Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2023 17:11

General

  • Target

    file.exe

  • Size

    755KB

  • MD5

    c296f6d7c3ce6dad67003a5777a6da0a

  • SHA1

    b426f52cf2419af5c4829c65857ff4f873565ef0

  • SHA256

    27b26cf6ba3ddaeeb8f2d14b2868ea2229f3bf951cb6a2cccc73e207a08cbdcd

  • SHA512

    db969b2f9c0b1d8c9d2893c6418251a1a1765e3708a327ef6f7034f76a1dda86b1f695a8784e314acaeff8d33efc618164c48b740a9268871b2d199e64975b6b

  • SSDEEP

    12288:VQi3sc6m6UR0IeSp1hf39Wkv8xwJld8kO:VQi8zHIeSpdUMkkO

Malware Config

Extracted

Family

nymaim

C2

45.139.105.171

85.31.46.167

Signatures

  • NyMaim

    NyMaim is a malware with various capabilities written in C++ and first seen in 2013.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 16 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 11 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
      PID:460
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:868
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k WspService
        2⤵
        • Drops file in System32 directory
        • Checks processor information in registry
        • Modifies data under HKEY_USERS
        • Modifies registry class
        PID:4424
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      1⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Users\Admin\AppData\Local\Temp\is-4VSVB.tmp\file.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-4VSVB.tmp\file.tmp" /SL5="$60120,506127,422400,C:\Users\Admin\AppData\Local\Temp\file.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1324
        • C:\Users\Admin\AppData\Local\Temp\is-BD2H2.tmp\ty88__.exe
          "C:\Users\Admin\AppData\Local\Temp\is-BD2H2.tmp\ty88__.exe" /S /UID=95
          3⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:520
          • C:\Users\Admin\AppData\Local\Temp\46-6d1ef-5fa-1eeb8-1ffb35a35063e\Jepiraelybu.exe
            "C:\Users\Admin\AppData\Local\Temp\46-6d1ef-5fa-1eeb8-1ffb35a35063e\Jepiraelybu.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1248
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\z2gabamn.z0l\GcleanerEU.exe /eufive & exit
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3304
              • C:\Users\Admin\AppData\Local\Temp\z2gabamn.z0l\GcleanerEU.exe
                C:\Users\Admin\AppData\Local\Temp\z2gabamn.z0l\GcleanerEU.exe /eufive
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                PID:3984
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c taskkill /im "GcleanerEU.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\z2gabamn.z0l\GcleanerEU.exe" & exit
                  7⤵
                    PID:4560
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /im "GcleanerEU.exe" /f
                      8⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4604
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uglb5pxe.tfc\gcleaner.exe /mixfive & exit
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:4012
                • C:\Users\Admin\AppData\Local\Temp\uglb5pxe.tfc\gcleaner.exe
                  C:\Users\Admin\AppData\Local\Temp\uglb5pxe.tfc\gcleaner.exe /mixfive
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: CmdExeWriteProcessMemorySpam
                  PID:4040
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c taskkill /im "gcleaner.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\uglb5pxe.tfc\gcleaner.exe" & exit
                    7⤵
                      PID:4616
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /im "gcleaner.exe" /f
                        8⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4688
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tths2mep.fpv\chenp.exe & exit
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4064
                  • C:\Users\Admin\AppData\Local\Temp\tths2mep.fpv\chenp.exe
                    C:\Users\Admin\AppData\Local\Temp\tths2mep.fpv\chenp.exe
                    6⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                    • Suspicious use of WriteProcessMemory
                    PID:3312
                    • C:\Users\Admin\AppData\Local\Temp\tths2mep.fpv\chenp.exe
                      "C:\Users\Admin\AppData\Local\Temp\tths2mep.fpv\chenp.exe" -h
                      7⤵
                      • Executes dropped EXE
                      PID:4128
              • C:\Program Files\VideoLAN\ESTYUWKQJX\poweroff.exe
                "C:\Program Files\VideoLAN\ESTYUWKQJX\poweroff.exe" /VERYSILENT
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:1748
                • C:\Users\Admin\AppData\Local\Temp\is-CC3BS.tmp\poweroff.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-CC3BS.tmp\poweroff.tmp" /SL5="$1015A,490199,350720,C:\Program Files\VideoLAN\ESTYUWKQJX\poweroff.exe" /VERYSILENT
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in Program Files directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:1632
                  • C:\Program Files (x86)\powerOff\Power Off.exe
                    "C:\Program Files (x86)\powerOff\Power Off.exe" -silent -desktopShortcut -programMenu
                    6⤵
                    • Executes dropped EXE
                    PID:968
              • C:\Users\Admin\AppData\Local\Temp\d8-1a2bf-7e1-ea29b-ba823f4ee7800\Jepiraelybu.exe
                "C:\Users\Admin\AppData\Local\Temp\d8-1a2bf-7e1-ea29b-ba823f4ee7800\Jepiraelybu.exe"
                4⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious use of WriteProcessMemory
                PID:1660
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6
                  5⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1224
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1224 CREDAT:275457 /prefetch:2
                    6⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:1552
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1224 CREDAT:340994 /prefetch:2
                    6⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:4300
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1224 CREDAT:603143 /prefetch:2
                    6⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:4876
        • C:\Windows\system32\rundll32.exe
          rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open
          1⤵
          • Process spawned unexpected child process
          PID:4232
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open
            2⤵
            • Loads dropped DLL
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            PID:4252

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        3
        T1112

        Install Root Certificate

        1
        T1130

        Discovery

        Software Discovery

        1
        T1518

        Query Registry

        2
        T1012

        System Information Discovery

        2
        T1082

        Command and Control

        Web Service

        1
        T1102

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\powerOff\Power Off.exe
          Filesize

          621KB

          MD5

          8d0b18eb87590fa654da3704092b122b

          SHA1

          aaf4417695904bd718def564b2c1dae40623cc1d

          SHA256

          f9d12723a5ac3ade8212b4ec2f2b8452b7deb10e071bcb4e50a9cb6cb85b1457

          SHA512

          fa54fad936e96ecabfab70f29fe5095b60ce5bfa7f31f6c405c42ad4f4f153ec7406d03d0451e11e886722abf28f09b219d3e8d9a703f20cb67b0950d8b70828

        • C:\Program Files (x86)\powerOff\Power Off.exe
          Filesize

          621KB

          MD5

          8d0b18eb87590fa654da3704092b122b

          SHA1

          aaf4417695904bd718def564b2c1dae40623cc1d

          SHA256

          f9d12723a5ac3ade8212b4ec2f2b8452b7deb10e071bcb4e50a9cb6cb85b1457

          SHA512

          fa54fad936e96ecabfab70f29fe5095b60ce5bfa7f31f6c405c42ad4f4f153ec7406d03d0451e11e886722abf28f09b219d3e8d9a703f20cb67b0950d8b70828

        • C:\Program Files\VideoLAN\ESTYUWKQJX\poweroff.exe
          Filesize

          838KB

          MD5

          c0538198613d60407c75c54c55e69d91

          SHA1

          a2d713a098bc7b6d245c428dcdeb5614af3b8edd

          SHA256

          c23f223e4d981eb0e24cadae9dc0c60e40e12ff220d95c9dd2a5b6220fa6d6ed

          SHA512

          121f882471cd14752a1f806472c89028cc56c90fbfb0b645c26937c417f107d5324250f783310032d4526018c8918cdd06c52325949f78220a9d3bab167e3529

        • C:\Program Files\VideoLAN\ESTYUWKQJX\poweroff.exe
          Filesize

          838KB

          MD5

          c0538198613d60407c75c54c55e69d91

          SHA1

          a2d713a098bc7b6d245c428dcdeb5614af3b8edd

          SHA256

          c23f223e4d981eb0e24cadae9dc0c60e40e12ff220d95c9dd2a5b6220fa6d6ed

          SHA512

          121f882471cd14752a1f806472c89028cc56c90fbfb0b645c26937c417f107d5324250f783310032d4526018c8918cdd06c52325949f78220a9d3bab167e3529

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          da73253562e1d2b3a0b719ecfc64de0a

          SHA1

          d813938cf4ad46fe5aa1e6ed4973d235b73ba22e

          SHA256

          afed84d77828c46155fdc09cd4f596d3f120188aa086d2816b917d94bf0ddbb1

          SHA512

          892e5e9da8860f75a2d03f0686b6f4e4e48e318aa25f09b1a6585e84d9743f818080db0d92504e8830919b117fedc81ea9168657f67096362153c577d7b4eaae

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          8268d141f6f8e8c3c67c855f5b48503a

          SHA1

          1acba40edd8ac00a75748699c213a37e8dd007aa

          SHA256

          5ec779cdd10da4ffad6a411e3619f846721a19a58363ebaa234f3c55973cb744

          SHA512

          f53db0fd783425f4653d32b24db755a5aebb54f8ef86185d23980287646376ddf016e5f1365eb6d999befe982f83f277e68ca59307d6c34c30e2a2721f946412

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          9b7ba43b097449648a0a8c28cb69eb89

          SHA1

          dc4dd911b6d9acede092fcc3124509ad8c7df9c6

          SHA256

          b0f46a04ecf650598c554ba5baf22de561a89cbf08b182ba5d8b82fc45db809f

          SHA512

          7443dc93a7e7523310c7243c6322227c174510890f445ca927849bb44e58afcc0d782275876f595beb704c935998cb808ef8e62e6aef68c23f7032b05897eb29

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          9ee5b432de8e95be9bd6793b16002fb4

          SHA1

          5f7f9603285fa77bb4cffb29091e5e147f141eca

          SHA256

          1660a3a97d17d403d5c0ea2c501dfa3433b5b7f0453da215f31f5e114c05894e

          SHA512

          264823652ba4ae4613af686435fd3b781f2b567c7f54408b7d8038d862b9ae58c59a37b15bb6c26c52977151310f95ed5ec350ccc16aadfe9d08c1bbbd1e57f5

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\V881MODH\A1Y5RU7Y.htm
          Filesize

          63KB

          MD5

          1cfa49764064c0e808e410bf644ddc84

          SHA1

          7277dda305930f727f0cdeed39448060b4abe8eb

          SHA256

          09837cfa8fdc64d425ad53c520ec5425012603362fdf9bd57ce9de2d89befd32

          SHA512

          9091e11d3529ebd4e8ac287017ae0402262db792702f511a3d87b350240d5034c6bb1d49c0bcda678da7f85e5391204b5d9a052de40fc7047a759103c96fc173

        • C:\Users\Admin\AppData\Local\Temp\46-6d1ef-5fa-1eeb8-1ffb35a35063e\Jepiraelybu.exe
          Filesize

          377KB

          MD5

          97627b2f5f03f91345b467a2a4b34e1a

          SHA1

          863ef84ed38a90a5141b381d074f417e3ff0b5fc

          SHA256

          45570616c6bc66ad969a2b343240794096ce515103abea1eb7d4fbcf099bcebc

          SHA512

          7a738404b761ad637f0f106144d746d6bc97d03e8adfed4c8a7c60cab22e4b2138dcbf9d185d753b92ad9f3de56689932225fd555ff556dbc6c5269d9600d0c0

        • C:\Users\Admin\AppData\Local\Temp\46-6d1ef-5fa-1eeb8-1ffb35a35063e\Jepiraelybu.exe
          Filesize

          377KB

          MD5

          97627b2f5f03f91345b467a2a4b34e1a

          SHA1

          863ef84ed38a90a5141b381d074f417e3ff0b5fc

          SHA256

          45570616c6bc66ad969a2b343240794096ce515103abea1eb7d4fbcf099bcebc

          SHA512

          7a738404b761ad637f0f106144d746d6bc97d03e8adfed4c8a7c60cab22e4b2138dcbf9d185d753b92ad9f3de56689932225fd555ff556dbc6c5269d9600d0c0

        • C:\Users\Admin\AppData\Local\Temp\46-6d1ef-5fa-1eeb8-1ffb35a35063e\Jepiraelybu.exe.config
          Filesize

          1KB

          MD5

          98d2687aec923f98c37f7cda8de0eb19

          SHA1

          f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7

          SHA256

          8a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465

          SHA512

          95c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590

        • C:\Users\Admin\AppData\Local\Temp\46-6d1ef-5fa-1eeb8-1ffb35a35063e\Kenessey.txt
          Filesize

          9B

          MD5

          97384261b8bbf966df16e5ad509922db

          SHA1

          2fc42d37fee2c81d767e09fb298b70c748940f86

          SHA256

          9c0d294c05fc1d88d698034609bb81c0c69196327594e4c69d2915c80fd9850c

          SHA512

          b77fe2d86fbc5bd116d6a073eb447e76a74add3fa0d0b801f97535963241be3cdce1dbcaed603b78f020d0845b2d4bfc892ceb2a7d1c8f1d98abc4812ef5af21

        • C:\Users\Admin\AppData\Local\Temp\d8-1a2bf-7e1-ea29b-ba823f4ee7800\Jepiraelybu.exe
          Filesize

          586KB

          MD5

          208e4cd441cdd40a55ee0fc96316e331

          SHA1

          cddcd13535391b96c8ec650a22f1503f93ca092c

          SHA256

          2f1a9b94d5fce31cab6e35b22b00e4f73b80582d3635ba113a10b2caa5015431

          SHA512

          bb7891ab9afbe99ce7f0235c155ebe943f8790fcd7bbe1b4420960c2b703f4c96aae84dd8005704fb79bb7edc0f1e4e3270f12bdce060cb8936b6bad0c814651

        • C:\Users\Admin\AppData\Local\Temp\d8-1a2bf-7e1-ea29b-ba823f4ee7800\Jepiraelybu.exe
          Filesize

          586KB

          MD5

          208e4cd441cdd40a55ee0fc96316e331

          SHA1

          cddcd13535391b96c8ec650a22f1503f93ca092c

          SHA256

          2f1a9b94d5fce31cab6e35b22b00e4f73b80582d3635ba113a10b2caa5015431

          SHA512

          bb7891ab9afbe99ce7f0235c155ebe943f8790fcd7bbe1b4420960c2b703f4c96aae84dd8005704fb79bb7edc0f1e4e3270f12bdce060cb8936b6bad0c814651

        • C:\Users\Admin\AppData\Local\Temp\d8-1a2bf-7e1-ea29b-ba823f4ee7800\Jepiraelybu.exe.config
          Filesize

          1KB

          MD5

          98d2687aec923f98c37f7cda8de0eb19

          SHA1

          f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7

          SHA256

          8a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465

          SHA512

          95c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590

        • C:\Users\Admin\AppData\Local\Temp\db.dat
          Filesize

          557KB

          MD5

          76c3dbb1e9fea62090cdf53dadcbe28e

          SHA1

          d44b32d04adc810c6df258be85dc6b62bd48a307

          SHA256

          556fd54e5595d222cfa2bd353afa66d8d4d1fbb3003afed604672fceae991860

          SHA512

          de4ea57497cf26237430880742f59e8d2a0ac7e7a0b09ed7be590f36fbd08c9ced0ffe46eb69ec2215a9cff55720f24fffcae752cd282250b4da6b75a30b3a1b

        • C:\Users\Admin\AppData\Local\Temp\db.dll
          Filesize

          52KB

          MD5

          0b35335b70b96d31633d0caa207d71f9

          SHA1

          996c7804fe4d85025e2bd7ea8aa5e33c71518f84

          SHA256

          ec01d244074f45d4f698f5713147e99d76053824a648b306e1debf69f3ba9ce6

          SHA512

          ab3d770e99b3f379165863808f3ffc55d64d8e9384a158e6695d7325e97fa1bb570c5088ccdc1d2c3b90df5be11d6722ede15e7b6552bf90e748cb9c28ab94ce

        • C:\Users\Admin\AppData\Local\Temp\is-4VSVB.tmp\file.tmp
          Filesize

          1.0MB

          MD5

          6e8d8cabf1efb3f98adba1eed48e5a1e

          SHA1

          6ca75501f3eb4753afe1810ba761588021bd68c9

          SHA256

          8db82765fa0993c181346d9182d013271b7326e4c8415ce1e97bf606cd6474f6

          SHA512

          e3bb3029a9b50cfa18dc616aa2e04b7d0537efdedeb83ee40e976f5089e3e76b844c1e7e85d867f6c925ef8d8ed79de60a4ea7de5ee6127a52c6f7bbfcb7690f

        • C:\Users\Admin\AppData\Local\Temp\is-BD2H2.tmp\ty88__.exe
          Filesize

          302KB

          MD5

          cc41507ba8ee6cdd0909f513c977df6f

          SHA1

          eac08a0843d63ffd9b681d91624f1d1424a41c15

          SHA256

          35f7d826be42bcddad36ab6fffab52a393aabdf445cff086861f456bfcee814d

          SHA512

          6a9f0ccb052aa119ff65868a9592c6cee3dd0e481ecf5a3686541ddcdfd3443deb4f03b4f54bdc9a6ff6172a5a3ea2fb9e87671ce06210687935bc73230cbf6b

        • C:\Users\Admin\AppData\Local\Temp\is-BD2H2.tmp\ty88__.exe
          Filesize

          302KB

          MD5

          cc41507ba8ee6cdd0909f513c977df6f

          SHA1

          eac08a0843d63ffd9b681d91624f1d1424a41c15

          SHA256

          35f7d826be42bcddad36ab6fffab52a393aabdf445cff086861f456bfcee814d

          SHA512

          6a9f0ccb052aa119ff65868a9592c6cee3dd0e481ecf5a3686541ddcdfd3443deb4f03b4f54bdc9a6ff6172a5a3ea2fb9e87671ce06210687935bc73230cbf6b

        • C:\Users\Admin\AppData\Local\Temp\is-CC3BS.tmp\poweroff.tmp
          Filesize

          981KB

          MD5

          01515376348a54ecef04f45b436cb104

          SHA1

          111e709b21bf56181c83057dafba7b71ed41f1b2

          SHA256

          8c1a062cf83fba41daa86670e9ccdb7b7ae3c913fe6d0343284336d40c394ba0

          SHA512

          8d0a31e3694cec61fb99573e58c3696224a6198060d8bfca020805541789516315867b6b83a5e105703660e03fac4906f95f617dc8a3947d6b7982dfd3baea28

        • C:\Users\Admin\AppData\Local\Temp\is-CC3BS.tmp\poweroff.tmp
          Filesize

          981KB

          MD5

          01515376348a54ecef04f45b436cb104

          SHA1

          111e709b21bf56181c83057dafba7b71ed41f1b2

          SHA256

          8c1a062cf83fba41daa86670e9ccdb7b7ae3c913fe6d0343284336d40c394ba0

          SHA512

          8d0a31e3694cec61fb99573e58c3696224a6198060d8bfca020805541789516315867b6b83a5e105703660e03fac4906f95f617dc8a3947d6b7982dfd3baea28

        • C:\Users\Admin\AppData\Local\Temp\tths2mep.fpv\chenp.exe
          Filesize

          160KB

          MD5

          861253a1ff4bdacab4ddd1a1df3efc50

          SHA1

          5512ad9b91d5c5972ac0a4c5f0f28d966054807c

          SHA256

          9a3a87d0f2eeeca3e36bbaef7833c44f20e6162075c7cea9a89bce15d3d2269d

          SHA512

          39751c804a3ec9184f031d30682caae9232dfa00e0c00c7dbd2e09bc640147822f633593546b249b92be6f8896a1cabb08c8d70888d0082d3735be32f60d8927

        • C:\Users\Admin\AppData\Local\Temp\tths2mep.fpv\chenp.exe
          Filesize

          160KB

          MD5

          861253a1ff4bdacab4ddd1a1df3efc50

          SHA1

          5512ad9b91d5c5972ac0a4c5f0f28d966054807c

          SHA256

          9a3a87d0f2eeeca3e36bbaef7833c44f20e6162075c7cea9a89bce15d3d2269d

          SHA512

          39751c804a3ec9184f031d30682caae9232dfa00e0c00c7dbd2e09bc640147822f633593546b249b92be6f8896a1cabb08c8d70888d0082d3735be32f60d8927

        • C:\Users\Admin\AppData\Local\Temp\tths2mep.fpv\chenp.exe
          Filesize

          160KB

          MD5

          861253a1ff4bdacab4ddd1a1df3efc50

          SHA1

          5512ad9b91d5c5972ac0a4c5f0f28d966054807c

          SHA256

          9a3a87d0f2eeeca3e36bbaef7833c44f20e6162075c7cea9a89bce15d3d2269d

          SHA512

          39751c804a3ec9184f031d30682caae9232dfa00e0c00c7dbd2e09bc640147822f633593546b249b92be6f8896a1cabb08c8d70888d0082d3735be32f60d8927

        • C:\Users\Admin\AppData\Local\Temp\uglb5pxe.tfc\gcleaner.exe
          Filesize

          351KB

          MD5

          152ab6e85021ea39d747e2935fc0e17c

          SHA1

          6926fcf7b717a93b8fc66b91a42d910952590928

          SHA256

          760f394d30f59baaab2672be1c04595378b89111125842b99893498e7bfdf562

          SHA512

          7d277f76595b10a2c387bf039103179e16eea5efcd85d7060e94364393a0049e8a911df18d6a4949b98cc09acb3951343c6eacdb2e0771b4e855be8ea392a169

        • C:\Users\Admin\AppData\Local\Temp\uglb5pxe.tfc\gcleaner.exe
          Filesize

          351KB

          MD5

          152ab6e85021ea39d747e2935fc0e17c

          SHA1

          6926fcf7b717a93b8fc66b91a42d910952590928

          SHA256

          760f394d30f59baaab2672be1c04595378b89111125842b99893498e7bfdf562

          SHA512

          7d277f76595b10a2c387bf039103179e16eea5efcd85d7060e94364393a0049e8a911df18d6a4949b98cc09acb3951343c6eacdb2e0771b4e855be8ea392a169

        • C:\Users\Admin\AppData\Local\Temp\z2gabamn.z0l\GcleanerEU.exe
          Filesize

          351KB

          MD5

          152ab6e85021ea39d747e2935fc0e17c

          SHA1

          6926fcf7b717a93b8fc66b91a42d910952590928

          SHA256

          760f394d30f59baaab2672be1c04595378b89111125842b99893498e7bfdf562

          SHA512

          7d277f76595b10a2c387bf039103179e16eea5efcd85d7060e94364393a0049e8a911df18d6a4949b98cc09acb3951343c6eacdb2e0771b4e855be8ea392a169

        • C:\Users\Admin\AppData\Local\Temp\z2gabamn.z0l\GcleanerEU.exe
          Filesize

          351KB

          MD5

          152ab6e85021ea39d747e2935fc0e17c

          SHA1

          6926fcf7b717a93b8fc66b91a42d910952590928

          SHA256

          760f394d30f59baaab2672be1c04595378b89111125842b99893498e7bfdf562

          SHA512

          7d277f76595b10a2c387bf039103179e16eea5efcd85d7060e94364393a0049e8a911df18d6a4949b98cc09acb3951343c6eacdb2e0771b4e855be8ea392a169

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QNNUZRWB.txt
          Filesize

          606B

          MD5

          7ed493abcc0c788e8f10575cc9be05da

          SHA1

          56d4e11230e28bf716c76d789cbe004c388a2189

          SHA256

          6b44580149fae1160067e830b0fb1167c949869d84220efcfcb0e0193b6a7f77

          SHA512

          26fd9fe6a58c7c196923984f5a293087bb1da27c801006629ac41900fd161cf65afa22d466a6eb1ff98645a0c092d03aa0cb0c556186c0b82afdce6c9ef28fd7

        • \Program Files (x86)\powerOff\Power Off.exe
          Filesize

          621KB

          MD5

          8d0b18eb87590fa654da3704092b122b

          SHA1

          aaf4417695904bd718def564b2c1dae40623cc1d

          SHA256

          f9d12723a5ac3ade8212b4ec2f2b8452b7deb10e071bcb4e50a9cb6cb85b1457

          SHA512

          fa54fad936e96ecabfab70f29fe5095b60ce5bfa7f31f6c405c42ad4f4f153ec7406d03d0451e11e886722abf28f09b219d3e8d9a703f20cb67b0950d8b70828

        • \Program Files (x86)\powerOff\Power Off.exe
          Filesize

          621KB

          MD5

          8d0b18eb87590fa654da3704092b122b

          SHA1

          aaf4417695904bd718def564b2c1dae40623cc1d

          SHA256

          f9d12723a5ac3ade8212b4ec2f2b8452b7deb10e071bcb4e50a9cb6cb85b1457

          SHA512

          fa54fad936e96ecabfab70f29fe5095b60ce5bfa7f31f6c405c42ad4f4f153ec7406d03d0451e11e886722abf28f09b219d3e8d9a703f20cb67b0950d8b70828

        • \Program Files (x86)\powerOff\Power Off.exe
          Filesize

          621KB

          MD5

          8d0b18eb87590fa654da3704092b122b

          SHA1

          aaf4417695904bd718def564b2c1dae40623cc1d

          SHA256

          f9d12723a5ac3ade8212b4ec2f2b8452b7deb10e071bcb4e50a9cb6cb85b1457

          SHA512

          fa54fad936e96ecabfab70f29fe5095b60ce5bfa7f31f6c405c42ad4f4f153ec7406d03d0451e11e886722abf28f09b219d3e8d9a703f20cb67b0950d8b70828

        • \Users\Admin\AppData\Local\Temp\db.dll
          Filesize

          52KB

          MD5

          0b35335b70b96d31633d0caa207d71f9

          SHA1

          996c7804fe4d85025e2bd7ea8aa5e33c71518f84

          SHA256

          ec01d244074f45d4f698f5713147e99d76053824a648b306e1debf69f3ba9ce6

          SHA512

          ab3d770e99b3f379165863808f3ffc55d64d8e9384a158e6695d7325e97fa1bb570c5088ccdc1d2c3b90df5be11d6722ede15e7b6552bf90e748cb9c28ab94ce

        • \Users\Admin\AppData\Local\Temp\db.dll
          Filesize

          52KB

          MD5

          0b35335b70b96d31633d0caa207d71f9

          SHA1

          996c7804fe4d85025e2bd7ea8aa5e33c71518f84

          SHA256

          ec01d244074f45d4f698f5713147e99d76053824a648b306e1debf69f3ba9ce6

          SHA512

          ab3d770e99b3f379165863808f3ffc55d64d8e9384a158e6695d7325e97fa1bb570c5088ccdc1d2c3b90df5be11d6722ede15e7b6552bf90e748cb9c28ab94ce

        • \Users\Admin\AppData\Local\Temp\db.dll
          Filesize

          52KB

          MD5

          0b35335b70b96d31633d0caa207d71f9

          SHA1

          996c7804fe4d85025e2bd7ea8aa5e33c71518f84

          SHA256

          ec01d244074f45d4f698f5713147e99d76053824a648b306e1debf69f3ba9ce6

          SHA512

          ab3d770e99b3f379165863808f3ffc55d64d8e9384a158e6695d7325e97fa1bb570c5088ccdc1d2c3b90df5be11d6722ede15e7b6552bf90e748cb9c28ab94ce

        • \Users\Admin\AppData\Local\Temp\db.dll
          Filesize

          52KB

          MD5

          0b35335b70b96d31633d0caa207d71f9

          SHA1

          996c7804fe4d85025e2bd7ea8aa5e33c71518f84

          SHA256

          ec01d244074f45d4f698f5713147e99d76053824a648b306e1debf69f3ba9ce6

          SHA512

          ab3d770e99b3f379165863808f3ffc55d64d8e9384a158e6695d7325e97fa1bb570c5088ccdc1d2c3b90df5be11d6722ede15e7b6552bf90e748cb9c28ab94ce

        • \Users\Admin\AppData\Local\Temp\is-4VSVB.tmp\file.tmp
          Filesize

          1.0MB

          MD5

          6e8d8cabf1efb3f98adba1eed48e5a1e

          SHA1

          6ca75501f3eb4753afe1810ba761588021bd68c9

          SHA256

          8db82765fa0993c181346d9182d013271b7326e4c8415ce1e97bf606cd6474f6

          SHA512

          e3bb3029a9b50cfa18dc616aa2e04b7d0537efdedeb83ee40e976f5089e3e76b844c1e7e85d867f6c925ef8d8ed79de60a4ea7de5ee6127a52c6f7bbfcb7690f

        • \Users\Admin\AppData\Local\Temp\is-BD2H2.tmp\_isetup\_shfoldr.dll
          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\is-BD2H2.tmp\_isetup\_shfoldr.dll
          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\is-BD2H2.tmp\idp.dll
          Filesize

          216KB

          MD5

          8f995688085bced38ba7795f60a5e1d3

          SHA1

          5b1ad67a149c05c50d6e388527af5c8a0af4343a

          SHA256

          203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006

          SHA512

          043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35

        • \Users\Admin\AppData\Local\Temp\is-BD2H2.tmp\ty88__.exe
          Filesize

          302KB

          MD5

          cc41507ba8ee6cdd0909f513c977df6f

          SHA1

          eac08a0843d63ffd9b681d91624f1d1424a41c15

          SHA256

          35f7d826be42bcddad36ab6fffab52a393aabdf445cff086861f456bfcee814d

          SHA512

          6a9f0ccb052aa119ff65868a9592c6cee3dd0e481ecf5a3686541ddcdfd3443deb4f03b4f54bdc9a6ff6172a5a3ea2fb9e87671ce06210687935bc73230cbf6b

        • \Users\Admin\AppData\Local\Temp\is-CC3BS.tmp\poweroff.tmp
          Filesize

          981KB

          MD5

          01515376348a54ecef04f45b436cb104

          SHA1

          111e709b21bf56181c83057dafba7b71ed41f1b2

          SHA256

          8c1a062cf83fba41daa86670e9ccdb7b7ae3c913fe6d0343284336d40c394ba0

          SHA512

          8d0a31e3694cec61fb99573e58c3696224a6198060d8bfca020805541789516315867b6b83a5e105703660e03fac4906f95f617dc8a3947d6b7982dfd3baea28

        • \Users\Admin\AppData\Local\Temp\is-KRRU2.tmp\_isetup\_shfoldr.dll
          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\is-KRRU2.tmp\_isetup\_shfoldr.dll
          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\tths2mep.fpv\chenp.exe
          Filesize

          160KB

          MD5

          861253a1ff4bdacab4ddd1a1df3efc50

          SHA1

          5512ad9b91d5c5972ac0a4c5f0f28d966054807c

          SHA256

          9a3a87d0f2eeeca3e36bbaef7833c44f20e6162075c7cea9a89bce15d3d2269d

          SHA512

          39751c804a3ec9184f031d30682caae9232dfa00e0c00c7dbd2e09bc640147822f633593546b249b92be6f8896a1cabb08c8d70888d0082d3735be32f60d8927

        • memory/520-71-0x00000000005A0000-0x00000000005FE000-memory.dmp
          Filesize

          376KB

        • memory/520-69-0x00000000011D0000-0x0000000001222000-memory.dmp
          Filesize

          328KB

        • memory/520-70-0x00000000009D0000-0x0000000000A3E000-memory.dmp
          Filesize

          440KB

        • memory/520-66-0x0000000000000000-mapping.dmp
        • memory/868-156-0x0000000001240000-0x00000000012B2000-memory.dmp
          Filesize

          456KB

        • memory/868-198-0x0000000000380000-0x00000000003CD000-memory.dmp
          Filesize

          308KB

        • memory/968-101-0x0000000000000000-mapping.dmp
        • memory/968-105-0x000007FEF4D00000-0x000007FEF5D96000-memory.dmp
          Filesize

          16.6MB

        • memory/968-111-0x0000000000B16000-0x0000000000B35000-memory.dmp
          Filesize

          124KB

        • memory/968-186-0x0000000000B16000-0x0000000000B35000-memory.dmp
          Filesize

          124KB

        • memory/968-104-0x000007FEF5FE0000-0x000007FEF6A03000-memory.dmp
          Filesize

          10.1MB

        • memory/1248-191-0x0000000000380000-0x0000000000400000-memory.dmp
          Filesize

          512KB

        • memory/1248-106-0x000007FEF4D00000-0x000007FEF5D96000-memory.dmp
          Filesize

          16.6MB

        • memory/1248-94-0x000007FEF5FE0000-0x000007FEF6A03000-memory.dmp
          Filesize

          10.1MB

        • memory/1248-72-0x0000000000000000-mapping.dmp
        • memory/1248-119-0x0000000000380000-0x0000000000400000-memory.dmp
          Filesize

          512KB

        • memory/1248-113-0x000000001D1C0000-0x000000001D4BF000-memory.dmp
          Filesize

          3.0MB

        • memory/1324-58-0x0000000000000000-mapping.dmp
        • memory/1460-64-0x0000000000400000-0x000000000046D000-memory.dmp
          Filesize

          436KB

        • memory/1460-55-0x0000000000400000-0x000000000046D000-memory.dmp
          Filesize

          436KB

        • memory/1460-54-0x00000000768A1000-0x00000000768A3000-memory.dmp
          Filesize

          8KB

        • memory/1460-92-0x0000000000400000-0x000000000046D000-memory.dmp
          Filesize

          436KB

        • memory/1632-87-0x0000000000000000-mapping.dmp
        • memory/1632-96-0x0000000074CF1000-0x0000000074CF3000-memory.dmp
          Filesize

          8KB

        • memory/1660-82-0x0000000000000000-mapping.dmp
        • memory/1660-109-0x000000001C9E0000-0x000000001CCDF000-memory.dmp
          Filesize

          3.0MB

        • memory/1660-95-0x000007FEF5FE0000-0x000007FEF6A03000-memory.dmp
          Filesize

          10.1MB

        • memory/1748-79-0x0000000000400000-0x000000000045C000-memory.dmp
          Filesize

          368KB

        • memory/1748-93-0x0000000000400000-0x000000000045C000-memory.dmp
          Filesize

          368KB

        • memory/1748-75-0x0000000000000000-mapping.dmp
        • memory/3304-115-0x0000000000000000-mapping.dmp
        • memory/3312-126-0x0000000000000000-mapping.dmp
        • memory/3984-136-0x0000000000400000-0x0000000002BBF000-memory.dmp
          Filesize

          39.7MB

        • memory/3984-134-0x0000000000230000-0x0000000000270000-memory.dmp
          Filesize

          256KB

        • memory/3984-133-0x0000000002DAD000-0x0000000002DD4000-memory.dmp
          Filesize

          156KB

        • memory/3984-117-0x0000000000000000-mapping.dmp
        • memory/3984-162-0x0000000000400000-0x0000000002BBF000-memory.dmp
          Filesize

          39.7MB

        • memory/3984-158-0x0000000002DAD000-0x0000000002DD4000-memory.dmp
          Filesize

          156KB

        • memory/4012-120-0x0000000000000000-mapping.dmp
        • memory/4040-141-0x00000000002ED000-0x0000000000314000-memory.dmp
          Filesize

          156KB

        • memory/4040-165-0x0000000000400000-0x0000000002BBF000-memory.dmp
          Filesize

          39.7MB

        • memory/4040-122-0x0000000000000000-mapping.dmp
        • memory/4040-137-0x0000000000400000-0x0000000002BBF000-memory.dmp
          Filesize

          39.7MB

        • memory/4040-163-0x00000000002ED000-0x0000000000314000-memory.dmp
          Filesize

          156KB

        • memory/4064-124-0x0000000000000000-mapping.dmp
        • memory/4128-131-0x0000000000000000-mapping.dmp
        • memory/4252-148-0x00000000006E0000-0x00000000007E1000-memory.dmp
          Filesize

          1.0MB

        • memory/4252-139-0x0000000000000000-mapping.dmp
        • memory/4252-149-0x0000000000370000-0x00000000003CE000-memory.dmp
          Filesize

          376KB

        • memory/4424-200-0x0000000002D70000-0x0000000002E7A000-memory.dmp
          Filesize

          1.0MB

        • memory/4424-201-0x0000000001CE0000-0x0000000001D00000-memory.dmp
          Filesize

          128KB

        • memory/4424-154-0x0000000000060000-0x00000000000AD000-memory.dmp
          Filesize

          308KB

        • memory/4424-155-0x00000000004B0000-0x0000000000522000-memory.dmp
          Filesize

          456KB

        • memory/4424-213-0x0000000002D70000-0x0000000002E7A000-memory.dmp
          Filesize

          1.0MB

        • memory/4424-195-0x000007FEFC141000-0x000007FEFC143000-memory.dmp
          Filesize

          8KB

        • memory/4424-197-0x00000000004B0000-0x0000000000522000-memory.dmp
          Filesize

          456KB

        • memory/4424-150-0x0000000000060000-0x00000000000AD000-memory.dmp
          Filesize

          308KB

        • memory/4424-199-0x0000000000210000-0x000000000022B000-memory.dmp
          Filesize

          108KB

        • memory/4424-152-0x00000000FF4C246C-mapping.dmp
        • memory/4424-202-0x0000000002060000-0x000000000207B000-memory.dmp
          Filesize

          108KB

        • memory/4560-157-0x0000000000000000-mapping.dmp
        • memory/4604-160-0x0000000000000000-mapping.dmp
        • memory/4616-161-0x0000000000000000-mapping.dmp
        • memory/4688-164-0x0000000000000000-mapping.dmp