Analysis

  • max time kernel
    182s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 20:56

General

  • Target

    http://dropbox.com/scl/fi/mr0zoowafor2lzj2y4474/NightVerse-Setup.exe?rlkey=tqn0lg2t009fvh7zktiazb95i&st=bty9stju&dl=1

Malware Config

Extracted

Family

stealc

Botnet

night26

C2

http://193.163.7.39

Attributes
  • url_path

    /37df4baa5407073d.php

Signatures

  • Detects HijackLoader (aka IDAT Loader) 2 IoCs
  • HijackLoader

    HijackLoader is a multistage loader first seen in 2023.

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 58 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 46 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2656
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:440
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://dropbox.com/scl/fi/mr0zoowafor2lzj2y4474/NightVerse-Setup.exe?rlkey=tqn0lg2t009fvh7zktiazb95i&st=bty9stju&dl=1
      1⤵
      • Enumerates system info in registry
      • Modifies registry class
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8daf946f8,0x7ff8daf94708,0x7ff8daf94718
        2⤵
          PID:3776
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:2
          2⤵
            PID:4592
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1880
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:8
            2⤵
              PID:1936
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
              2⤵
                PID:2284
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:1
                2⤵
                  PID:4188
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:8
                  2⤵
                    PID:2940
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:852
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:1
                    2⤵
                      PID:4556
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:1
                      2⤵
                        PID:3184
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3852 /prefetch:1
                        2⤵
                          PID:456
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                          2⤵
                            PID:4136
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:1
                            2⤵
                              PID:2292
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3292 /prefetch:8
                              2⤵
                                PID:3192
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6268 /prefetch:8
                                2⤵
                                  PID:512
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1556
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4178111166486484782,8945329880575573718,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3076
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3540
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4640
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:1764
                                    • C:\Users\Admin\Downloads\NightVerse Setup.exe
                                      "C:\Users\Admin\Downloads\NightVerse Setup.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Drops file in Program Files directory
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1396
                                      • C:\Program Files (x86)\NightVerse\NightVerse.exe
                                        "C:\Program Files (x86)\NightVerse\NightVerse.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2416
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "powershell" /command Add-MpPreference -ExclusionPath 'C:\Users\Admin'; Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
                                          3⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5668
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "powershell" /command Add-MpPreference -ExclusionPath 'C:\Users\Admin'; Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
                                          3⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5828
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "powershell" /command Add-MpPreference -ExclusionPath 'C:\Users\Admin'; Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
                                          3⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5976
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "powershell" /command Add-MpPreference -ExclusionPath 'C:\Users\Admin'; Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
                                          3⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:6100
                                        • C:\Users\Admin\AppData\Local\Temp\5e1a6255-d597-4201-a1f4-74a7d54ed10e\snss1.exe
                                          "C:\Users\Admin\AppData\Local\Temp\5e1a6255-d597-4201-a1f4-74a7d54ed10e\snss1.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious behavior: MapViewOfSection
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1188
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\SysWOW64\cmd.exe
                                            4⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious behavior: MapViewOfSection
                                            PID:648
                                            • C:\Windows\SysWOW64\explorer.exe
                                              C:\Windows\SysWOW64\explorer.exe
                                              5⤵
                                              • Loads dropped DLL
                                              • Checks processor information in registry
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5436
                                        • C:\Users\Admin\AppData\Local\Temp\5e1a6255-d597-4201-a1f4-74a7d54ed10e\snss2.exe
                                          "C:\Users\Admin\AppData\Local\Temp\5e1a6255-d597-4201-a1f4-74a7d54ed10e\snss2.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious behavior: MapViewOfSection
                                          • Suspicious use of SetWindowsHookEx
                                          PID:5724
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\SysWOW64\cmd.exe
                                            4⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious behavior: MapViewOfSection
                                            PID:5812
                                            • C:\Windows\SysWOW64\explorer.exe
                                              C:\Windows\SysWOW64\explorer.exe
                                              5⤵
                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5132

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Program Files (x86)\NightVerse\NightVerse.dll

                                      Filesize

                                      486KB

                                      MD5

                                      594b0719e5f91ee2bee77def26704e21

                                      SHA1

                                      135ee9c8ddd29f3ef667ebafb11227f3bb16e57f

                                      SHA256

                                      bfb2c6822cdc11061cc848e4d2659de216f6e836c2fb3d01ee79191fdd6810d5

                                      SHA512

                                      b12efd78e967bbc6d0c6587c19bf4416ce6e561fa53648aaa7dbc5a63ba4c423bb1b7df6cc7da1370fc5af7b784d6137b80cf8a56a00b38afdf0c84d0911a6b0

                                    • C:\Program Files (x86)\NightVerse\NightVerse.exe

                                      Filesize

                                      326KB

                                      MD5

                                      f034c12cf8a8e4f7e889303ed7362c12

                                      SHA1

                                      68e95e5dbdac16ee941d62297d3e5aea2a49e9ab

                                      SHA256

                                      27c97c6bb1482509918ed30bef35569e13d86c704d884a340438b308b9d8b341

                                      SHA512

                                      43d983dfcfda921e20d1a9f8ac40cf6ab936f57eb09e9c30de2e81063424023f54ae3bcba15ae7806f6a57a937536a68d568254e971b3e7d70319c47d4233bdf

                                    • C:\Program Files (x86)\NightVerse\System.Collections.Concurrent.dll

                                      Filesize

                                      270KB

                                      MD5

                                      38d21e067d7673194a84cced59066ac8

                                      SHA1

                                      e64362176f714b23603f3a67f1e741f12e35a832

                                      SHA256

                                      483130bfd1e57a0cbfd8a4f3c6e2353ac3f246276f9476c83cca1cadbc47ef47

                                      SHA512

                                      3fa6f78ff0cb527a8e82261549f24a8609d005821ac5c5e7257670dffd55472a134af3ef78d73779758303ae5a90728181cd4caebc871c5cfa4c309141201baf

                                    • C:\Program Files (x86)\NightVerse\System.Collections.dll

                                      Filesize

                                      254KB

                                      MD5

                                      92063926c04f2e4bf5b5fde16542831d

                                      SHA1

                                      e7be34eaff2d3d8796911d21f1fdbb93bf231dec

                                      SHA256

                                      9193aaef3ea8f19408f88c25fcaf5880e7836d1c35028d7e4077f6090b083541

                                      SHA512

                                      e855ee37980d1da2d143ee39133b05fff81937e529cffe74433e73088549daabd3abadbf05f3765bf3ffffd50313f0ed966efec0eb244d7363241affd73cc29f

                                    • C:\Program Files (x86)\NightVerse\System.ComponentModel.Primitives.dll

                                      Filesize

                                      78KB

                                      MD5

                                      1c59c00ab0850af4b4d2bafd6be47db3

                                      SHA1

                                      4c6185b2f42987e25a5fdf2aa30cf4150de25d5b

                                      SHA256

                                      133ec34432ab8fa4f63ade636193864b6a62a089a0c98d746f5532c8a52f437b

                                      SHA512

                                      8425c02c4afb274e862e4ed5dd1c766ebfa1bcf5bf59018d86238014a52603331a8b7c1e233f5a1f22171e90132ddd585db0d2561ff2cd287d703397afdff4b1

                                    • C:\Program Files (x86)\NightVerse\System.Drawing.Primitives.dll

                                      Filesize

                                      130KB

                                      MD5

                                      b5ca10a41cc865048491f617678722a9

                                      SHA1

                                      afe171d9d676b78983b802e18ef8e00927073c64

                                      SHA256

                                      cbe9fbb1d1e4850460854474ffd8c01ddcc756dcb33a86d1674c0cb2e2a0b026

                                      SHA512

                                      2afdce56b7eec6deb82f8b2d5ec3029b5a0ee1e8bbf2e0ff9a0a5310bf265ddcdf63660546b4dbcc3c5fb0cba3cbb94f2408fe5cb4d14dbe0e74aba6dd5a2192

                                    • C:\Program Files (x86)\NightVerse\System.IO.FileSystem.dll

                                      Filesize

                                      15KB

                                      MD5

                                      35e27f4c681085a4b096826ee8ea4f53

                                      SHA1

                                      cf3ea4304e5558c8fdd4422e4d72509cd91ea719

                                      SHA256

                                      7bd41c6b12b73e6e90476f2d56db8581664abe07e7ab9bf2917bb254ed1d75ad

                                      SHA512

                                      1f9e6519ff29524e57cb0b3576ab118014293aade8f30027ef44b1f29a8e9a54e7bcb3b288a92dba996053b16016807d93fa9f44f2c43666ddc6425ddd7ae4b9

                                    • C:\Program Files (x86)\NightVerse\System.Memory.dll

                                      Filesize

                                      154KB

                                      MD5

                                      7e999da530c21a292cec8a642127b8c8

                                      SHA1

                                      6585d0260ae98bab2ad1eaba0f9cfe8ebb8a0b3f

                                      SHA256

                                      3af25e0c81c1462d0db86f55c4e5fd8c048c70685f9a566d29d499bc46935fb4

                                      SHA512

                                      a18b6649b5c2f9f96bf639863df9faad436759200a64f91fb2d955f33c71ce4b2d5798be982f692a247ac864d8acb63fb731b31c06333e5c7d9a9c895ecd6451

                                    • C:\Program Files (x86)\NightVerse\System.Private.CoreLib.dll

                                      Filesize

                                      12.6MB

                                      MD5

                                      805cf170e27dd31219a6b873c17dce88

                                      SHA1

                                      ac90fa4690a8b54b6248dcb4c41a2c9a74547667

                                      SHA256

                                      ba7e61a00e7a4634b5c5a79b83126f75580ceec235c613000c3efbc01826cad0

                                      SHA512

                                      fa946aae906b66cb5570155a1c77340f2b6d4efb9be16068da03a8f1c5b5f37ad847d65cd1416017db19375dc6a72670300da4c766e6d9bb1a00374f492bd866

                                    • C:\Program Files (x86)\NightVerse\System.Private.Xml.Linq.dll

                                      Filesize

                                      394KB

                                      MD5

                                      60ed8b2bffc748d6a2a1fed8fa923368

                                      SHA1

                                      be411429b9a649a495124558c5e5d95a83525d58

                                      SHA256

                                      0b63cebb991d1911a607993ea5b4639f34a2b0b381a73973542db2d3591e9f90

                                      SHA512

                                      b0a4ac2aa96d827258bb30f098512741ad3f93585e05ceae0255e15cd8dc9ab8048788902c1eb32a813e9c69c8a923200a716b4e00f579c22a0b425665e575f8

                                    • C:\Program Files (x86)\NightVerse\System.Private.Xml.dll

                                      Filesize

                                      7.6MB

                                      MD5

                                      46aebfbd6d7e74d4d558da62d7600d25

                                      SHA1

                                      9c1cd44ab8b5e283967427e91cbddddfc0c2bf5a

                                      SHA256

                                      834e304221e742a831be5c5178892258e689eae35b730172e74161af2785aab9

                                      SHA512

                                      9c4499d174a988cc3830aafcc42f79defff37b16198f49cf5d2dc86f88809fcb44e0c300351f813d46addf9998f64448c50213f1721c6a307aad21c205db1524

                                    • C:\Program Files (x86)\NightVerse\System.Runtime.InteropServices.dll

                                      Filesize

                                      94KB

                                      MD5

                                      49c86e36b713e2b7daeb7547cede45fb

                                      SHA1

                                      75fe38864362226d2cce32b2c25432b1fd18ba37

                                      SHA256

                                      756de3f5f2e07b478ac046a0ac976b992ef6bc653a1be2bb1e28524a4ff8d67d

                                      SHA512

                                      a9bd42b626158c540be04f8d392620daba544a55b7438d6caefe93b9df10ec2219f28959c4e0d706a86b92008275de94dfdf19de730787cdacf46d99fc45e3a9

                                    • C:\Program Files (x86)\NightVerse\System.Runtime.dll

                                      Filesize

                                      42KB

                                      MD5

                                      53501b2f33c210123a1a08a977d16b25

                                      SHA1

                                      354e358d7cf2a655e80c4e4a645733c3db0e7e4d

                                      SHA256

                                      1fc86ada2ec543a85b8a06a9470a7b5aaa91eb03cfe497a32cd52a1e043ea100

                                      SHA512

                                      9ef3b47ddd275de9dfb5ded34a69a74af2689ebcb34911f0e4ffef9e2faf409e2395c7730bce364b5668b2b3b3e05a7b5998586563fb15e22c223859b2e77796

                                    • C:\Program Files (x86)\NightVerse\System.Security.Cryptography.Algorithms.dll

                                      Filesize

                                      17KB

                                      MD5

                                      8f3b379221c31a9c5a39e31e136d0fda

                                      SHA1

                                      e57e8efe5609b27e8c180a04a16fbe1a82f5557d

                                      SHA256

                                      c99c6b384655e1af4ae5161fe9d54d95828ae17b18b884b0a99258f1c45aa388

                                      SHA512

                                      377f4e611a7cf2d5035f4622c590572031a476dd111598168acea1844aaa425c0fe012c763fbc16290c7b32c6c7df7b2563c88227e3dbc5d2bd02250c9d368d9

                                    • C:\Program Files (x86)\NightVerse\System.Security.Cryptography.Csp.dll

                                      Filesize

                                      15KB

                                      MD5

                                      c7f55dbc6f5090194c5907054779e982

                                      SHA1

                                      efa17e697b8cfd607c728608a3926eda7cd88238

                                      SHA256

                                      16bc1f72938d96deca5ce031a29a43552385674c83f07e4f91d387f5f01b8d0a

                                      SHA512

                                      ae0164273b04afdec2257ae30126a8b44d80ee52725009cc917d28d09fcfb19dfbbb3a817423e98af36f773015768fed9964331d992ad1830f6797b854c0c355

                                    • C:\Program Files (x86)\NightVerse\System.Security.Cryptography.Primitives.dll

                                      Filesize

                                      15KB

                                      MD5

                                      777ac34f9d89c6e4753b7a7b3be4ca29

                                      SHA1

                                      27e4bd1bfd7c9d9b0b19f3d6008582b44c156443

                                      SHA256

                                      6703e8d35df4b6389f43df88cc35fc3b3823fb3a7f04e5eb540b0af39f5fa622

                                      SHA512

                                      a791fa27b37c67ace72956680c662eb68f053fa8c8f4205f6ed78ecb2748d27d9010a8de94669d0ee33a8fca885380f8e6cfad9f475b07f60d34cdcb02d57439

                                    • C:\Program Files (x86)\NightVerse\System.Security.Cryptography.dll

                                      Filesize

                                      2.0MB

                                      MD5

                                      75f18d3666eb009dd86fab998bb98710

                                      SHA1

                                      b273f135e289d528c0cfffad5613a272437b1f77

                                      SHA256

                                      4582f67764410785714a30fa05ffaaad78fe1bc8d4689889a43c2af825b2002e

                                      SHA512

                                      9e110e87e00f42c228729e649903ad649b962ae28900d486ee8f96c47acca094dbace608f9504745abf7e69597cdef3c6b544b5194703882a0a7f27b011fa8d5

                                    • C:\Program Files (x86)\NightVerse\System.Threading.Thread.dll

                                      Filesize

                                      15KB

                                      MD5

                                      72d839e793c4f3200d4c5a6d4aa28d20

                                      SHA1

                                      fbc25dd97b031a6faddd7e33bc500719e8eead19

                                      SHA256

                                      84c9a95609878542f00fe7da658f62d1a6943a43e6346af80d26bcff069a4dbd

                                      SHA512

                                      a414cd9d7cf6a04709f3bdbef0295349b845a8301171ed6394e97b9993f35816383b958736c814f91c359a783cca86ee04802856486d4b4e0ab90a45da39db1d

                                    • C:\Program Files (x86)\NightVerse\System.Threading.dll

                                      Filesize

                                      82KB

                                      MD5

                                      32aa6e809d0ddb57806c6c23b584440e

                                      SHA1

                                      6bd651b9456f88a28f7054af475031afe52b7b64

                                      SHA256

                                      e8d1f5c422ee0ba3b235b22028ab92dc77c1ff9774edc0b940cad7224a30ba7d

                                      SHA512

                                      fe43b3d6ed5c37d59a44636d3c7522a88d83e6ec074bf69d3cbb6e5454fdd8f0523ea10fdf6fd452cbd0e2fc159cf9d03dfad6b30e80e400e7f1773b5a2e8632

                                    • C:\Program Files (x86)\NightVerse\System.Windows.Forms.Primitives.dll

                                      Filesize

                                      2.9MB

                                      MD5

                                      8129c2d72bcba8b50576e7c43e558832

                                      SHA1

                                      f4892f78d2496f3a2e1fa2380ff68fbeb62e2dca

                                      SHA256

                                      5794a3996a0b4ab9cb13f3de0f87d50462615a7d0eb1d243d9324a682c1b58cb

                                      SHA512

                                      40fafbf9590d2b2c8f487f44708e9e97ddce03b1487be5c7cb3d4c92bdb7100a98aebada379f63003f0dd9d447ee2b0b9dfa0b057320ac05f7f77b31c5ffa97d

                                    • C:\Program Files (x86)\NightVerse\System.Windows.Forms.dll

                                      Filesize

                                      12.9MB

                                      MD5

                                      a51632facb386d55cc3bc1f0822e4222

                                      SHA1

                                      59144c26183277304933fd8bb5da7d363fcc11fa

                                      SHA256

                                      efc52dbbef5202d9ff424d7adc6e2249b66450a5fd5414891776fc617b00123e

                                      SHA512

                                      2a8d8e2ee8168e6f79476616385320f463ebc161c7393db2b18a7d35ca0111c5100b83954c5eabfe32b12cac3dbfdc514271dde4cc4468dd26235eb7020d9c14

                                    • C:\Program Files (x86)\NightVerse\clrjit.dll

                                      Filesize

                                      1.7MB

                                      MD5

                                      8b81a3f0521b10e9de59507fe8efd685

                                      SHA1

                                      0516ff331e09fbd88817d265ff9dd0b647f31acb

                                      SHA256

                                      0759c8129bc761fe039e1cacb92c643606591cb8149a2ed33ee16babc9768dcb

                                      SHA512

                                      ea11c04b92a76957dcebe9667bef1881fc9afa0f8c1547e23ada8125aa9e40d36e0efaf5749da346ba40c66da439cbd15bf98453e1f8dab4fe1efd5618fdc176

                                    • C:\Program Files (x86)\NightVerse\coreclr.dll

                                      Filesize

                                      4.8MB

                                      MD5

                                      9369162a572d150dca56c7ebcbb19285

                                      SHA1

                                      81ce4faeecbd9ba219411a6e61d3510aa90d971d

                                      SHA256

                                      871949a2ec19c183ccdacdea54c7b3e43c590eaf445e1b58817ee1cb3ce366d5

                                      SHA512

                                      1eb5eb2d90e3dd38023a3ae461f717837ce50c2f9fc5e882b0593ab81dae1748bdbb7b9b0c832451dfe3c1529f5e1894a451365b8c872a8c0a185b521dbcd16b

                                    • C:\Program Files (x86)\NightVerse\hostfxr.dll

                                      Filesize

                                      342KB

                                      MD5

                                      16532d13721ba4eac3ca60c29eefb16d

                                      SHA1

                                      f058d96f8e93b5291c07afdc1d891a8cc3edc9a0

                                      SHA256

                                      5aa15c6119b971742a7f824609739198a3c7c499370ed8b8df5a5942f69d9303

                                      SHA512

                                      9da30d469b4faed86a4bc62617b309f34e6bda66a3021b4a27d197d4bcb361f859c1a7c0aa2d16f0867ad93524b62a5f4e5ae5cf082da47fece87fc3d32ab100

                                    • C:\Program Files (x86)\NightVerse\hostpolicy.dll

                                      Filesize

                                      388KB

                                      MD5

                                      a7e9ed205cf16318d90734d184f220d0

                                      SHA1

                                      10de2d33e05728e409e254441e864590b77e9637

                                      SHA256

                                      02c8dbe7bf1999352fc561cb35b51c6a88c881a4223c478c91768fdaf8e47b62

                                      SHA512

                                      3ecbaf20946e27d924a38c5a2bf11bac7b678b8c4ebf6f436c923ea935982500e97f91d0e934b7fd6b1fc2a2fd34e7d7b31dbbe91314a218724b3b2fd64c4052

                                    • C:\Program Files (x86)\NightVerse\mscorrc.dll

                                      Filesize

                                      133KB

                                      MD5

                                      53e03d5e3bffa02fbc7fb1420ac8e858

                                      SHA1

                                      36c44c9ff39815aa167f341c286c5cd1514f771f

                                      SHA256

                                      23a433398be5135222ee14bb1de6334e7b22bad1a38664a83f1cf19dfbddd960

                                      SHA512

                                      f6aca16b90f6b4efa413dc9a8f1d05e83c1e3791b2cb988f9bce69d5272a0077c1edcae4111a494d166b5e3ab4e25956dead4e93ee1e43417c2b7bb082292170

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      ae54e9db2e89f2c54da8cc0bfcbd26bd

                                      SHA1

                                      a88af6c673609ecbc51a1a60dfbc8577830d2b5d

                                      SHA256

                                      5009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af

                                      SHA512

                                      e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      f53207a5ca2ef5c7e976cbb3cb26d870

                                      SHA1

                                      49a8cc44f53da77bb3dfb36fc7676ed54675db43

                                      SHA256

                                      19ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23

                                      SHA512

                                      be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      364B

                                      MD5

                                      55b2f9d4d29da0d9c52dfbbc449d71cf

                                      SHA1

                                      1f0285064196c46e18a9225d867cb71cd15c82f5

                                      SHA256

                                      c7f7db62d96d29d0a4754c3774a71367a8b5a8aaafd99918969bdd5b4e0d9f83

                                      SHA512

                                      b31393721a92a2580ed98b0c8dd0309103337e98829d99e58bf68575d1730c5ccfe9c8e4b092f23f67d8639206d69a86bc0c07b9667791cbcc83ada3b69cc5e5

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      186363f5e0d94ae560f6e8d1d15391cd

                                      SHA1

                                      b32c8a6a983a6288ad2e8daa36746f2ff0f56124

                                      SHA256

                                      c51c5db0d6c00ee555f1cd0576c8f4af8b4d9f5f32fcaf90da8d008ba9299b3c

                                      SHA512

                                      19e4dece1d25cce64a9a211322fd5c7e56ff4676cc473b076ec36df5472742dc487da28616d0a98a15ddb925a67efba4a0ce504728ae314a471dc6ab164bb6ec

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      9a7d452b5feeea756f0cf2f1511b1d79

                                      SHA1

                                      337a2b8440dddaed827db5a024d1431e62806b16

                                      SHA256

                                      79733303338b21eeb765319cf32ff1faf3f5e4b183192db198c2920694224dcd

                                      SHA512

                                      002d5431fc56d1fbb719359df714a11d04042d82e64a598dd5bbc0f5bc3d719ff2d15107022bea1215a46781bb5b74f6baec2b14e072a0a32b60324150417e6e

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      a501c8bd0aa95b7be9066b8827b061ed

                                      SHA1

                                      53576085d67021f09de26cb5a66b3aed8202fff2

                                      SHA256

                                      6d5b3c03a5834ac963771330215c28df3a36da966ba7dbeb20550357d7648939

                                      SHA512

                                      f4c55e382d4a5f7b511a7b61e29cec63732efeca830adbeb94753e0e060fd08b9d10926d5b862b9223050b4c2dddc268a03439845ec794d7f2c9aecb2b29d3a4

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      459bb910cea03fecbf354faf43a2eebc

                                      SHA1

                                      dabf650f3ca03eba2db5e33d1359e50dc3817892

                                      SHA256

                                      98d26405acb55db5f501e3c828ee0bddd871b148b80c2329e6d77b4d9d76fbb4

                                      SHA512

                                      730ca1f42f6d9880a1d3f282b5952c4717c101a27914d568b8f530f9eac69fc6706476c5317b8f934fc4b88f24647d1169b9ed3f78c226f39468b4b3555f0366

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kjyexths.vcx.ps1

                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • C:\Users\Admin\AppData\Local\Temp\nsj9C23.tmp\InstallOptions.dll

                                      Filesize

                                      15KB

                                      MD5

                                      d095b082b7c5ba4665d40d9c5042af6d

                                      SHA1

                                      2220277304af105ca6c56219f56f04e894b28d27

                                      SHA256

                                      b2091205e225fc07daf1101218c64ce62a4690cacac9c3d0644d12e93e4c213c

                                      SHA512

                                      61fb5cf84028437d8a63d0fda53d9fe0f521d8fe04e96853a5b7a22050c4c4fb5528ff0cdbb3ae6bc74a5033563fc417fc7537e4778227c9fd6633ae844c47d9

                                    • C:\Users\Admin\AppData\Local\Temp\nsj9C23.tmp\LangDLL.dll

                                      Filesize

                                      5KB

                                      MD5

                                      50016010fb0d8db2bc4cd258ceb43be5

                                      SHA1

                                      44ba95ee12e69da72478cf358c93533a9c7a01dc

                                      SHA256

                                      32230128c18574c1e860dfe4b17fe0334f685740e27bc182e0d525a8948c9c2e

                                      SHA512

                                      ed4cf49f756fbf673449dca20e63dce6d3a612b61f294efc9c3ccebeffa6a1372667932468816d3a7afdb7e5a652760689d8c6d3f331cedee7247404c879a233

                                    • C:\Users\Admin\AppData\Local\Temp\nsj9C23.tmp\System.dll

                                      Filesize

                                      12KB

                                      MD5

                                      4add245d4ba34b04f213409bfe504c07

                                      SHA1

                                      ef756d6581d70e87d58cc4982e3f4d18e0ea5b09

                                      SHA256

                                      9111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706

                                      SHA512

                                      1bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d

                                    • C:\Users\Admin\AppData\Local\Temp\nsj9C23.tmp\ioSpecial.ini

                                      Filesize

                                      1KB

                                      MD5

                                      b9c6ea0f492c6e2e0ac0c3549199a0e0

                                      SHA1

                                      815291d69f62f7c473ceaa21983ccfcf3b0564c6

                                      SHA256

                                      57c2dba578b50cc8b961857929df563aa11472d73445bf673371322dad216980

                                      SHA512

                                      c7b524828c8ae8d2d3e1fa9fda5861b17c9e329c4392031a781e249019f1fcfb6b28394d42d73847411a1a16c9f477f9e5e327437d1b0a0484aad564aed626c4

                                    • C:\Users\Admin\AppData\Local\Temp\nsj9C23.tmp\ioSpecial.ini

                                      Filesize

                                      1KB

                                      MD5

                                      909772e20a699b246e62bc367d68f443

                                      SHA1

                                      34238d0a65766c2d29ab426cdc6467bd08bfc9f8

                                      SHA256

                                      f9d86ba6e74b4f0835bff9b4e133d7d062ebb65c28c8d8f7efb3debd220b7531

                                      SHA512

                                      ecf04e8d8a5e5683f43c5c3ecce95b7d743071ecf6103d7370a85e5f119012626c11033b527c215e3e8913634e3a14868e706ed03901c0dfe22795f26f526b1a

                                    • C:\Users\Admin\AppData\Local\Temp\nsj9C23.tmp\ioSpecial.ini

                                      Filesize

                                      1KB

                                      MD5

                                      add4d2cf0d879710b95003dab3037f3c

                                      SHA1

                                      2d6a2245400cece94054b5fafce42238fd492edb

                                      SHA256

                                      51a7f844a5021b60e6e8256f7b5842265bff308e14e6544cb69571e1100e9c37

                                      SHA512

                                      a12ea4fb615f84f494eb112b77e9c0ba67a26fe024779fa71fd0060c7c142be6e4104699c36c41dacce73799aaca3d9a8e58c32163cd8993feff4d7a96faa5f9

                                    • C:\Users\Admin\Downloads\Unconfirmed 604330.crdownload

                                      Filesize

                                      47.5MB

                                      MD5

                                      66a83a3a5e3d36a47a847b8fc5d01c53

                                      SHA1

                                      a94b75ef8d674f31628ed6266471aecb8b925753

                                      SHA256

                                      693a9860b2d4887e92be1c28fe63953e0569317936dfcc50255e494e45b6e933

                                      SHA512

                                      f9498de29b347cca3cc155cab2d519e3dba0b5e54b4f0687869d51ebbb9d56682e10f334b9865eb6c89433d121e24383bb98b1470d256dc2a0ffb94b5f8eaa78

                                    • memory/440-999-0x0000000076FB0000-0x00000000771C5000-memory.dmp

                                      Filesize

                                      2.1MB

                                    • memory/440-997-0x00007FF8EA250000-0x00007FF8EA445000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/440-996-0x0000000002C90000-0x0000000003090000-memory.dmp

                                      Filesize

                                      4.0MB

                                    • memory/440-992-0x0000000000DE0000-0x0000000000DE9000-memory.dmp

                                      Filesize

                                      36KB

                                    • memory/648-897-0x0000000075420000-0x000000007559B000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/648-896-0x00007FF8EA250000-0x00007FF8EA445000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/1188-893-0x00007FF8EA250000-0x00007FF8EA445000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/1188-891-0x0000000040000000-0x000000004017C000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/1188-892-0x0000000075420000-0x000000007559B000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/1188-894-0x0000000075420000-0x000000007559B000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/5132-983-0x0000000000FE0000-0x000000000104E000-memory.dmp

                                      Filesize

                                      440KB

                                    • memory/5132-994-0x0000000000FE0000-0x000000000104E000-memory.dmp

                                      Filesize

                                      440KB

                                    • memory/5132-991-0x0000000076FB0000-0x00000000771C5000-memory.dmp

                                      Filesize

                                      2.1MB

                                    • memory/5132-988-0x0000000004060000-0x0000000004460000-memory.dmp

                                      Filesize

                                      4.0MB

                                    • memory/5132-987-0x0000000004060000-0x0000000004460000-memory.dmp

                                      Filesize

                                      4.0MB

                                    • memory/5132-985-0x0000000000FE0000-0x000000000104E000-memory.dmp

                                      Filesize

                                      440KB

                                    • memory/5132-984-0x00007FF8EA250000-0x00007FF8EA445000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/5436-963-0x0000000001200000-0x000000000143C000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/5436-899-0x0000000001200000-0x000000000143C000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/5436-937-0x0000000001200000-0x000000000143C000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/5436-904-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                      Filesize

                                      972KB

                                    • memory/5436-901-0x0000000001200000-0x000000000143C000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/5436-900-0x00007FF8EA250000-0x00007FF8EA445000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/5668-832-0x000001D219750000-0x000001D219772000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/5724-973-0x0000000075420000-0x000000007559B000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/5724-972-0x00007FF8EA250000-0x00007FF8EA445000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/5724-971-0x0000000075420000-0x000000007559B000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/5724-970-0x0000000040000000-0x0000000040196000-memory.dmp

                                      Filesize

                                      1.6MB

                                    • memory/5812-975-0x00007FF8EA250000-0x00007FF8EA445000-memory.dmp

                                      Filesize

                                      2.0MB