Malware Analysis Report

2024-08-06 14:48

Sample ID 240616-gvpn2asdlc
Target b20de7039fc71d94e134125c77cd005f_JaffaCakes118
SHA256 2ffdff45aa288f6e09815e6072a24920ef00761c92680a8acb0e43d88fb39354
Tags
nanocore keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2ffdff45aa288f6e09815e6072a24920ef00761c92680a8acb0e43d88fb39354

Threat Level: Known bad

The file b20de7039fc71d94e134125c77cd005f_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

nanocore keylogger persistence spyware stealer trojan

NanoCore

Checks computer location settings

Adds Run key to start application

Suspicious use of SetThreadContext

Drops file in Program Files directory

Unsigned PE

Enumerates physical storage devices

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-16 06:07

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-16 06:07

Reported

2024-06-16 06:10

Platform

win7-20240221-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NAS Host = "C:\\Program Files (x86)\\NAS Host\\nashost.exe" C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 636 set thread context of 2584 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\NAS Host\nashost.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe N/A
File opened for modification C:\Program Files (x86)\NAS Host\nashost.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2224 wrote to memory of 636 N/A C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 2224 wrote to memory of 636 N/A C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 2224 wrote to memory of 636 N/A C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 2224 wrote to memory of 636 N/A C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 2224 wrote to memory of 636 N/A C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 2224 wrote to memory of 636 N/A C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 2224 wrote to memory of 636 N/A C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 636 wrote to memory of 2584 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 636 wrote to memory of 2584 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 636 wrote to memory of 2584 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 636 wrote to memory of 2584 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 636 wrote to memory of 2584 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 636 wrote to memory of 2584 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 636 wrote to memory of 2584 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 636 wrote to memory of 2584 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 636 wrote to memory of 2584 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 636 wrote to memory of 2584 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 636 wrote to memory of 2584 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 636 wrote to memory of 2584 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 2584 wrote to memory of 2468 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\SysWOW64\schtasks.exe
PID 2584 wrote to memory of 2468 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\SysWOW64\schtasks.exe
PID 2584 wrote to memory of 2468 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\SysWOW64\schtasks.exe
PID 2584 wrote to memory of 2468 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\SysWOW64\schtasks.exe
PID 2584 wrote to memory of 2876 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\SysWOW64\schtasks.exe
PID 2584 wrote to memory of 2876 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\SysWOW64\schtasks.exe
PID 2584 wrote to memory of 2876 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\SysWOW64\schtasks.exe
PID 2584 wrote to memory of 2876 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe

"C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe" /logtoconsole=false /logfile= /u "C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe

"C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "NAS Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmpA8CD.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "NAS Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpA97A.tmp"

Network

Country Destination Domain Proto
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp

Files

memory/2224-0-0x0000000074711000-0x0000000074712000-memory.dmp

memory/2224-1-0x0000000074710000-0x0000000074CBB000-memory.dmp

memory/2224-2-0x0000000074710000-0x0000000074CBB000-memory.dmp

memory/2224-3-0x0000000074710000-0x0000000074CBB000-memory.dmp

memory/636-4-0x0000000074710000-0x0000000074CBB000-memory.dmp

memory/636-5-0x0000000074710000-0x0000000074CBB000-memory.dmp

memory/2584-8-0x0000000000090000-0x00000000000C8000-memory.dmp

memory/2584-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2584-27-0x0000000074710000-0x0000000074CBB000-memory.dmp

memory/636-26-0x0000000074710000-0x0000000074CBB000-memory.dmp

memory/2584-25-0x0000000000090000-0x00000000000C8000-memory.dmp

memory/2584-22-0x0000000000090000-0x00000000000C8000-memory.dmp

memory/2584-18-0x0000000000090000-0x00000000000C8000-memory.dmp

memory/2584-17-0x0000000000090000-0x00000000000C8000-memory.dmp

memory/2584-12-0x0000000000090000-0x00000000000C8000-memory.dmp

memory/2584-10-0x0000000000090000-0x00000000000C8000-memory.dmp

memory/2584-6-0x0000000000090000-0x00000000000C8000-memory.dmp

memory/2584-28-0x0000000074710000-0x0000000074CBB000-memory.dmp

memory/2584-29-0x0000000074710000-0x0000000074CBB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpA8CD.tmp

MD5 776580d2028b74ed89bb21146482bdff
SHA1 d1a45290dedde63d8539a2fc8af866b430238bc7
SHA256 fbad359469fc6aefb5695d01974f4edf50528f51f80d57b9eb0d8f2f81033cc0
SHA512 de084f473db26ce159b639b02e7ffa263ae5b6c4c1da9f6932676dae4a6c65f082b1bcac673c45c2e2b84caa06d1860ea6f0545b81fd7b3e4f8fe5e802a160d3

C:\Users\Admin\AppData\Local\Temp\tmpA97A.tmp

MD5 9f554f602c22cfc20079e966d177fadb
SHA1 789baa3425849bf239e47c6bcf352e6693a8c337
SHA256 4c760d5fe0c06cf4bf554170870f41181c61a217c37eb826903094dda86dd1f1
SHA512 b83e3e97dbe38ec4c64d9bef65e2521416f2d7434d78d05e66f729a2e0fbfea3f9bc6f6c4abaf76555af89a9565dfc0853d99067be9042dd66ed6246696eecbb

memory/2584-37-0x0000000074710000-0x0000000074CBB000-memory.dmp

memory/2584-38-0x0000000074710000-0x0000000074CBB000-memory.dmp

memory/2584-39-0x0000000074710000-0x0000000074CBB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-16 06:07

Reported

2024-06-16 06:10

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DHCP Service = "C:\\Program Files (x86)\\DHCP Service\\dhcpsv.exe" C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4180 set thread context of 1456 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\DHCP Service\dhcpsv.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe N/A
File opened for modification C:\Program Files (x86)\DHCP Service\dhcpsv.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4328 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 4328 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 4328 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 4180 wrote to memory of 1456 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 4180 wrote to memory of 1456 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 4180 wrote to memory of 1456 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 4180 wrote to memory of 1456 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 4180 wrote to memory of 1456 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 4180 wrote to memory of 1456 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 4180 wrote to memory of 1456 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 4180 wrote to memory of 1456 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe
PID 1456 wrote to memory of 2008 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\SysWOW64\schtasks.exe
PID 1456 wrote to memory of 2008 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\SysWOW64\schtasks.exe
PID 1456 wrote to memory of 2008 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\SysWOW64\schtasks.exe
PID 1456 wrote to memory of 2408 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\SysWOW64\schtasks.exe
PID 1456 wrote to memory of 2408 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\SysWOW64\schtasks.exe
PID 1456 wrote to memory of 2408 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe

"C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe" /logtoconsole=false /logfile= /u "C:\Users\Admin\AppData\Local\Temp\b20de7039fc71d94e134125c77cd005f_JaffaCakes118.exe"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe

"C:\Windows\Microsoft.NET\Framework\v2.0.50727\installutil.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DHCP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmpC1C9.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DHCP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpC238.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp
US 181.215.247.70:3031 tcp

Files

memory/4328-0-0x0000000075412000-0x0000000075413000-memory.dmp

memory/4328-1-0x0000000075410000-0x00000000759C1000-memory.dmp

memory/4328-2-0x0000000075410000-0x00000000759C1000-memory.dmp

memory/4328-4-0x0000000075410000-0x00000000759C1000-memory.dmp

memory/4180-5-0x0000000075410000-0x00000000759C1000-memory.dmp

memory/4180-6-0x0000000075410000-0x00000000759C1000-memory.dmp

memory/4180-7-0x0000000075410000-0x00000000759C1000-memory.dmp

memory/4180-8-0x0000000075410000-0x00000000759C1000-memory.dmp

memory/4180-9-0x0000000075410000-0x00000000759C1000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\installutil.exe.log

MD5 7a4a84f4d2df1fe011638038702dad89
SHA1 64e9856d95b2064ff51e1c77819c818e6e5b3291
SHA256 cfd5734d90e6889355768ae5a723076000d88af2e5b6b435d55fa5bfa3e29590
SHA512 cbe9f7724806d161e70a161525c89199e10e6f38ad425533defaa1e02a12bf2cf28cba6788ed68e446cbd4286541e341b55c40133c134f9fcf94cae79b34092d

memory/4180-12-0x0000000075410000-0x00000000759C1000-memory.dmp

memory/1456-13-0x0000000075410000-0x00000000759C1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpC1C9.tmp

MD5 776580d2028b74ed89bb21146482bdff
SHA1 d1a45290dedde63d8539a2fc8af866b430238bc7
SHA256 fbad359469fc6aefb5695d01974f4edf50528f51f80d57b9eb0d8f2f81033cc0
SHA512 de084f473db26ce159b639b02e7ffa263ae5b6c4c1da9f6932676dae4a6c65f082b1bcac673c45c2e2b84caa06d1860ea6f0545b81fd7b3e4f8fe5e802a160d3

C:\Users\Admin\AppData\Local\Temp\tmpC238.tmp

MD5 a77c223a0fc492dccd6fb9975f7a8766
SHA1 5e813636ae9b8138d78919348a5da3a6e8bd74b5
SHA256 589df7325d42409c50827600fedb240171ee4bdab85916474a37800c2382829e
SHA512 315cea8fde3c594404f5d3c96c710af1214cff6d08ccdb40634a739e108ff810e02624735a2b8c3e3720157b4a55327f317c3c23c3a681b46b9ab0f19060f7c0

memory/1456-21-0x0000000075410000-0x00000000759C1000-memory.dmp