Analysis

  • max time kernel
    145s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2024, 03:43

General

  • Target

    c524dc37787eccb306a74bd058abd012b1b7edb25194a783ec2a49730cb50289.msi

  • Size

    51.3MB

  • MD5

    7efb253def4f5980c8e7a4c95a96ce09

  • SHA1

    e5f62d1b33eddca20e1b8cde7bf85205c411f058

  • SHA256

    c524dc37787eccb306a74bd058abd012b1b7edb25194a783ec2a49730cb50289

  • SHA512

    5a3c05754d5d94a1549f7eb4a08a237e39b976c4994db0bb8e10687757d954d7a3cda5ea1ea432c85e5e9b643378b8a6ae15ec2e6ce17a292d8f4cbe70955f4d

  • SSDEEP

    1572864:33j57EzJvxJXNywl4agZ9KsNhucJaV/Z/7h:33jWtv3dbl3bcJarzh

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Using powershell.exe command.

  • Drops file in Drivers directory 3 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Windows Firewall 2 TTPs 5 IoCs
  • Network Service Discovery 1 TTPs 2 IoCs

    Attempt to gather information on host's network.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 19 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 13 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 18 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 26 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 60 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\c524dc37787eccb306a74bd058abd012b1b7edb25194a783ec2a49730cb50289.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:392
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Drops startup file
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4012
    • C:\Program Files (x86)\BJgxmmSq\wegame.exe
      "C:\Program Files (x86)\BJgxmmSq\wegame.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1480
    • C:\Program Files (x86)\BJgxmmSq\wegame.exe
      "C:\Program Files (x86)\BJgxmmSq\wegame.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      PID:4036
    • C:\Program Files (x86)\mxewmGJk\TgwFTQMc.exe
      "C:\Program Files (x86)\mxewmGJk\TgwFTQMc.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:5028
    • C:\Program Files (x86)\mxewmGJk\TgwFTQMc.exe
      "C:\Program Files (x86)\mxewmGJk\TgwFTQMc.exe"
      2⤵
      • Enumerates connected drives
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:4416
      • C:\Windows\Explorer.Exe
        "C:\Windows\Explorer.Exe"
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5336
    • C:\Program Files (x86)\mxewmGJk\GxySSwAr.exe
      "C:\Program Files (x86)\mxewmGJk\GxySSwAr.exe"
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4996
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -inputformat none -ExecutionPolicy Bypass -Command "If ($env:PROCESSOR_ARCHITEW6432) { $env:PROCESSOR_ARCHITEW6432 } Else { $env:PROCESSOR_ARCHITECTURE }"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2748
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -inputformat none -ExecutionPolicy Bypass -File "C:\Program Files (x86)\letsvpn\AddWindowsSecurityExclusion.ps1"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2452
      • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe
        "C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap0901
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:4796
      • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe
        "C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" install "C:\Program Files (x86)\letsvpn\driver\OemVista.inf" tap0901
        3⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:4192
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c netsh advfirewall firewall Delete rule name=lets
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\SysWOW64\netsh.exe
          netsh advfirewall firewall Delete rule name=lets
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:4736
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c netsh advfirewall firewall Delete rule name=lets.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1612
        • C:\Windows\SysWOW64\netsh.exe
          netsh advfirewall firewall Delete rule name=lets.exe
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:540
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c netsh advfirewall firewall Delete rule name=LetsPRO.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1620
        • C:\Windows\SysWOW64\netsh.exe
          netsh advfirewall firewall Delete rule name=LetsPRO.exe
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:1380
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c netsh advfirewall firewall Delete rule name=LetsPRO
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1228
        • C:\Windows\SysWOW64\netsh.exe
          netsh advfirewall firewall Delete rule name=LetsPRO
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:1240
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c netsh advfirewall firewall Delete rule name=LetsVPN
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3848
        • C:\Windows\SysWOW64\netsh.exe
          netsh advfirewall firewall Delete rule name=LetsVPN
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2848
      • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe
        "C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap0901
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:1780
      • C:\Program Files (x86)\letsvpn\LetsPRO.exe
        "C:\Program Files (x86)\letsvpn\LetsPRO.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3732
        • C:\Program Files (x86)\letsvpn\app-3.11.0\LetsPRO.exe
          "C:\Program Files (x86)\letsvpn\app-3.11.0\LetsPRO.exe"
          4⤵
          • Adds Run key to start application
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Modifies registry class
          • Modifies system certificate store
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2120
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C ipconfig /all
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4748
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /all
              6⤵
              • System Location Discovery: System Language Discovery
              • Gathers network information
              PID:2764
          • C:\Windows\SysWOW64\netsh.exe
            C:\Windows\System32\netsh interface ipv4 set dnsservers \"LetsTAP\" source=dhcp validate=no
            5⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:3912
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C route print
            5⤵
            • System Location Discovery: System Language Discovery
            PID:5468
            • C:\Windows\SysWOW64\ROUTE.EXE
              route print
              6⤵
              • System Location Discovery: System Language Discovery
              PID:5532
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C arp -a
            5⤵
            • Network Service Discovery
            • System Location Discovery: System Language Discovery
            PID:5672
            • C:\Windows\SysWOW64\ARP.EXE
              arp -a
              6⤵
              • Network Service Discovery
              • System Location Discovery: System Language Discovery
              PID:5712
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:1376
  • C:\Windows\system32\cmd.exe
    cmd /c start powershell -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Program Files (x86)'"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3732
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Program Files (x86)'"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1268
  • C:\Windows\system32\cmd.exe
    cmd /c start powershell.exe -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Program Files (x86)'"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Program Files (x86)'"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:760
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Program Files (x86)'"
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1216
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Program Files (x86)'"
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4344
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{b4447e28-c74b-b04b-940e-bcfbe33ab5f0}\oemvista.inf" "9" "4d14a44ff" "0000000000000138" "WinSta0\Default" "0000000000000150" "208" "c:\program files (x86)\letsvpn\driver"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:1648
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:3beb73aff103cc24:tap0901.ndi:9.24.6.601:tap0901," "4d14a44ff" "000000000000014C"
      2⤵
      • Drops file in Drivers directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3472
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman
    1⤵
      PID:2148
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
      1⤵
        PID:5564
      • C:\Windows\system32\wbem\WmiApSrv.exe
        C:\Windows\system32\wbem\WmiApSrv.exe
        1⤵
          PID:5948
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:5476
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:1476

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\e57bac7.rbs

          Filesize

          4KB

          MD5

          08c3e9aa3e2b7534d474407150f56815

          SHA1

          2eeeb39a2b0c570f251665cfba033e34ac4a786d

          SHA256

          d841c4b1b0499a991cc5ed97e38a2b9df717dbd86a20fd5d75483c07b9719057

          SHA512

          dc539244aab17fab9c76450f45593b65bfdbe82f21f6034cde09e0d883f9e3b444737349e9995daa5a796feb4ea85a0294a5c5067033f05e59973eab135e7721

        • C:\Program Files (x86)\BJgxmmSq\Lua51.dll

          Filesize

          546KB

          MD5

          0527df9bdaaea7250291efcb5b33b709

          SHA1

          1b6b3511c30aa66a0a0258578a4b695db2fbde36

          SHA256

          7fa367a644670ed94a01bc0927996d93b82ea2658bb7d84c99c648f12b6a61f1

          SHA512

          d8f49f954112e744b161246759aa0a6b106125a9b936e98c3f57c4535b1e7866adffe3e1699412ef8d549a84121f9492f67bb504b91fffd384bbc2e89611631b

        • C:\Program Files (x86)\BJgxmmSq\adapt_for_imports.dll

          Filesize

          404KB

          MD5

          d9f36ff27dc0d08fd384a99bb801a24a

          SHA1

          886287b85e2b57e05e61ee582dd1595f7e620765

          SHA256

          96aea19b11327ae4200396e84f06a4746a926f43b688c22e60b370ded1cf6d58

          SHA512

          032f0f0e6200383dd9a4a7628e1ef5b67ea6fcfd3a872cd2fa0b952ccc3286b10550526c01e0294068e7d3995714efdf798607a51cf4681b8295b8d8493963dd

        • C:\Program Files (x86)\BJgxmmSq\beacon_sdk.dll

          Filesize

          1.5MB

          MD5

          c83dd90d61bae5cf1d4b0620649726d6

          SHA1

          cdb21af237425523d230a1738c4111776b3e8318

          SHA256

          b5df19432f50ad434ca860173c9eb0dc6fdfaca48f75a3b416d038c213d089da

          SHA512

          480cb660931eece9fee17fcb60b5c467ceb033d7d2f9fc0cf37b82dbc7443918935ba5a24aaeb8a284c95820eccab382e67342e6f0038c4d36b36f51d04dc412

        • C:\Program Files (x86)\BJgxmmSq\common.dll

          Filesize

          3.7MB

          MD5

          856d1285704805940b8379e81b18f3eb

          SHA1

          aae6852e7f86a8163ca5a63178a7cceb1c50ff67

          SHA256

          2e21f70adcbe5fe3d51eb9236fc23e071e675c802bfeec2ca5c0a41eef35e9a2

          SHA512

          50b61c980c176f2f32bd4e353187d5db9f3d3d7d01486105da95d7e7bf153386d2808dc94909b4998e05accebe6cc388ecad8246d236a89529f9a1274b34885c

        • C:\Program Files (x86)\BJgxmmSq\msvcp140.dll

          Filesize

          438KB

          MD5

          1fb93933fd087215a3c7b0800e6bb703

          SHA1

          a78232c352ed06cedd7ca5cd5cb60e61ef8d86fb

          SHA256

          2db7fd3c9c3c4b67f2d50a5a50e8c69154dc859780dd487c28a4e6ed1af90d01

          SHA512

          79cd448e44b5607863b3cd0f9c8e1310f7e340559495589c428a24a4ac49beb06502d787824097bb959a1c9cb80672630dac19a405468a0b64db5ebd6493590e

        • C:\Program Files (x86)\BJgxmmSq\vcruntime140.dll

          Filesize

          78KB

          MD5

          1b171f9a428c44acf85f89989007c328

          SHA1

          6f25a874d6cbf8158cb7c491dcedaa81ceaebbae

          SHA256

          9d02e952396bdff3abfe5654e07b7a713c84268a225e11ed9a3bf338ed1e424c

          SHA512

          99a06770eea07f36abc4ae0cecb2ae13c3acb362b38b731c3baed045bf76ea6b61efe4089cd2efac27701e9443388322365bdb039cd388987b24d4a43c973bd1

        • C:\Program Files (x86)\BJgxmmSq\wegame.exe

          Filesize

          1.4MB

          MD5

          063af51c19f29bcdfd26c1bebdc9ace6

          SHA1

          810817459e322ba44815df62702b9c8fe04b26fb

          SHA256

          c6ef12669e1d0a3d0f54ad7cd516d5cf2ddf81edc350c3aafaa51c8ea9226a73

          SHA512

          5ffff7f49b68004eb8f02522724b45d9c6cfa5cb45ff1c5f3cd93f1c65f0cadc322cc09a777b933c64650a7666c6204b67f9b1adf266ba2d1ce537c17f4a99a9

        • C:\Program Files (x86)\letsvpn\AddWindowsSecurityExclusion.ps1

          Filesize

          318B

          MD5

          b34636a4e04de02d079ba7325e7565f0

          SHA1

          f32c1211eac22409bb195415cb5a8063431f75cd

          SHA256

          a9901397d39c0fc74adfdb95dd5f95c3a14def3f9d58ef44ab45fc74a56d46df

          SHA512

          6eb3255e3c89e2894f0085095fb5f6ab97349f0ed63c267820c82916f43a0ac014a94f98c186ff5d54806469a00c3c700a34d26de90afb090b80ac824a05aa2f

        • C:\Program Files (x86)\letsvpn\LetsPRO.exe

          Filesize

          240KB

          MD5

          c3c999e2dc7326d8f4146c19ae1ebbb3

          SHA1

          fcaef0e1869bbaa1394efcb491110fed2bfe89a5

          SHA256

          ad3d15c467e45b9f1a1aa5072d21d5dd1fe2dc6bca1d67581dd494b42e9facb3

          SHA512

          3aba266a809b2005385eef560ad5db388c5db946bb0a2fecb8c7a751a1fcc47bd2e52df39fa844fbd312eb5238b04ae612f7b213a31f7f4965ab715babbd5d24

        • C:\Program Files (x86)\letsvpn\driver\OemVista.inf

          Filesize

          7KB

          MD5

          26009f092ba352c1a64322268b47e0e3

          SHA1

          e1b2220cd8dcaef6f7411a527705bd90a5922099

          SHA256

          150ef8eb07532146f833dc020c02238161043260b8a565c3cfcb2365bad980d9

          SHA512

          c18111982ca233a7fc5d1e893f9bd8a3ed739756a47651e0638debb0704066af6b25942c7961cdeedf953a206eb159fe50e0e10055c40b68eb0d22f6064bb363

        • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe

          Filesize

          99KB

          MD5

          1e3cf83b17891aee98c3e30012f0b034

          SHA1

          824f299e8efd95beca7dd531a1067bfd5f03b646

          SHA256

          9f45a39015774eeaa2a6218793edc8e6273eb9f764f3aedee5cf9e9ccacdb53f

          SHA512

          fa5cf687eefd7a85b60c32542f5cb3186e1e835c01063681204b195542105e8718da2f42f3e1f84df6b0d49d7eebad6cb9855666301e9a1c5573455e25138a8b

        • C:\Program Files (x86)\mxewmGJk\1

          Filesize

          13.9MB

          MD5

          cdcf5affbeec34a7fc6823e9b2ef1907

          SHA1

          a59c15b6b8e200802922ffffe710443eef0c82e8

          SHA256

          1ba2d3db99e9f2da7359dd45c0a6c82cd0709bc922931e3e4b26566c5a880dad

          SHA512

          b3d9e576d953167ed3011a2ddbab9dd60241b843e2a15f6fa0030dece17b267c032f02096d4f8c9dc8eec798060b151e226fbebb518af32d49a05fe286b99e9b

        • C:\Program Files (x86)\mxewmGJk\GxySSwAr.exe

          Filesize

          14.7MB

          MD5

          db7b54bd084d93ca25f33b9ebd68e45e

          SHA1

          f2fc12ece7fb3e1d9dc4a02f28d306a6468c7f5c

          SHA256

          0b3bbc7e664df0c6f35a4e9fa56af831c2be7fd168f585c287fa8c21439605a2

          SHA512

          74cc7bbba5dba412d40a21c0bb3c4ae39c937f78a861d03c8282aa740c412e7067301cc15da6d2561855b23cdee8b8b9752ae6fe159405e8cec2a3a181dad03f

        • C:\Program Files (x86)\mxewmGJk\TgwFTQMc.exe

          Filesize

          129KB

          MD5

          33c56f904fe77363fd5e553f7498854e

          SHA1

          e0cbe72715bda80c21a9cce8c6b3b76779ed71f3

          SHA256

          3ee9676a50e1d314a942de5c1fc614f4e00a3143397316a5892daee41f0bac4d

          SHA512

          8559df54856fc28b382b624a12201fb404a82c2cab7fbe095f8d3883a32177303bf633a14210de1f493fe015b97de5c10d7a10ae0b8561713a925020f840e812

        • C:\Program Files (x86)\mxewmGJk\libcurl.dll

          Filesize

          18.6MB

          MD5

          5acf6baf28a3b00119a4a5d487bf1796

          SHA1

          5b9017f63a52347cc07fecccf531b40ab539bfcf

          SHA256

          fb6c0daa4a741a341692bbdabef54337ac6fa00b4278d8f939f3472209e7e2ff

          SHA512

          111a86110af5f13305525802b3c87c9631bbf30f160880a76de517016c32d6e08f355b93d032930c7d051dcc2ed8643a6e431821a5f358eb8cc90fc014db971a

        • C:\Program Files (x86)\mxewmGJk\msvcp100.dll

          Filesize

          412KB

          MD5

          ed40615aa67499e2d2da8389ba9b331a

          SHA1

          09780d2c9d75878f7a9bb94599f3dc9386cf3789

          SHA256

          cd28daeda3c8731030e2077e6eccbb609e2098919b05ff310bef8dce1dce2d8d

          SHA512

          47d94c5f4829a0f901b57084c22b24adefb4aec2f7b8df9ea838e485dbc607aa837ed6d3c7186159499c44a3ff488fb04f770c624649a406854d82cd3baf72ee

        • C:\Program Files (x86)\mxewmGJk\msvcr100.dll

          Filesize

          756KB

          MD5

          ef3e115c225588a680acf365158b2f4a

          SHA1

          ecda6d3b4642d2451817833b39248778e9c2cbb0

          SHA256

          25d1cc5be93c7a0b58855ad1f4c9df3cfb9ec87e5dc13db85b147b1951ac6fa8

          SHA512

          d51f51336b7a34eb6c8f429597c3d685eb53853ee5e9d4857c40fc7be6956f1b8363d8d34bebad15ccceae45a6eb69f105f2df6a672f15fb0e6f8d0bb1afb91a

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          1KB

          MD5

          33b19d75aa77114216dbc23f43b195e3

          SHA1

          36a6c3975e619e0c5232aa4f5b7dc1fec9525535

          SHA256

          b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

          SHA512

          676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          11KB

          MD5

          4d6775467fdc170a3e64a3f873245528

          SHA1

          3b6fb66b42b462d5864c4684f74f87b098bb0cf2

          SHA256

          274bdc7fe3f64d562562065e77a342100b7c715c06055c3e62c068519038e56e

          SHA512

          11774c1879df555c0124e4e7b5f2786a4748c8712da8fbcb7fa71d117af2b014e4dbd38a3c32372001d96f0220078a8590fe162f33ccb4abaa15273428368e41

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133767207149080829.txt

          Filesize

          75KB

          MD5

          ddbe972715e8cd3bb7702456a5368cee

          SHA1

          b79685c044dfd0262b20342a106ed107d318bfbf

          SHA256

          77c934b453a91cc1b5e272959d1e4e3a1ded1f92bfc63cffe7c7a24df31b9b24

          SHA512

          d6f3d1827a5f2368fbbacd399bec78a2af7ff8805686242364ac75d7e190b3953889d92760387011729beb69560549a13cb989b6bfc1d099e7b35edd74279263

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tbwltvof.ydf.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\nseC3ED.tmp\System.dll

          Filesize

          12KB

          MD5

          192639861e3dc2dc5c08bb8f8c7260d5

          SHA1

          58d30e460609e22fa0098bc27d928b689ef9af78

          SHA256

          23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6

          SHA512

          6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc

        • C:\Users\Admin\AppData\Local\Temp\nseC3ED.tmp\modern-wizard.bmp

          Filesize

          51KB

          MD5

          7f8e1969b0874c8fb9ab44fc36575380

          SHA1

          3057c9ce90a23d29f7d0854472f9f44e87b0f09a

          SHA256

          076221b4527ff13c3e1557abbbd48b0cb8e5f7d724c6b9171c6aadadb80561dd

          SHA512

          7aa65cfadc2738c0186ef459d0f5f7f770ba0f6da4ccd55a2ceca23627b7f13ba258136bab88f4eee5d9bb70ed0e8eb8ba8e1874b0280d2b08b69fc9bdd81555

        • C:\Users\Admin\AppData\Local\Temp\nseC3ED.tmp\nsDialogs.dll

          Filesize

          9KB

          MD5

          b7d61f3f56abf7b7ff0d4e7da3ad783d

          SHA1

          15ab5219c0e77fd9652bc62ff390b8e6846c8e3e

          SHA256

          89a82c4849c21dfe765052681e1fad02d2d7b13c8b5075880c52423dca72a912

          SHA512

          6467c0de680fadb8078bdaa0d560d2b228f5a22d4d8358a1c7d564c6ebceface5d377b870eaf8985fbee727001da569867554154d568e3b37f674096bbafafb8

        • C:\Users\Admin\AppData\Local\Temp\nseC3ED.tmp\nsExec.dll

          Filesize

          7KB

          MD5

          11092c1d3fbb449a60695c44f9f3d183

          SHA1

          b89d614755f2e943df4d510d87a7fc1a3bcf5a33

          SHA256

          2cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77

          SHA512

          c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a

        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          1KB

          MD5

          ac35fb389d0b8018ad3e7f0442fd3a18

          SHA1

          e0c38eec1a908717e233ae0119a9f623cefaa55b

          SHA256

          625c09887b5da4f9fdc71f04dc3a49d19f365e879b492a788b2cd46d526168cc

          SHA512

          1f25a509ce6fadf13a0db84318d48d652619b576d824b2423acefb1e13461c98d116f135823b2730a9ed6edf339b3ea85953e35a844117c9b46d8908194422e7

        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          b42c70c1dbf0d1d477ec86902db9e986

          SHA1

          1d1c0a670748b3d10bee8272e5d67a4fabefd31f

          SHA256

          8ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a

          SHA512

          57fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5

        • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

          Filesize

          24.1MB

          MD5

          0f5084afdb35b7dfe6d3e81eeb11c3b9

          SHA1

          19f5cd35ea5282a2cdb80025e2dcb3c9e82b015b

          SHA256

          4d8789bf710bda37f9e5fa746ffad0f97df40b740d09ab6739ee7015c05d3c79

          SHA512

          1bfc6736cd1eb2adbfcf457f6673113f40bcc0df6f341ebb3f78d80b09067267527170d791a4ffe05e8cde625d72d6dcbfb030733830fc4b922776af655a312b

        • \??\Volume{77a2731a-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{7fcd4316-c3e0-45d0-b249-6b12bc465f3b}_OnDiskSnapshotProp

          Filesize

          6KB

          MD5

          a9eddf0adf153d95d543372d07a7b329

          SHA1

          ff89315c602182a0fe5f55bff5d7d4d8193a843b

          SHA256

          9263e2730ca0f87775ec5d4e5ad28af4c048cec56f2bbef3a81742b4bcaf24ff

          SHA512

          0b8f5981f64a435202c853ead08b91d713228d6677536fe55b3007b575abb9495877d876c16ff48285f7b07aa8f0274bac9d93576c1bc25d0113568d34bae338

        • \??\c:\PROGRA~2\letsvpn\driver\tap0901.sys

          Filesize

          38KB

          MD5

          c10ccdec5d7af458e726a51bb3cdc732

          SHA1

          0553aab8c2106abb4120353360d747b0a2b4c94f

          SHA256

          589c5667b1602837205da8ea8e92fe13f8c36048b293df931c99b39641052253

          SHA512

          7437c12ae5b31e389de3053a55996e7a0d30689c6e0d10bde28f1fbf55cee42e65aa441b7b82448334e725c0899384dee2645ce5c311f3a3cfc68e42ad046981

        • \??\c:\program files (x86)\letsvpn\driver\tap0901.cat

          Filesize

          10KB

          MD5

          f73ac62e8df97faf3fc8d83e7f71bf3f

          SHA1

          619a6e8f7a9803a4c71f73060649903606beaf4e

          SHA256

          cc74cdb88c198eb00aef4caa20bf1fda9256917713a916e6b94435cd4dcb7f7b

          SHA512

          f81f5757e0e449ad66a632299bcbe268ed02df61333a304dccafb76b2ad26baf1a09e7f837762ee4780afb47d90a09bf07cb5b8b519c6fb231b54fa4fbe17ffe

        • memory/760-190-0x0000022B79480000-0x0000022B7949C000-memory.dmp

          Filesize

          112KB

        • memory/760-150-0x0000022B60F60000-0x0000022B60F82000-memory.dmp

          Filesize

          136KB

        • memory/760-207-0x0000022B79A30000-0x0000022B79A3A000-memory.dmp

          Filesize

          40KB

        • memory/760-191-0x0000022B797D0000-0x0000022B79885000-memory.dmp

          Filesize

          724KB

        • memory/760-206-0x0000022B799E0000-0x0000022B799E6000-memory.dmp

          Filesize

          24KB

        • memory/760-192-0x0000022B794A0000-0x0000022B794AA000-memory.dmp

          Filesize

          40KB

        • memory/760-202-0x0000022B799F0000-0x0000022B79A0C000-memory.dmp

          Filesize

          112KB

        • memory/760-203-0x0000022B794B0000-0x0000022B794BA000-memory.dmp

          Filesize

          40KB

        • memory/760-204-0x0000022B79A10000-0x0000022B79A2A000-memory.dmp

          Filesize

          104KB

        • memory/760-205-0x0000022B799D0000-0x0000022B799D8000-memory.dmp

          Filesize

          32KB

        • memory/1476-976-0x000001E5FFA80000-0x000001E5FFAA0000-memory.dmp

          Filesize

          128KB

        • memory/1476-975-0x000001E5FF670000-0x000001E5FF690000-memory.dmp

          Filesize

          128KB

        • memory/1476-945-0x000001E5FF6B0000-0x000001E5FF6D0000-memory.dmp

          Filesize

          128KB

        • memory/2120-856-0x0000000033580000-0x0000000033592000-memory.dmp

          Filesize

          72KB

        • memory/2120-900-0x0000000036850000-0x000000003689C000-memory.dmp

          Filesize

          304KB

        • memory/2120-1143-0x0000000069680000-0x000000006A0E8000-memory.dmp

          Filesize

          10.4MB

        • memory/2120-1133-0x0000000069680000-0x000000006A0E8000-memory.dmp

          Filesize

          10.4MB

        • memory/2120-1127-0x0000000069680000-0x000000006A0E8000-memory.dmp

          Filesize

          10.4MB

        • memory/2120-1125-0x0000000069680000-0x000000006A0E8000-memory.dmp

          Filesize

          10.4MB

        • memory/2120-1114-0x0000000069680000-0x000000006A0E8000-memory.dmp

          Filesize

          10.4MB

        • memory/2120-1085-0x0000000069680000-0x000000006A0E8000-memory.dmp

          Filesize

          10.4MB

        • memory/2120-926-0x0000000069680000-0x000000006A0E8000-memory.dmp

          Filesize

          10.4MB

        • memory/2120-924-0x0000000037720000-0x0000000037796000-memory.dmp

          Filesize

          472KB

        • memory/2120-922-0x0000000069680000-0x000000006A0E8000-memory.dmp

          Filesize

          10.4MB

        • memory/2120-917-0x0000000037EC0000-0x0000000037EF2000-memory.dmp

          Filesize

          200KB

        • memory/2120-915-0x0000000037F20000-0x0000000037F31000-memory.dmp

          Filesize

          68KB

        • memory/2120-914-0x0000000037E70000-0x0000000037F13000-memory.dmp

          Filesize

          652KB

        • memory/2120-899-0x00000000354D0000-0x000000003551A000-memory.dmp

          Filesize

          296KB

        • memory/2120-874-0x00000000331E0000-0x00000000331F6000-memory.dmp

          Filesize

          88KB

        • memory/2120-875-0x00000000331C0000-0x00000000331D0000-memory.dmp

          Filesize

          64KB

        • memory/2120-873-0x00000000331B0000-0x00000000331C0000-memory.dmp

          Filesize

          64KB

        • memory/2120-872-0x0000000034DF0000-0x0000000034F76000-memory.dmp

          Filesize

          1.5MB

        • memory/2120-869-0x0000000069680000-0x000000006A0E8000-memory.dmp

          Filesize

          10.4MB

        • memory/2120-868-0x00000000308A0000-0x00000000308BE000-memory.dmp

          Filesize

          120KB

        • memory/2120-867-0x0000000030800000-0x0000000030810000-memory.dmp

          Filesize

          64KB

        • memory/2120-866-0x00000000307F0000-0x00000000307F8000-memory.dmp

          Filesize

          32KB

        • memory/2120-865-0x00000000308C0000-0x00000000308FA000-memory.dmp

          Filesize

          232KB

        • memory/2120-864-0x0000000030670000-0x0000000030680000-memory.dmp

          Filesize

          64KB

        • memory/2120-858-0x00000000339C0000-0x00000000339DE000-memory.dmp

          Filesize

          120KB

        • memory/2120-854-0x0000000033510000-0x0000000033524000-memory.dmp

          Filesize

          80KB

        • memory/2120-855-0x0000000031F40000-0x0000000031F48000-memory.dmp

          Filesize

          32KB

        • memory/2120-852-0x0000000031F20000-0x0000000031F28000-memory.dmp

          Filesize

          32KB

        • memory/2120-853-0x00000000334E0000-0x00000000334F2000-memory.dmp

          Filesize

          72KB

        • memory/2120-849-0x0000000033A90000-0x0000000034034000-memory.dmp

          Filesize

          5.6MB

        • memory/2120-842-0x0000000031C70000-0x0000000031C7E000-memory.dmp

          Filesize

          56KB

        • memory/2120-840-0x0000000032D50000-0x0000000032D88000-memory.dmp

          Filesize

          224KB

        • memory/2120-832-0x00000000304D0000-0x00000000304D8000-memory.dmp

          Filesize

          32KB

        • memory/2120-827-0x0000000030520000-0x00000000305B2000-memory.dmp

          Filesize

          584KB

        • memory/2120-826-0x000000002F4A0000-0x000000002F4B0000-memory.dmp

          Filesize

          64KB

        • memory/2120-809-0x0000000000150000-0x00000000002D4000-memory.dmp

          Filesize

          1.5MB

        • memory/2120-810-0x0000000002580000-0x00000000025A4000-memory.dmp

          Filesize

          144KB

        • memory/2120-812-0x00000000025B0000-0x00000000025BA000-memory.dmp

          Filesize

          40KB

        • memory/2120-811-0x00000000050B0000-0x00000000050F6000-memory.dmp

          Filesize

          280KB

        • memory/2120-813-0x0000000005300000-0x00000000053B2000-memory.dmp

          Filesize

          712KB

        • memory/2120-814-0x00000000053C0000-0x0000000005714000-memory.dmp

          Filesize

          3.3MB

        • memory/2120-815-0x0000000005EB0000-0x00000000063DC000-memory.dmp

          Filesize

          5.2MB

        • memory/2120-816-0x0000000005C40000-0x0000000005C62000-memory.dmp

          Filesize

          136KB

        • memory/2120-817-0x0000000005DD0000-0x0000000005DEE000-memory.dmp

          Filesize

          120KB

        • memory/2120-818-0x0000000005DF0000-0x0000000005E0A000-memory.dmp

          Filesize

          104KB

        • memory/2120-822-0x0000000005E30000-0x0000000005E3A000-memory.dmp

          Filesize

          40KB

        • memory/2120-821-0x0000000005E10000-0x0000000005E18000-memory.dmp

          Filesize

          32KB

        • memory/2120-820-0x0000000005E60000-0x0000000005E86000-memory.dmp

          Filesize

          152KB

        • memory/2120-819-0x0000000005E20000-0x0000000005E2A000-memory.dmp

          Filesize

          40KB

        • memory/2120-823-0x0000000005E40000-0x0000000005E4A000-memory.dmp

          Filesize

          40KB

        • memory/2120-824-0x000000000EFE0000-0x000000000EFEA000-memory.dmp

          Filesize

          40KB

        • memory/2120-825-0x000000002F870000-0x000000002F896000-memory.dmp

          Filesize

          152KB

        • memory/2452-669-0x000000006C9C0000-0x000000006CA0C000-memory.dmp

          Filesize

          304KB

        • memory/2452-685-0x00000000072B0000-0x00000000072C1000-memory.dmp

          Filesize

          68KB

        • memory/2452-653-0x0000000005760000-0x0000000005AB4000-memory.dmp

          Filesize

          3.3MB

        • memory/2452-664-0x0000000006340000-0x000000000638C000-memory.dmp

          Filesize

          304KB

        • memory/2452-668-0x00000000062D0000-0x0000000006302000-memory.dmp

          Filesize

          200KB

        • memory/2452-691-0x0000000007330000-0x0000000007338000-memory.dmp

          Filesize

          32KB

        • memory/2452-679-0x00000000062B0000-0x00000000062CE000-memory.dmp

          Filesize

          120KB

        • memory/2452-680-0x0000000006FC0000-0x0000000007063000-memory.dmp

          Filesize

          652KB

        • memory/2452-681-0x00000000076F0000-0x0000000007D6A000-memory.dmp

          Filesize

          6.5MB

        • memory/2452-682-0x00000000070B0000-0x00000000070CA000-memory.dmp

          Filesize

          104KB

        • memory/2452-683-0x0000000007130000-0x000000000713A000-memory.dmp

          Filesize

          40KB

        • memory/2452-690-0x00000000073E0000-0x00000000073FA000-memory.dmp

          Filesize

          104KB

        • memory/2452-689-0x00000000072F0000-0x0000000007304000-memory.dmp

          Filesize

          80KB

        • memory/2452-684-0x0000000007340000-0x00000000073D6000-memory.dmp

          Filesize

          600KB

        • memory/2452-687-0x00000000072E0000-0x00000000072EE000-memory.dmp

          Filesize

          56KB

        • memory/2748-93-0x0000000005BA0000-0x0000000005C06000-memory.dmp

          Filesize

          408KB

        • memory/2748-94-0x0000000005C10000-0x0000000005C76000-memory.dmp

          Filesize

          408KB

        • memory/2748-112-0x0000000006350000-0x000000000639C000-memory.dmp

          Filesize

          304KB

        • memory/2748-90-0x0000000002CB0000-0x0000000002CE6000-memory.dmp

          Filesize

          216KB

        • memory/2748-104-0x0000000005C80000-0x0000000005FD4000-memory.dmp

          Filesize

          3.3MB

        • memory/2748-111-0x0000000006320000-0x000000000633E000-memory.dmp

          Filesize

          120KB

        • memory/2748-91-0x0000000005570000-0x0000000005B98000-memory.dmp

          Filesize

          6.2MB

        • memory/2748-92-0x0000000005350000-0x0000000005372000-memory.dmp

          Filesize

          136KB

        • memory/4416-120-0x0000000010000000-0x0000000010DFE000-memory.dmp

          Filesize

          14.0MB

        • memory/4416-781-0x0000000003440000-0x0000000003574000-memory.dmp

          Filesize

          1.2MB

        • memory/4416-1135-0x0000000003D90000-0x0000000003DC8000-memory.dmp

          Filesize

          224KB

        • memory/4416-666-0x0000000003440000-0x0000000003574000-memory.dmp

          Filesize

          1.2MB

        • memory/4416-667-0x0000000003440000-0x0000000003574000-memory.dmp

          Filesize

          1.2MB

        • memory/4416-109-0x0000000000F90000-0x0000000000F91000-memory.dmp

          Filesize

          4KB

        • memory/4416-720-0x0000000003D90000-0x0000000003DC8000-memory.dmp

          Filesize

          224KB

        • memory/4416-927-0x0000000003D90000-0x0000000003DC8000-memory.dmp

          Filesize

          224KB

        • memory/4416-928-0x00000000089E0000-0x0000000008A47000-memory.dmp

          Filesize

          412KB

        • memory/4416-1136-0x0000000001330000-0x0000000001372000-memory.dmp

          Filesize

          264KB

        • memory/4416-396-0x0000000003440000-0x0000000003574000-memory.dmp

          Filesize

          1.2MB

        • memory/4416-686-0x0000000003440000-0x0000000003574000-memory.dmp

          Filesize

          1.2MB

        • memory/4416-704-0x0000000003D90000-0x0000000003DC8000-memory.dmp

          Filesize

          224KB

        • memory/4416-110-0x00000000010A0000-0x00000000010A1000-memory.dmp

          Filesize

          4KB

        • memory/4416-180-0x0000000072490000-0x0000000074198000-memory.dmp

          Filesize

          29.0MB

        • memory/4416-719-0x0000000003D90000-0x0000000003DC8000-memory.dmp

          Filesize

          224KB

        • memory/4416-1116-0x0000000006EE0000-0x0000000006F22000-memory.dmp

          Filesize

          264KB

        • memory/4416-1115-0x0000000003D90000-0x0000000003DC8000-memory.dmp

          Filesize

          224KB

        • memory/4416-688-0x0000000003D90000-0x0000000003DC8000-memory.dmp

          Filesize

          224KB

        • memory/4416-113-0x0000000072490000-0x0000000074198000-memory.dmp

          Filesize

          29.0MB

        • memory/4416-1131-0x0000000003D90000-0x0000000003DC8000-memory.dmp

          Filesize

          224KB

        • memory/5028-105-0x0000000001000000-0x0000000001001000-memory.dmp

          Filesize

          4KB

        • memory/5028-106-0x0000000001010000-0x0000000001011000-memory.dmp

          Filesize

          4KB

        • memory/5028-107-0x0000000072490000-0x0000000074198000-memory.dmp

          Filesize

          29.0MB

        • memory/5336-939-0x0000000003330000-0x0000000003331000-memory.dmp

          Filesize

          4KB