        • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\AutoUIntall.exe
          C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\AutoUIntall.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2032
          • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\HaloTrayShell.exe
            C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\HaloTrayShell.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Writes to the Master Boot Record (MBR)
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1292
            • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\Utils\HaloHelper.exe
              C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\Utils\HaloHelper.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1620
              • C:\Windows\SysWOW64\sc.exe
                sc create "ZMouseTencent2" binPath= "C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\\Bin\SearchSetError.exe" type= own type= interact start= auto displayname= "ÓÃÓÚÖ§³ÖWindowsϵͳ°²È«·À»¤Ïà¹Ø·þÎñ"
                7⤵
                • Launches sc.exe
                PID:560
              • C:\Windows\SysWOW64\sc.exe
                sc description ZMouseTencent2 "Microsoft°²È«·þÎñ"
                7⤵
                • Launches sc.exe
                PID:1804
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Default\Desktop\Rds.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1156
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 5 127.0.0.1
          4⤵
          • Runs ping.exe
          PID:676
  • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\HaloDesktop64.exe
    "C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\HaloDesktop64.exe" C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\HaloTrayShell.exe --show=1
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    PID:1252
    • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\Lnnloader.exe
      Lnnloader
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1764
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im ipaip2.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\AutoUIntall.exe

    Filesize

    139KB

    MD5

    e3248cf1d97513ba6225b0e20c2dd538

    SHA1

    4b417af3e3fa4dc3b53a01e4bdaf0e83a50da3e9

    SHA256

    07deb93865dae1734ee2a08e60f1ca9c2424a5e32fc8db58f7e0545914b924ca

    SHA512

    fc63fe1ee4f1f8c3eaf77f87a5167b4f619cff43b7d7bcfeadde224569aa0fc4862599d23c627b2fd9c889e003b9bd607ef0ff815945e2e2b30857e56154acce

  • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\AutoUIntall.exe

    Filesize

    139KB

    MD5

    e3248cf1d97513ba6225b0e20c2dd538

    SHA1

    4b417af3e3fa4dc3b53a01e4bdaf0e83a50da3e9

    SHA256

    07deb93865dae1734ee2a08e60f1ca9c2424a5e32fc8db58f7e0545914b924ca

    SHA512

    fc63fe1ee4f1f8c3eaf77f87a5167b4f619cff43b7d7bcfeadde224569aa0fc4862599d23c627b2fd9c889e003b9bd607ef0ff815945e2e2b30857e56154acce

  • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\atl10.dll

    Filesize

    728KB

    MD5

    54488bfbb27519959a99183518bae005

    SHA1

    7401e4ebab7e8950ba504b81a6db254d64cfe862

    SHA256

    1a9c122689c42ea0cc393dac3bd087c12c3f186959a2f931b4022f167795f74d

    SHA512

    3b3bb69fd5ff0e225da79c05a60928b58cec62a4f063fc17a879d7d6b389ba9879eada0dc8577954d241bafe4283b2bf3d1f3da6eb9777d3411938606fc22a2d

  • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\atl20.dll

    Filesize

    764KB

    MD5

    db18dac981609142a7768e9a7582122d

    SHA1

    0fee48c0ceb8807d2188ede5127ab7ed80914c5a

    SHA256

    a1697ba28a6ad7ae486fb646467429e9933dfbd67366999fe15f9d067ca30cc7

    SHA512

    053b23b4e4de76d5d2c51710826ff15e93bd2403f7ce7a4938df2faed888b9c7828308e4b0fbb4c13bf749dc18db76d65ff50ff6ccd62ceb33782242a2be8f27

  • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\atl30.dll

    Filesize

    884KB

    MD5

    353ea11edff75a1ca66d063bc2d22f39

    SHA1

    d6b9e754747a4c2351895709aadcbfded67727f9

    SHA256

    d80433303351fdf4cce0cfa9b1a6ddd25896291b8dcd4b82b812c5d73347ecb3

    SHA512

    734da1b8883251c4060834af41d2c847271dd8031ccea4bc412a61dd965147b687fbd48055321ac88e6570e917d52ec932bd5e300d8f900a789927bcf903a97b

  • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\atl70.dll

    Filesize

    740KB

    MD5

    9a762e727f10376013d80cc24459ed67

    SHA1

    129e33a4f9e4d042657b7964b0cfceeeec66e61a

    SHA256

    8a53527044e10e9c0e88bbbdfa826dbb8ff94278edab4753944889c3942c6eee

    SHA512

    df7ae539cf915108b7f8e78b274c5300a1c6ac330baadee6f308a667f38bc04f86d0a9cf2c5bb0e3cb936c98697c9a21ac6ec123accd564e00a53d24ac40708e

  • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\libmini.dll

    Filesize

    48KB

    MD5

    d4086593a8983b83bed55fd26f9a4623

    SHA1

    7d1cf798a11d2b988a136efd46328cb7fead9f1a

    SHA256

    d29e8f8928525588fc0331d40d6a9d3b40dd9d7eeabd4fc0d6a86721b19fb189

    SHA512

    85f969a5e354c22cfe07b51b2a41eaf9b0b7df147bce14c61ac87620c54952e3e88c091b6c339135e8af6b51c470d50e800006c42955a1e097fe680e92f10bc7

  • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\HaloDesktop.exe

    Filesize

    3.1MB

    MD5

    ad87f9f581634d7169745bfab0b7804a

    SHA1

    4ed6717ee5de801ebdedb28898682e5d93a0cae5

    SHA256

    6f696b9b207fb37ebc3a88729008c2a217281c1c8aa2bf1c4edd7e3ee517f438

    SHA512

    0c9c5046e64c61bb6046ff66d08383d7264d380512b928d93741cc9af28b615de011bd41e4ec0b81018dd84e9b89592b567f1c6d3602f37a423bbd3b919a9112

  • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\Utils\HaloHelper.exe

    Filesize

    665KB

    MD5

    ff1799df96e1250fa7c27e4e533a0885

    SHA1

    ac3f2e816535b463f35efae79018f65991d8834c

    SHA256

    7cfd01d80cac85f2853afff5af5319b8eef677dd754917a2961861e48b88f366

    SHA512

    1202e1d521a7e977f54df84aaffb44ec5d253161421fb329c6c6f4051a667fb4618b611bd9e025e3052fe765c4d803d30c474491c8a2d393cd233f7b8655f346

  • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\Utils\HaloHelper.exe

    Filesize

    665KB

    MD5

    ff1799df96e1250fa7c27e4e533a0885

    SHA1

    ac3f2e816535b463f35efae79018f65991d8834c

    SHA256

    7cfd01d80cac85f2853afff5af5319b8eef677dd754917a2961861e48b88f366

    SHA512

    1202e1d521a7e977f54df84aaffb44ec5d253161421fb329c6c6f4051a667fb4618b611bd9e025e3052fe765c4d803d30c474491c8a2d393cd233f7b8655f346

  • C:\Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\Utils\UPSDK.DLL

    Filesize

    48KB

    MD5

    d0c7352ba28b57385fb6b917f8560df6

    SHA1

    9604d9c5c8a1cb30156093e9f7d7bd21146d756c

    SHA256

    bfa78089b1331032ba678c24229683ac09ae2b7c5580c5c8a3f76625766e8a6f

    SHA512

    042406a63da38ff0dec86ecd44fbbc4bb1545ca0782080c530464c84da4fea32b8ea878fc1a086d4c31c7da1088f043788c7a5b1e3b204b8e06ad135b304f34f

  • C:\Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\Haloonoroff.exe

    Filesize

    665KB

    MD5

    ff1799df96e1250fa7c27e4e533a0885

    SHA1

    ac3f2e816535b463f35efae79018f65991d8834c

    SHA256

    7cfd01d80cac85f2853afff5af5319b8eef677dd754917a2961861e48b88f366

    SHA512

    1202e1d521a7e977f54df84aaffb44ec5d253161421fb329c6c6f4051a667fb4618b611bd9e025e3052fe765c4d803d30c474491c8a2d393cd233f7b8655f346

  • C:\Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\Haloonoroff.exe

    Filesize

    665KB

    MD5

    ff1799df96e1250fa7c27e4e533a0885

    SHA1

    ac3f2e816535b463f35efae79018f65991d8834c

    SHA256

    7cfd01d80cac85f2853afff5af5319b8eef677dd754917a2961861e48b88f366

    SHA512

    1202e1d521a7e977f54df84aaffb44ec5d253161421fb329c6c6f4051a667fb4618b611bd9e025e3052fe765c4d803d30c474491c8a2d393cd233f7b8655f346

  • C:\Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\TDPCONTROL.DLL

    Filesize

    44KB

    MD5

    b837d6ee8146db64a8d36747a52f906b

    SHA1

    b76305de520553386ceb94b323da3e3f1e4581c3

    SHA256

    d9d5a5f5ff28fe5419dd51a40a2883296d61b933dca26112b21ef2e688e75243

    SHA512

    ac825c97065d1bee4fd1d8715d18021bbdb1663d2c933c3dd669505b069aa4db95f54bfb7eba818ad154182394f6d9b3e99400903274016aea0b9e765e6d415c

  • C:\Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\TDPSTAT.DLL

    Filesize

    44KB

    MD5

    be9b11dac0d7be8c4f8747904d003de2

    SHA1

    fd8f1f7bdf0d328db99273df6914a4f0acdcc94e

    SHA256

    11fd4ed8c215d5ce5cddc3e6ee0f69dd17ad7c9dc0bb544d5cc2235bdca5cd9d

    SHA512

    c7963fc25540ecd143124e3a6c6ca3aa3fa3fc5ead8a11bbf785603ab58b79e440b18f9c54b36a21848865e43f8010a5472a01f681b88a4f96a295ac4c941251

  • C:\Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\UPSDK.DLL

    Filesize

    48KB

    MD5

    5f5f4eef3a50a8f2b6ba52459e80aed3

    SHA1

    c1acdfcbb0ac7d76679a6dc3bffec8afd731df77

    SHA256

    8f308c7f13c33463d4e06a5339425fac2013ce759de1b4acf6662db38f8a02c3

    SHA512

    df7108ddbd82f195b0795ba618a85788e5fa07f3e4ff0f9fe405cf2477ee48015619a56a03b5e7948abcafb6994a30adce9eb234409fe00a7573ce9b10bc345c

  • C:\Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\libcurl.dll

    Filesize

    326KB

    MD5

    ec9483f4b8c3910b09caab0f6cb7cd1b

    SHA1

    9931aaa8e626df273ee42f98e2fc91c2078fdc07

    SHA256

    4d9cae6e2e52270150542084af949d7b68300e378868165ff601378a38f7048f

    SHA512

    84b60fe3cd0ede19933b37ae0eaeba1f87174a21bc8086857e57c8729cec88f9fef4b50a2b870f55c858dd43b070fd22ffec5cb6f4fd5b950d6451b05eb65565

  • C:\Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\sytem\HaloTrayShell.exe

    Filesize

    1.6MB

    MD5

    be482d41d38c6a6691010e58fb8e1876

    SHA1

    06b0e9638874d716c028d5fc38fa7edf349575e9

    SHA256

    e26eff452d61191588add27666ea8e0377bd0927ac8d327cee16b820633aba81

    SHA512

    99f46c4918effa367ab96497f143661826fb8f7e8ddfc30502cf69e2438ad6146b0d56c74d9d57116c2193c5637f98dbf782ea950bcf19b46d280a15a1c90ba8

  • C:\Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\sytem\HaloTrayShell.exe

    Filesize

    1.6MB

    MD5

    be482d41d38c6a6691010e58fb8e1876

    SHA1

    06b0e9638874d716c028d5fc38fa7edf349575e9

    SHA256

    e26eff452d61191588add27666ea8e0377bd0927ac8d327cee16b820633aba81

    SHA512

    99f46c4918effa367ab96497f143661826fb8f7e8ddfc30502cf69e2438ad6146b0d56c74d9d57116c2193c5637f98dbf782ea950bcf19b46d280a15a1c90ba8

  • C:\Users\Default\Desktop\LowDaWinar.dll

    Filesize

    601KB

    MD5

    4fdc31997eb40979967fc04d9a9960f3

    SHA1

    7f13bd62c13324681913304644489bb6b66f584a

    SHA256

    e9ea78fab020718cb75a116993bfa2a5fe71c163a801995adb9e5abebc7990a2

    SHA512

    15146e24afcfea221616ca1f049d96e8a5f9b1eccefd3a27df150e4699993889fc1ab4952f2ba1ab519b1056baaeeb4490894bc795d0cb4630f663fa08316b9a

  • C:\Users\Default\Desktop\LowDaWinar.dll

    Filesize

    601KB

    MD5

    4fdc31997eb40979967fc04d9a9960f3

    SHA1

    7f13bd62c13324681913304644489bb6b66f584a

    SHA256

    e9ea78fab020718cb75a116993bfa2a5fe71c163a801995adb9e5abebc7990a2

    SHA512

    15146e24afcfea221616ca1f049d96e8a5f9b1eccefd3a27df150e4699993889fc1ab4952f2ba1ab519b1056baaeeb4490894bc795d0cb4630f663fa08316b9a

  • C:\Users\Default\Desktop\Power.olg

    Filesize

    11.0MB

    MD5

    fdd5d5386a4d3b94ea2f6c6d1403aba3

    SHA1

    bd3dcd632b62c711e7e70022105a29f27ba2cd69

    SHA256

    c1689f3fbd79222512d5ebb123f6a95918f6508dab3b03ef9ac390cb1f380f3d

    SHA512

    3266cf229f5c42bb423892853a2fa2e462ab27a34140cc9f9c140c085bf04f0a03608541e728dd8dae4683d9fa074f3a063e9b6e46bee0775400ad127aa6fd9b

  • C:\Users\Default\Desktop\Rds.bat

    Filesize

    56B

    MD5

    8a3965477a6e239f262cf1dba68e186c

    SHA1

    930cf658c34c91460497571761fd219e51879c8f

    SHA256

    40f2d581b2d623c340eacda29c35a4d96c34a11d32e26f03e541c3e774495475

    SHA512

    d9383b8746b7de58e58dc31bb7f16d68abc16377777281703f6b37158a4bf72c97ddd9a90a97061610b7ac00573776086153e5d9c126bc420bdc0fa9c80b599f

  • C:\Users\Default\Desktop\Tomorrow\LowDa1.dll

    Filesize

    24KB

    MD5

    64308bad527f00a5cf6a11d58c865add

    SHA1

    a5c996c592b10e934ba13761e6f832d7a9cb4e1b

    SHA256

    6e8e1a3e5ca3b6d0f314ad5f1d819075309db4385e37b29f26e2c8a864c50d35

    SHA512

    067244ee011f7588f4d06842e6cac7e52f8d0f74d920a0294e5931c18f6d30f4aeb5212678dbe8ef50dd403dd31573ad04b3e74c0973f36c644af3a21283176b

  • C:\Users\Default\Desktop\Tomorrow\LowDa2.dll

    Filesize

    24KB

    MD5

    2f71ea6225e582f86f2a2572bbe8eaa8

    SHA1

    d55df441b0b382e127a93cfb1672e947ce9a88af

    SHA256

    fc0b1da3d5cd1402c2d80057b2126a16333a43eb0b0d382f315576143c0d50ce

    SHA512

    72b8186584882b68c134570546cfdb060a4811ad6b8ed939546840a08119115c0f0e81ad8ef6091a942cc7ee4acefdceb26f1504c87e2dd4bf3cbee702a5d382

  • C:\Users\Default\Desktop\Tomorrow\LowDa4.dll

    Filesize

    24KB

    MD5

    63c761214e6f6ac7db81f4a839358a7d

    SHA1

    02fecef6a3ca7b5ccc65237a6508b356273cc63f

    SHA256

    ef8465638ae3165372fa4724ffe20a801606bcea04ba45c7a8f8dce9e7f46dc1

    SHA512

    9ee15d95add6ec7eb44cb3839d3faef05554144d97164698d5c031561d4e0f3a68d8b90305fd42a207a87145889500bb89ba7f6ae910ca18dfc90a4b57941f71

  • C:\Users\Default\Desktop\Tomorrow\LowDa5.dll

    Filesize

    24KB

    MD5

    13b550af98e1c1cb6f456a648c14a1d9

    SHA1

    9e2cc664bbb6c0c384e717b74fefd050a9fffe27

    SHA256

    77bb057fd7bc9a17a34111da9a06c28a43c8736df4c494c938b6f0ad98107633

    SHA512

    02dd5e8619f7433a8864902efc0cfb3f6c1d3721da6dd7bd575d5b92bd4c8851f0908fbb0c821a84d36d500a076f6e880e4f3f0f24f9aec004707a1a73f0fc1c

  • C:\Users\Default\Desktop\nnloader.exe

    Filesize

    20KB

    MD5

    8472c7e39827cb2399b50b4dc2ba3b5a

    SHA1

    9c7b0b00b87315a1058cdabe5f9e6a05306a7d2b

    SHA256

    330895875752b4dfd0edd1cdd60f247eefd5caa34cce17de8f294c931ee4670c

    SHA512

    5ccfc64e90fae5dff2a876fc22da4a9dff649e5e544d00e58fb6a61d6887a1affd4b1c158af7f58ef6182d424f5659df1619f08a7b15072a6e420f73e5057090

  • C:\Users\Default\Desktop\nnloader.exe

    Filesize

    20KB

    MD5

    8472c7e39827cb2399b50b4dc2ba3b5a

    SHA1

    9c7b0b00b87315a1058cdabe5f9e6a05306a7d2b

    SHA256

    330895875752b4dfd0edd1cdd60f247eefd5caa34cce17de8f294c931ee4670c

    SHA512

    5ccfc64e90fae5dff2a876fc22da4a9dff649e5e544d00e58fb6a61d6887a1affd4b1c158af7f58ef6182d424f5659df1619f08a7b15072a6e420f73e5057090

  • C:\Users\Default\Desktop\qvlnk.bbo

    Filesize

    318KB

    MD5

    2d2248ba35bfcabedadaab08380dd865

    SHA1

    426981e6ae122151c941bb5f0359e57aa2011b01

    SHA256

    26cfa985752d4d4614ffac0c90e7600016c867bd133837594895812f25409338

    SHA512

    0322123894cdeca7fe40cdf8358c0f019625d796237acf83288a7c0dc254bba725c1a7de681b4b6aeaadd83a5d4e57820318135e6f1107047d1b64ba22599e1e

  • \Users\Admin\AppData\Local\Temp\inatall.trb

    Filesize

    24KB

    MD5

    97fc03772a1b2127a353569168cf8f7f

    SHA1

    d6fdfa5ab4cb7a0f9b8c4fd2403cbb6fe6a71a87

    SHA256

    6e028f408961832176b2c34a28e7b3a3322903ae7b1c5fbc940890fd7fb59ab9

    SHA512

    ee3b5e5bfa406616221bf3169430c2a6f0d400c73d41da1f2c7191faef08061f1904d967379bfb1bcdffd82e7879bdf49686bcfdcc5d85d7e126b7553fb9ec93

  • \Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\AutoUIntall.exe

    Filesize

    139KB

    MD5

    e3248cf1d97513ba6225b0e20c2dd538

    SHA1

    4b417af3e3fa4dc3b53a01e4bdaf0e83a50da3e9

    SHA256

    07deb93865dae1734ee2a08e60f1ca9c2424a5e32fc8db58f7e0545914b924ca

    SHA512

    fc63fe1ee4f1f8c3eaf77f87a5167b4f619cff43b7d7bcfeadde224569aa0fc4862599d23c627b2fd9c889e003b9bd607ef0ff815945e2e2b30857e56154acce

  • \Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\AutoUIntall.exe

    Filesize

    139KB

    MD5

    e3248cf1d97513ba6225b0e20c2dd538

    SHA1

    4b417af3e3fa4dc3b53a01e4bdaf0e83a50da3e9

    SHA256

    07deb93865dae1734ee2a08e60f1ca9c2424a5e32fc8db58f7e0545914b924ca

    SHA512

    fc63fe1ee4f1f8c3eaf77f87a5167b4f619cff43b7d7bcfeadde224569aa0fc4862599d23c627b2fd9c889e003b9bd607ef0ff815945e2e2b30857e56154acce

  • \Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\AutoUIntall.exe

    Filesize

    139KB

    MD5

    e3248cf1d97513ba6225b0e20c2dd538

    SHA1

    4b417af3e3fa4dc3b53a01e4bdaf0e83a50da3e9

    SHA256

    07deb93865dae1734ee2a08e60f1ca9c2424a5e32fc8db58f7e0545914b924ca

    SHA512

    fc63fe1ee4f1f8c3eaf77f87a5167b4f619cff43b7d7bcfeadde224569aa0fc4862599d23c627b2fd9c889e003b9bd607ef0ff815945e2e2b30857e56154acce

  • \Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\atl10.dll

    Filesize

    728KB

    MD5

    54488bfbb27519959a99183518bae005

    SHA1

    7401e4ebab7e8950ba504b81a6db254d64cfe862

    SHA256

    1a9c122689c42ea0cc393dac3bd087c12c3f186959a2f931b4022f167795f74d

    SHA512

    3b3bb69fd5ff0e225da79c05a60928b58cec62a4f063fc17a879d7d6b389ba9879eada0dc8577954d241bafe4283b2bf3d1f3da6eb9777d3411938606fc22a2d

  • \Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\atl20.dll

    Filesize

    764KB

    MD5

    db18dac981609142a7768e9a7582122d

    SHA1

    0fee48c0ceb8807d2188ede5127ab7ed80914c5a

    SHA256

    a1697ba28a6ad7ae486fb646467429e9933dfbd67366999fe15f9d067ca30cc7

    SHA512

    053b23b4e4de76d5d2c51710826ff15e93bd2403f7ce7a4938df2faed888b9c7828308e4b0fbb4c13bf749dc18db76d65ff50ff6ccd62ceb33782242a2be8f27

  • \Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\atl30.dll

    Filesize

    884KB

    MD5

    353ea11edff75a1ca66d063bc2d22f39

    SHA1

    d6b9e754747a4c2351895709aadcbfded67727f9

    SHA256

    d80433303351fdf4cce0cfa9b1a6ddd25896291b8dcd4b82b812c5d73347ecb3

    SHA512

    734da1b8883251c4060834af41d2c847271dd8031ccea4bc412a61dd965147b687fbd48055321ac88e6570e917d52ec932bd5e300d8f900a789927bcf903a97b

  • \Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\atl70.dll

    Filesize

    740KB

    MD5

    9a762e727f10376013d80cc24459ed67

    SHA1

    129e33a4f9e4d042657b7964b0cfceeeec66e61a

    SHA256

    8a53527044e10e9c0e88bbbdfa826dbb8ff94278edab4753944889c3942c6eee

    SHA512

    df7ae539cf915108b7f8e78b274c5300a1c6ac330baadee6f308a667f38bc04f86d0a9cf2c5bb0e3cb936c98697c9a21ac6ec123accd564e00a53d24ac40708e

  • \Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\libmini.dll

    Filesize

    48KB

    MD5

    d4086593a8983b83bed55fd26f9a4623

    SHA1

    7d1cf798a11d2b988a136efd46328cb7fead9f1a

    SHA256

    d29e8f8928525588fc0331d40d6a9d3b40dd9d7eeabd4fc0d6a86721b19fb189

    SHA512

    85f969a5e354c22cfe07b51b2a41eaf9b0b7df147bce14c61ac87620c54952e3e88c091b6c339135e8af6b51c470d50e800006c42955a1e097fe680e92f10bc7

  • \Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\HaloDesktop.exe

    Filesize

    3.1MB

    MD5

    ad87f9f581634d7169745bfab0b7804a

    SHA1

    4ed6717ee5de801ebdedb28898682e5d93a0cae5

    SHA256

    6f696b9b207fb37ebc3a88729008c2a217281c1c8aa2bf1c4edd7e3ee517f438

    SHA512

    0c9c5046e64c61bb6046ff66d08383d7264d380512b928d93741cc9af28b615de011bd41e4ec0b81018dd84e9b89592b567f1c6d3602f37a423bbd3b919a9112

  • \Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\HaloDesktop.exe

    Filesize

    3.1MB

    MD5

    ad87f9f581634d7169745bfab0b7804a

    SHA1

    4ed6717ee5de801ebdedb28898682e5d93a0cae5

    SHA256

    6f696b9b207fb37ebc3a88729008c2a217281c1c8aa2bf1c4edd7e3ee517f438

    SHA512

    0c9c5046e64c61bb6046ff66d08383d7264d380512b928d93741cc9af28b615de011bd41e4ec0b81018dd84e9b89592b567f1c6d3602f37a423bbd3b919a9112

  • \Users\Admin\AppData\Roaming\ATOBRO~1\emoji\xad\gasg\jajja\sytem\Utils\HaloHelper.exe

    Filesize

    665KB

    MD5

    ff1799df96e1250fa7c27e4e533a0885

    SHA1

    ac3f2e816535b463f35efae79018f65991d8834c

    SHA256

    7cfd01d80cac85f2853afff5af5319b8eef677dd754917a2961861e48b88f366

    SHA512

    1202e1d521a7e977f54df84aaffb44ec5d253161421fb329c6c6f4051a667fb4618b611bd9e025e3052fe765c4d803d30c474491c8a2d393cd233f7b8655f346

  • \Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\Haloonoroff.exe

    Filesize

    665KB

    MD5

    ff1799df96e1250fa7c27e4e533a0885

    SHA1

    ac3f2e816535b463f35efae79018f65991d8834c

    SHA256

    7cfd01d80cac85f2853afff5af5319b8eef677dd754917a2961861e48b88f366

    SHA512

    1202e1d521a7e977f54df84aaffb44ec5d253161421fb329c6c6f4051a667fb4618b611bd9e025e3052fe765c4d803d30c474491c8a2d393cd233f7b8655f346

  • \Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\Haloonoroff.exe

    Filesize

    665KB

    MD5

    ff1799df96e1250fa7c27e4e533a0885

    SHA1

    ac3f2e816535b463f35efae79018f65991d8834c

    SHA256

    7cfd01d80cac85f2853afff5af5319b8eef677dd754917a2961861e48b88f366

    SHA512

    1202e1d521a7e977f54df84aaffb44ec5d253161421fb329c6c6f4051a667fb4618b611bd9e025e3052fe765c4d803d30c474491c8a2d393cd233f7b8655f346

  • \Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\Haloonoroff.exe

    Filesize

    665KB

    MD5

    ff1799df96e1250fa7c27e4e533a0885

    SHA1

    ac3f2e816535b463f35efae79018f65991d8834c

    SHA256

    7cfd01d80cac85f2853afff5af5319b8eef677dd754917a2961861e48b88f366

    SHA512

    1202e1d521a7e977f54df84aaffb44ec5d253161421fb329c6c6f4051a667fb4618b611bd9e025e3052fe765c4d803d30c474491c8a2d393cd233f7b8655f346

  • \Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\TDPCONTROL.dll

    Filesize

    44KB

    MD5

    b837d6ee8146db64a8d36747a52f906b

    SHA1

    b76305de520553386ceb94b323da3e3f1e4581c3

    SHA256

    d9d5a5f5ff28fe5419dd51a40a2883296d61b933dca26112b21ef2e688e75243

    SHA512

    ac825c97065d1bee4fd1d8715d18021bbdb1663d2c933c3dd669505b069aa4db95f54bfb7eba818ad154182394f6d9b3e99400903274016aea0b9e765e6d415c

  • \Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\TDPSTAT.dll

    Filesize

    44KB

    MD5

    be9b11dac0d7be8c4f8747904d003de2

    SHA1

    fd8f1f7bdf0d328db99273df6914a4f0acdcc94e

    SHA256

    11fd4ed8c215d5ce5cddc3e6ee0f69dd17ad7c9dc0bb544d5cc2235bdca5cd9d

    SHA512

    c7963fc25540ecd143124e3a6c6ca3aa3fa3fc5ead8a11bbf785603ab58b79e440b18f9c54b36a21848865e43f8010a5472a01f681b88a4f96a295ac4c941251

  • \Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\UPSDK.dll

    Filesize

    48KB

    MD5

    5f5f4eef3a50a8f2b6ba52459e80aed3

    SHA1

    c1acdfcbb0ac7d76679a6dc3bffec8afd731df77

    SHA256

    8f308c7f13c33463d4e06a5339425fac2013ce759de1b4acf6662db38f8a02c3

    SHA512

    df7108ddbd82f195b0795ba618a85788e5fa07f3e4ff0f9fe405cf2477ee48015619a56a03b5e7948abcafb6994a30adce9eb234409fe00a7573ce9b10bc345c

  • \Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\libcurl.dll

    Filesize

    326KB

    MD5

    ec9483f4b8c3910b09caab0f6cb7cd1b

    SHA1

    9931aaa8e626df273ee42f98e2fc91c2078fdc07

    SHA256

    4d9cae6e2e52270150542084af949d7b68300e378868165ff601378a38f7048f

    SHA512

    84b60fe3cd0ede19933b37ae0eaeba1f87174a21bc8086857e57c8729cec88f9fef4b50a2b870f55c858dd43b070fd22ffec5cb6f4fd5b950d6451b05eb65565

  • \Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\sytem\HaloTrayShell.exe

    Filesize

    1.6MB

    MD5

    be482d41d38c6a6691010e58fb8e1876

    SHA1

    06b0e9638874d716c028d5fc38fa7edf349575e9

    SHA256

    e26eff452d61191588add27666ea8e0377bd0927ac8d327cee16b820633aba81

    SHA512

    99f46c4918effa367ab96497f143661826fb8f7e8ddfc30502cf69e2438ad6146b0d56c74d9d57116c2193c5637f98dbf782ea950bcf19b46d280a15a1c90ba8

  • \Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\sytem\HaloTrayShell.exe

    Filesize

    1.6MB

    MD5

    be482d41d38c6a6691010e58fb8e1876

    SHA1

    06b0e9638874d716c028d5fc38fa7edf349575e9

    SHA256

    e26eff452d61191588add27666ea8e0377bd0927ac8d327cee16b820633aba81

    SHA512

    99f46c4918effa367ab96497f143661826fb8f7e8ddfc30502cf69e2438ad6146b0d56c74d9d57116c2193c5637f98dbf782ea950bcf19b46d280a15a1c90ba8

  • \Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\sytem\HaloTrayShell.exe

    Filesize

    1.6MB

    MD5

    be482d41d38c6a6691010e58fb8e1876

    SHA1

    06b0e9638874d716c028d5fc38fa7edf349575e9

    SHA256

    e26eff452d61191588add27666ea8e0377bd0927ac8d327cee16b820633aba81

    SHA512

    99f46c4918effa367ab96497f143661826fb8f7e8ddfc30502cf69e2438ad6146b0d56c74d9d57116c2193c5637f98dbf782ea950bcf19b46d280a15a1c90ba8

  • \Users\Admin\AppData\Roaming\ATOBRoaming\emoji\xad\gasg\jajja\sytem\HaloTrayShell.exe

    Filesize

    1.6MB

    MD5

    be482d41d38c6a6691010e58fb8e1876

    SHA1

    06b0e9638874d716c028d5fc38fa7edf349575e9

    SHA256

    e26eff452d61191588add27666ea8e0377bd0927ac8d327cee16b820633aba81

    SHA512

    99f46c4918effa367ab96497f143661826fb8f7e8ddfc30502cf69e2438ad6146b0d56c74d9d57116c2193c5637f98dbf782ea950bcf19b46d280a15a1c90ba8

  • \Users\Default\Desktop\LowDaWinar.dll

    Filesize

    601KB

    MD5

    4fdc31997eb40979967fc04d9a9960f3

    SHA1

    7f13bd62c13324681913304644489bb6b66f584a

    SHA256

    e9ea78fab020718cb75a116993bfa2a5fe71c163a801995adb9e5abebc7990a2

    SHA512

    15146e24afcfea221616ca1f049d96e8a5f9b1eccefd3a27df150e4699993889fc1ab4952f2ba1ab519b1056baaeeb4490894bc795d0cb4630f663fa08316b9a

  • \Users\Default\Desktop\LowDaWinar.dll

    Filesize

    601KB

    MD5

    4fdc31997eb40979967fc04d9a9960f3

    SHA1

    7f13bd62c13324681913304644489bb6b66f584a

    SHA256

    e9ea78fab020718cb75a116993bfa2a5fe71c163a801995adb9e5abebc7990a2

    SHA512

    15146e24afcfea221616ca1f049d96e8a5f9b1eccefd3a27df150e4699993889fc1ab4952f2ba1ab519b1056baaeeb4490894bc795d0cb4630f663fa08316b9a

  • \Users\Default\Desktop\Tomorrow\LowDa1.dll

    Filesize

    24KB

    MD5

    64308bad527f00a5cf6a11d58c865add

    SHA1

    a5c996c592b10e934ba13761e6f832d7a9cb4e1b

    SHA256

    6e8e1a3e5ca3b6d0f314ad5f1d819075309db4385e37b29f26e2c8a864c50d35

    SHA512

    067244ee011f7588f4d06842e6cac7e52f8d0f74d920a0294e5931c18f6d30f4aeb5212678dbe8ef50dd403dd31573ad04b3e74c0973f36c644af3a21283176b

  • \Users\Default\Desktop\Tomorrow\LowDa2.dll

    Filesize

    24KB

    MD5

    2f71ea6225e582f86f2a2572bbe8eaa8

    SHA1

    d55df441b0b382e127a93cfb1672e947ce9a88af

    SHA256

    fc0b1da3d5cd1402c2d80057b2126a16333a43eb0b0d382f315576143c0d50ce

    SHA512

    72b8186584882b68c134570546cfdb060a4811ad6b8ed939546840a08119115c0f0e81ad8ef6091a942cc7ee4acefdceb26f1504c87e2dd4bf3cbee702a5d382

  • \Users\Default\Desktop\Tomorrow\LowDa4.dll

    Filesize

    24KB

    MD5

    63c761214e6f6ac7db81f4a839358a7d

    SHA1

    02fecef6a3ca7b5ccc65237a6508b356273cc63f

    SHA256

    ef8465638ae3165372fa4724ffe20a801606bcea04ba45c7a8f8dce9e7f46dc1

    SHA512

    9ee15d95add6ec7eb44cb3839d3faef05554144d97164698d5c031561d4e0f3a68d8b90305fd42a207a87145889500bb89ba7f6ae910ca18dfc90a4b57941f71

  • \Users\Default\Desktop\Tomorrow\LowDa5.dll

    Filesize

    24KB

    MD5

    13b550af98e1c1cb6f456a648c14a1d9

    SHA1

    9e2cc664bbb6c0c384e717b74fefd050a9fffe27

    SHA256

    77bb057fd7bc9a17a34111da9a06c28a43c8736df4c494c938b6f0ad98107633

    SHA512

    02dd5e8619f7433a8864902efc0cfb3f6c1d3721da6dd7bd575d5b92bd4c8851f0908fbb0c821a84d36d500a076f6e880e4f3f0f24f9aec004707a1a73f0fc1c

  • \Users\Default\Desktop\nnloader.exe

    Filesize

    20KB

    MD5

    8472c7e39827cb2399b50b4dc2ba3b5a

    SHA1

    9c7b0b00b87315a1058cdabe5f9e6a05306a7d2b

    SHA256

    330895875752b4dfd0edd1cdd60f247eefd5caa34cce17de8f294c931ee4670c

    SHA512

    5ccfc64e90fae5dff2a876fc22da4a9dff649e5e544d00e58fb6a61d6887a1affd4b1c158af7f58ef6182d424f5659df1619f08a7b15072a6e420f73e5057090

  • \Users\Default\Desktop\nnloader.exe

    Filesize

    20KB

    MD5

    8472c7e39827cb2399b50b4dc2ba3b5a

    SHA1

    9c7b0b00b87315a1058cdabe5f9e6a05306a7d2b

    SHA256

    330895875752b4dfd0edd1cdd60f247eefd5caa34cce17de8f294c931ee4670c

    SHA512

    5ccfc64e90fae5dff2a876fc22da4a9dff649e5e544d00e58fb6a61d6887a1affd4b1c158af7f58ef6182d424f5659df1619f08a7b15072a6e420f73e5057090

  • \Users\Default\Desktop\nnloader.exe

    Filesize

    20KB

    MD5

    8472c7e39827cb2399b50b4dc2ba3b5a

    SHA1

    9c7b0b00b87315a1058cdabe5f9e6a05306a7d2b

    SHA256

    330895875752b4dfd0edd1cdd60f247eefd5caa34cce17de8f294c931ee4670c

    SHA512

    5ccfc64e90fae5dff2a876fc22da4a9dff649e5e544d00e58fb6a61d6887a1affd4b1c158af7f58ef6182d424f5659df1619f08a7b15072a6e420f73e5057090

  • \Users\Default\Desktop\nnloader.exe

    Filesize

    20KB

    MD5

    8472c7e39827cb2399b50b4dc2ba3b5a

    SHA1

    9c7b0b00b87315a1058cdabe5f9e6a05306a7d2b

    SHA256

    330895875752b4dfd0edd1cdd60f247eefd5caa34cce17de8f294c931ee4670c

    SHA512

    5ccfc64e90fae5dff2a876fc22da4a9dff649e5e544d00e58fb6a61d6887a1affd4b1c158af7f58ef6182d424f5659df1619f08a7b15072a6e420f73e5057090

  • \Users\Default\Desktop\nnloader.exe

    Filesize

    20KB

    MD5

    8472c7e39827cb2399b50b4dc2ba3b5a

    SHA1

    9c7b0b00b87315a1058cdabe5f9e6a05306a7d2b

    SHA256

    330895875752b4dfd0edd1cdd60f247eefd5caa34cce17de8f294c931ee4670c

    SHA512

    5ccfc64e90fae5dff2a876fc22da4a9dff649e5e544d00e58fb6a61d6887a1affd4b1c158af7f58ef6182d424f5659df1619f08a7b15072a6e420f73e5057090

  • memory/924-77-0x000007FEFC431000-0x000007FEFC433000-memory.dmp

    Filesize

    8KB

  • memory/1488-54-0x0000000076681000-0x0000000076683000-memory.dmp

    Filesize

    8KB

  • memory/1764-163-0x00000000006A5000-0x00000000006A7000-memory.dmp

    Filesize

    8KB

  • memory/1764-160-0x0000000000300000-0x0000000000311000-memory.dmp

    Filesize

    68KB

  • memory/1764-167-0x00000000006A5000-0x00000000006A7000-memory.dmp

    Filesize

    8KB

  • memory/1764-158-0x00000000006A5000-0x00000000006A7000-memory.dmp

    Filesize

    8KB

  • memory/2032-118-0x0000000002040000-0x0000000002109000-memory.dmp

    Filesize

    804KB

  • memory/2032-122-0x0000000002310000-0x00000000023D6000-memory.dmp

    Filesize

    792KB

  • memory/2032-126-0x00000000024B0000-0x000000000257F000-memory.dmp

    Filesize

    828KB