Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-12-2024 01:31

General

  • Target

    7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe

  • Size

    15.8MB

  • MD5

    db5818c5d7a25382f53f6f961b5d04f5

  • SHA1

    fe5f8cfd8adf3297a2dd883951ed84af9058721d

  • SHA256

    7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9

  • SHA512

    1b1e3b124dba5666b3e04942b8306836b608fc639664538b70f937b4af6f0473a7d9c9e0fc6565eabc2c24e2d139171c9c227f9c648d464b8c0c346b4f899a21

  • SSDEEP

    393216:SpNtz8jMP3N9X4VPpiFPXyK3q3kwaQNnMykEOSc:S3Z3P3N9X24Xlq3xBMz

Malware Config

Extracted

Family

asyncrat

Version

v1.2.2

Botnet

Default

C2

148.66.1.18:51227

Mutex

dzglfmbhtesmed

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Async RAT payload 1 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Modifies Windows Firewall 2 TTPs 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to execute payload.

  • Network Service Discovery 1 TTPs 2 IoCs

    Attempt to gather information on host's network.

  • Drops file in System32 directory 16 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 18 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 37 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 42 IoCs
  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe
    "C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Local\Temp\is-LD8RP.tmp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-LD8RP.tmp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp" /SL5="$701C2,16129897,161280,C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3468
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C timeout /T 3 & "C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe" /VERYSILENT /SUPPRESSMSGBOXES
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3636
        • C:\Windows\SysWOW64\timeout.exe
          timeout /T 3
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:2380
        • C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe
          "C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe" /VERYSILENT /SUPPRESSMSGBOXES
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4696
          • C:\Users\Admin\AppData\Local\Temp\is-RGPMF.tmp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-RGPMF.tmp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp" /SL5="$60114,16129897,161280,C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe" /VERYSILENT /SUPPRESSMSGBOXES
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:3152
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c C:\Users\Public\Documents\xIdr.exe
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1684
              • C:\Users\Public\Documents\xIdr.exe
                C:\Users\Public\Documents\xIdr.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3404
                • C:\Users\Admin\AppData\Local\Temp\is-GASOD.tmp\xIdr.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-GASOD.tmp\xIdr.tmp" /SL5="$801C2,450511,141312,C:\Users\Public\Documents\xIdr.exe"
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4112
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd.exe" /C timeout /T 3 & "C:\Users\Public\Documents\xIdr.exe" /VERYSILENT /SUPPRESSMSGBOXES
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:2500
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /T 3
                      10⤵
                      • System Location Discovery: System Language Discovery
                      • Delays execution with timeout.exe
                      PID:928
                    • C:\Users\Public\Documents\xIdr.exe
                      "C:\Users\Public\Documents\xIdr.exe" /VERYSILENT /SUPPRESSMSGBOXES
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:4488
                      • C:\Users\Admin\AppData\Local\Temp\is-SGJAS.tmp\xIdr.tmp
                        "C:\Users\Admin\AppData\Local\Temp\is-SGJAS.tmp\xIdr.tmp" /SL5="$801D2,450511,141312,C:\Users\Public\Documents\xIdr.exe" /VERYSILENT /SUPPRESSMSGBOXES
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of WriteProcessMemory
                        PID:4908
                        • C:\Windows\SysWOW64\regsvr32.exe
                          "regsvr32.exe" /s /i:360 C:\Users\Admin\AppData\Roaming\Setup_Lock.dll
                          12⤵
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:4996
                          • C:\Windows\system32\regsvr32.exe
                            /s /i:360 C:\Users\Admin\AppData\Roaming\Setup_Lock.dll
                            13⤵
                            • Loads dropped DLL
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:2396
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\Admin\AppData\Roaming\Setup_Lock.dll' }) { exit 0 } else { exit 1 }"
                              14⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1092
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\Admin\AppData\Roaming\Setup_Lock.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{F0993B63-9BB1-401F-CBFB-2D27B3F71283}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries) -RunLevel Highest"
                              14⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5020
                            • C:\Windows\system32\regsvr32.exe
                              "regsvr32" /i:360 /s C:\Users\Admin\AppData\Roaming\Setup_Lock.dll
                              14⤵
                              • Loads dropped DLL
                              PID:4344
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c C:\Users\Public\Documents\XkcY.exe
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3460
              • C:\Users\Public\Documents\XkcY.exe
                C:\Users\Public\Documents\XkcY.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4252
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -inputformat none -ExecutionPolicy Bypass -Command "If ($env:PROCESSOR_ARCHITEW6432) { $env:PROCESSOR_ARCHITEW6432 } Else { $env:PROCESSOR_ARCHITECTURE }"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5060
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -inputformat none -ExecutionPolicy Bypass -File "C:\Program Files (x86)\letsvpn\AddWindowsSecurityExclusion.ps1"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4596
                • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe
                  "C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap0901
                  8⤵
                  • Executes dropped EXE
                  • Checks SCSI registry key(s)
                  PID:2260
                • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe
                  "C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" install "C:\Program Files (x86)\letsvpn\driver\OemVista.inf" tap0901
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  • Checks SCSI registry key(s)
                  PID:1908
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c netsh advfirewall firewall Delete rule name=lets
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2716
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh advfirewall firewall Delete rule name=lets
                    9⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3632
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c netsh advfirewall firewall Delete rule name=lets.exe
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4104
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh advfirewall firewall Delete rule name=lets.exe
                    9⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:1824
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c netsh advfirewall firewall Delete rule name=LetsPRO.exe
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:740
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh advfirewall firewall Delete rule name=LetsPRO.exe
                    9⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:1284
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c netsh advfirewall firewall Delete rule name=LetsPRO
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4596
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh advfirewall firewall Delete rule name=LetsPRO
                    9⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:4228
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c netsh advfirewall firewall Delete rule name=LetsVPN
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1224
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh advfirewall firewall Delete rule name=LetsVPN
                    9⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3148
                • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe
                  "C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap0901
                  8⤵
                  • Executes dropped EXE
                  • Checks SCSI registry key(s)
                  PID:2452
                • C:\Program Files (x86)\letsvpn\LetsPRO.exe
                  "C:\Program Files (x86)\letsvpn\LetsPRO.exe"
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4408
                  • C:\Program Files (x86)\letsvpn\app-3.11.2\LetsPRO.exe
                    "C:\Program Files (x86)\letsvpn\app-3.11.2\LetsPRO.exe"
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Adds Run key to start application
                    • System Location Discovery: System Language Discovery
                    • Checks processor information in registry
                    • Modifies registry class
                    • Modifies system certificate store
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:4940
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd.exe" /C ipconfig /all
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:2032
                      • C:\Windows\SysWOW64\ipconfig.exe
                        ipconfig /all
                        11⤵
                        • System Location Discovery: System Language Discovery
                        • Gathers network information
                        PID:2028
                    • C:\Windows\SysWOW64\netsh.exe
                      C:\Windows\System32\netsh interface ipv4 set dnsservers \"LetsTAP\" source=dhcp validate=no
                      10⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:4032
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd.exe" /C route print
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:5004
                      • C:\Windows\SysWOW64\ROUTE.EXE
                        route print
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:1560
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd.exe" /C arp -a
                      10⤵
                      • Network Service Discovery
                      • System Location Discovery: System Language Discovery
                      PID:3404
                      • C:\Windows\SysWOW64\ARP.EXE
                        arp -a
                        11⤵
                        • Network Service Discovery
                        • System Location Discovery: System Language Discovery
                        PID:4984
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of WriteProcessMemory
    PID:744
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{8d37dc16-d769-ab42-a403-50f27bc81021}\oemvista.inf" "9" "4d14a44ff" "000000000000014C" "WinSta0\Default" "000000000000015C" "208" "c:\program files (x86)\letsvpn\driver"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:4852
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:3beb73aff103cc24:tap0901.ndi:9.24.6.601:tap0901," "4d14a44ff" "000000000000014C"
      2⤵
      • Drops file in Drivers directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      PID:1336
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman
    1⤵
    • Modifies data under HKEY_USERS
    PID:3696
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
    1⤵
      PID:4780
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:2288
      • C:\Windows\system32\regsvr32.EXE
        C:\Windows\system32\regsvr32.EXE /S /i:360 C:\Users\Admin\AppData\Roaming\Setup_Lock.dll
        1⤵
          PID:4536
        • C:\Windows\system32\regsvr32.EXE
          C:\Windows\system32\regsvr32.EXE /S /i:360 C:\Users\Admin\AppData\Roaming\Setup_Lock.dll
          1⤵
            PID:640

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\letsvpn\AddWindowsSecurityExclusion.ps1

            Filesize

            318B

            MD5

            b34636a4e04de02d079ba7325e7565f0

            SHA1

            f32c1211eac22409bb195415cb5a8063431f75cd

            SHA256

            a9901397d39c0fc74adfdb95dd5f95c3a14def3f9d58ef44ab45fc74a56d46df

            SHA512

            6eb3255e3c89e2894f0085095fb5f6ab97349f0ed63c267820c82916f43a0ac014a94f98c186ff5d54806469a00c3c700a34d26de90afb090b80ac824a05aa2f

          • C:\Program Files (x86)\letsvpn\LetsPRO.exe

            Filesize

            240KB

            MD5

            bd8643e5db648810348aa0755e455b70

            SHA1

            119cb1fb3057d9759d0abb3dfdafc460456c1cc4

            SHA256

            bec6a116ea2224dd1532c6eaf20e4d61199240e55ccd0270199fbd22f2806477

            SHA512

            b8033d8989c66431e1771ffc6d2549a4d1e32b8612b7331e7a2931ddad3e31c8a7e1af8ef129883034b1fcf466b8ad0e1cab431cbf5c20c724f4eef53468f714

          • C:\Program Files (x86)\letsvpn\app-3.11.2\LetsPRO.exe

            Filesize

            1.5MB

            MD5

            ca72f8ead2ae568acc481f685385fb60

            SHA1

            887a1d53c8b61c81a80592ff62cf9cdf56b29d18

            SHA256

            d287af28a137d9c015531eae28815d2b0d0a53879318f104ef34e5d86e2c4618

            SHA512

            8da648e1363d490d6a4ee5ec9e38aec86384f345ae5fd58150b2affce8c3c208e1a55598cfe820d00e9448910598ffde29d2824275ebaafaa7d33279898a2e4c

          • C:\Program Files (x86)\letsvpn\app-3.11.2\LetsPRO.exe.config

            Filesize

            26KB

            MD5

            6126a1ab971d6bd4761f45791af90b1e

            SHA1

            36013821807f6fe08fe3b60a22ec519fd3e5579c

            SHA256

            9b7b7ec30f305b3cd9da40662f95ed57ae89ed8afd2b11d26503e387ff3c262d

            SHA512

            9f74f9f4ad593980337099717ba1e6b584530ee0e192b137297961d1550a70ae3a30fc1bf3e6e670fb817682354648d610f2a542b753a61f397ccaca20908510

          • C:\Program Files (x86)\letsvpn\app-3.11.2\LetsVPNDomainModel.dll

            Filesize

            20KB

            MD5

            85bee1626071af1b07e79fc7963731e4

            SHA1

            d804e63940798891928f3ba29be85cf06fbb9769

            SHA256

            222f84cd3111f90b7ce045119e63678ee180ab0a7c4f48cae25f097ee425debe

            SHA512

            6649931736a607dceea5ec8180e07c14c331761a7dd0fa5ab4187d3302c0a51262ccce40024d6540f3453d8bdd43785c5f8d45e9c5252e097b69b30fced78832

          • C:\Program Files (x86)\letsvpn\app-3.11.2\Utils.dll

            Filesize

            126KB

            MD5

            8af72dc9783c52125e229f8b79afba94

            SHA1

            71178bc7cfced6bc5dcb45ed666cdbe2c55182dd

            SHA256

            68ae722154cebfb3a3ca59b135e182a68fa0d6966a089008028f97022849bbc5

            SHA512

            dcada700522b78fe0006e84c6599a9857269512eb65a68c0475635f76d5805c43decad74232eb39dae83f987b3dabafe07129d44cce950c8dc9efd11901599e2

          • C:\Program Files (x86)\letsvpn\app-3.11.2\log4net.dll

            Filesize

            273KB

            MD5

            5b9a663d7584d8e605b0c39031ec485a

            SHA1

            b7d86ebe4e18cb6d2a48a1c97ac6f7e39c8a9b91

            SHA256

            e45afce6eff080d568e3e059498f5768585143336c600011273366905f4fc635

            SHA512

            b02bd950384cf3d656c4b8f590013392e3028c6183aa9321bd91b6fc1f5d41b03771313ca5e3305398a60642fa14fc5a98daf3e6decba586c80861bafcbf0c64

          • C:\Program Files (x86)\letsvpn\driver\OemVista.inf

            Filesize

            7KB

            MD5

            26009f092ba352c1a64322268b47e0e3

            SHA1

            e1b2220cd8dcaef6f7411a527705bd90a5922099

            SHA256

            150ef8eb07532146f833dc020c02238161043260b8a565c3cfcb2365bad980d9

            SHA512

            c18111982ca233a7fc5d1e893f9bd8a3ed739756a47651e0638debb0704066af6b25942c7961cdeedf953a206eb159fe50e0e10055c40b68eb0d22f6064bb363

          • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe

            Filesize

            99KB

            MD5

            1e3cf83b17891aee98c3e30012f0b034

            SHA1

            824f299e8efd95beca7dd531a1067bfd5f03b646

            SHA256

            9f45a39015774eeaa2a6218793edc8e6273eb9f764f3aedee5cf9e9ccacdb53f

            SHA512

            fa5cf687eefd7a85b60c32542f5cb3186e1e835c01063681204b195542105e8718da2f42f3e1f84df6b0d49d7eebad6cb9855666301e9a1c5573455e25138a8b

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            3KB

            MD5

            3ffce848af907464c20a20e1b430f78a

            SHA1

            fbcd91a5c226d474235be920cf49e3344893fc1f

            SHA256

            25213a6685a6fd21a2aa43c417891703333579ad784f3896976b44bcfcdb009e

            SHA512

            1adaf6d68441a32b459b6071dcfdae404ab1e37bb0c6511e08d49717f9043679bdd7ca3324be184ece522e6516eedc04203ffccb5f9ea790bd35a84db9b944bf

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

            Filesize

            1KB

            MD5

            33b19d75aa77114216dbc23f43b195e3

            SHA1

            36a6c3975e619e0c5232aa4f5b7dc1fec9525535

            SHA256

            b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

            SHA512

            676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            11KB

            MD5

            ffdcce4ba958ed2020cc8160a8d7e3dd

            SHA1

            43862a848dfd34eb0e4ae71015bed3a66a4c3fa0

            SHA256

            ffc71d3dd1e23770c9508b6ea350979fd6776d031cb36d7f84592a9dca41305d

            SHA512

            e5bd090d6c7f7f6db8a9bea656e23b584264d9831b5d79502f1971c16789d0b4ae85cfcc83ad4e184e1f20feecf26382eb1eb7b1242805088056fb6a5560b7ca

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            9dc74ea70c18b52d5aa83ed34828ac45

            SHA1

            124bd9b8c9f2359a867598384a49ffb8be806886

            SHA256

            1454e987d907e9ce67fb424593690a45d7383a77d10321dc2e25550339d30ff4

            SHA512

            1e4fd2e589d7cf529c165faee027d4b71f0e15145c9139006e34637bdc9c2b905933749ac5260a8e5d7a6e16ad52da678d4eb1be407b4bb9648351de2b06eef4

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            00b17e3dd6d0b255438a0d03e2ed6ddc

            SHA1

            09f1f628e6ee44373926b3b524defc4bbdc431e0

            SHA256

            a6eda72faa2a5e98bbb5a0b908b0a7b8b08a2241c65d9edc293bd36f81e7e8a0

            SHA512

            e87ecfaeea82b411b762afece8f1d1edcf797b518d1dcd20a4af2d8f1f52e522dab1dd94acdcb484d92fe7ee70b4271f4c3a252ca3bade018e089f047a0ab082

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qd2w4bn0.hfy.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\is-0C0NH.tmp\_isetup\_shfoldr.dll

            Filesize

            22KB

            MD5

            92dc6ef532fbb4a5c3201469a5b5eb63

            SHA1

            3e89ff837147c16b4e41c30d6c796374e0b8e62c

            SHA256

            9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

            SHA512

            9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

          • C:\Users\Admin\AppData\Local\Temp\is-GASOD.tmp\xIdr.tmp

            Filesize

            1.1MB

            MD5

            8fdc58c7d4c59472615682d6dea9d190

            SHA1

            8e131fe09fd238493719b4fd92e6c833bf3596c1

            SHA256

            26a5be637ee680b1ec11d1adf2fd0972cc52078cbd200d9273f8bb826707c83b

            SHA512

            b05b9fd8ff3d627b562cbd2968466fb54adbc2fa5591ebe803300a3c5ef7887bc1761d8013b47aab0f5387265c8b7b15078a01abb75d4c3180671780181ebe24

          • C:\Users\Admin\AppData\Local\Temp\is-LD8RP.tmp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp

            Filesize

            1.1MB

            MD5

            070f66d3e84cd5ecccbb772fcf8e7811

            SHA1

            bc9c66bbe77da53a8d57ad9e41fd92936e892937

            SHA256

            b61184c727ecfeed0d77a237872ba282a544e15cfc54c28f420f06a5abea55db

            SHA512

            aa0803ae82c115b28e5965b1c3387580b833330db03fe69778d1f5680948bb5369d48336ed2e016a279ddfd239a39ea17922e66a017858f128d9f4aa4a9bbdcf

          • C:\Users\Admin\AppData\Local\Temp\nsqBA39.tmp\System.dll

            Filesize

            12KB

            MD5

            192639861e3dc2dc5c08bb8f8c7260d5

            SHA1

            58d30e460609e22fa0098bc27d928b689ef9af78

            SHA256

            23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6

            SHA512

            6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc

          • C:\Users\Admin\AppData\Local\Temp\nsqBA39.tmp\modern-wizard.bmp

            Filesize

            51KB

            MD5

            7f8e1969b0874c8fb9ab44fc36575380

            SHA1

            3057c9ce90a23d29f7d0854472f9f44e87b0f09a

            SHA256

            076221b4527ff13c3e1557abbbd48b0cb8e5f7d724c6b9171c6aadadb80561dd

            SHA512

            7aa65cfadc2738c0186ef459d0f5f7f770ba0f6da4ccd55a2ceca23627b7f13ba258136bab88f4eee5d9bb70ed0e8eb8ba8e1874b0280d2b08b69fc9bdd81555

          • C:\Users\Admin\AppData\Local\Temp\nsqBA39.tmp\nsDialogs.dll

            Filesize

            9KB

            MD5

            b7d61f3f56abf7b7ff0d4e7da3ad783d

            SHA1

            15ab5219c0e77fd9652bc62ff390b8e6846c8e3e

            SHA256

            89a82c4849c21dfe765052681e1fad02d2d7b13c8b5075880c52423dca72a912

            SHA512

            6467c0de680fadb8078bdaa0d560d2b228f5a22d4d8358a1c7d564c6ebceface5d377b870eaf8985fbee727001da569867554154d568e3b37f674096bbafafb8

          • C:\Users\Admin\AppData\Local\Temp\nsqBA39.tmp\nsExec.dll

            Filesize

            7KB

            MD5

            11092c1d3fbb449a60695c44f9f3d183

            SHA1

            b89d614755f2e943df4d510d87a7fc1a3bcf5a33

            SHA256

            2cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77

            SHA512

            c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a

          • C:\Users\Admin\AppData\Local\unins000.dat

            Filesize

            3KB

            MD5

            1eb406dab21d8dc957af1a5d5b247a09

            SHA1

            04023b3fe85aa9682603574fddac608f0aaff173

            SHA256

            18321e4565f99386d3d89ec71c0630be64a3a5ad2971c80e3b30a6b89e0b8d5b

            SHA512

            5cf2af5c6ca5f55d14db163fcbbfee16de11c793687e688f9828b6efa8cbf0f7a7171423d1ee8638768895e48f7787ce8238e46690004c4c659ea3f481e5cefb

          • C:\Users\Admin\AppData\Local\unins000.exe

            Filesize

            1.1MB

            MD5

            2c8dc574be7d1f780d42a2a9b8360c66

            SHA1

            fbae754f9ff7ea7caa528900f186cc6e49ef1609

            SHA256

            26db8da9a1921abec961ed77d4713389901a3cfe97dd420283bb679c5b537b2d

            SHA512

            a33c66e7729dc913d5089e2569f7b7e649bf6b11895bbccc88c95666c6e18e0ce09a66ef57434f3470014166bb2c6e1f5e1de2d830722642078c8db335e34495

          • C:\Users\Admin\AppData\Roaming\Setup_Lock.dll

            Filesize

            722KB

            MD5

            8227e4c7968f31debf26e01c5b3373ea

            SHA1

            da4a3634918d45a3c076dece82534425914763ea

            SHA256

            c180b6566c67983b6b065010f2ee50a594e532777cbb509ffaebec037d6dfa18

            SHA512

            4b03e9b40b4720208359b93ef350f1dbd56b368938c9673f035f7f5e76ff622d4eafdcf6205907ef0855d27debd063e82f51f448a2b2c1a8d548b3455d539332

          • C:\Users\Public\Documents\XkcY.exe

            Filesize

            14.7MB

            MD5

            e039e221b48fc7c02517d127e158b89f

            SHA1

            79eed88061472ae590616556f31576ca13bfc7fb

            SHA256

            dc30e5dab15392627d30a506f6304030c581fc00716703fc31add10ff263d70b

            SHA512

            87231c025bb94771e89a639c9cb1528763f096059f8806227b8ab45a8f1ea5cd3d94fdc91cb20dd140b91a14904653517f7b6673a142a864a58a2726d14ae4b8

          • C:\Users\Public\Documents\xIdr.exe

            Filesize

            810KB

            MD5

            293b0b9d1f227d92c2d7eec2f24ad24d

            SHA1

            65ba68759577ba15279e3934a50ca2e1fa31797f

            SHA256

            f30e5bbafa334ed502d1db1085a0033e74649b7ed1d3caaf719e4e0d80513498

            SHA512

            e08c30e52faf5cce75e3095b5dc805f083e330b71d7a03af4d6b365877aeded6ac827a53232d82e25e809b991ec7a2f17fd3d3367d747936cfcb57cb8540475f

          • \??\c:\PROGRA~2\letsvpn\driver\tap0901.sys

            Filesize

            38KB

            MD5

            c10ccdec5d7af458e726a51bb3cdc732

            SHA1

            0553aab8c2106abb4120353360d747b0a2b4c94f

            SHA256

            589c5667b1602837205da8ea8e92fe13f8c36048b293df931c99b39641052253

            SHA512

            7437c12ae5b31e389de3053a55996e7a0d30689c6e0d10bde28f1fbf55cee42e65aa441b7b82448334e725c0899384dee2645ce5c311f3a3cfc68e42ad046981

          • \??\c:\program files (x86)\letsvpn\driver\tap0901.cat

            Filesize

            10KB

            MD5

            f73ac62e8df97faf3fc8d83e7f71bf3f

            SHA1

            619a6e8f7a9803a4c71f73060649903606beaf4e

            SHA256

            cc74cdb88c198eb00aef4caa20bf1fda9256917713a916e6b94435cd4dcb7f7b

            SHA512

            f81f5757e0e449ad66a632299bcbe268ed02df61333a304dccafb76b2ad26baf1a09e7f837762ee4780afb47d90a09bf07cb5b8b519c6fb231b54fa4fbe17ffe

          • memory/1092-124-0x000001F1C5E10000-0x000001F1C5E32000-memory.dmp

            Filesize

            136KB

          • memory/2272-43-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/2272-0-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/2272-2-0x0000000000401000-0x0000000000417000-memory.dmp

            Filesize

            88KB

          • memory/2396-150-0x00007FF8336D0000-0x00007FF83376D000-memory.dmp

            Filesize

            628KB

          • memory/2396-148-0x0000000002210000-0x0000000002222000-memory.dmp

            Filesize

            72KB

          • memory/3152-32-0x0000000000400000-0x000000000052D000-memory.dmp

            Filesize

            1.2MB

          • memory/3404-41-0x0000000000400000-0x000000000042D000-memory.dmp

            Filesize

            180KB

          • memory/3404-117-0x0000000000400000-0x000000000042D000-memory.dmp

            Filesize

            180KB

          • memory/3468-7-0x0000000000400000-0x000000000052D000-memory.dmp

            Filesize

            1.2MB

          • memory/3468-39-0x0000000000400000-0x000000000052D000-memory.dmp

            Filesize

            1.2MB

          • memory/4112-116-0x0000000000400000-0x0000000000528000-memory.dmp

            Filesize

            1.2MB

          • memory/4488-114-0x0000000000400000-0x000000000042D000-memory.dmp

            Filesize

            180KB

          • memory/4488-92-0x0000000000400000-0x000000000042D000-memory.dmp

            Filesize

            180KB

          • memory/4596-618-0x0000000006F00000-0x0000000006F1A000-memory.dmp

            Filesize

            104KB

          • memory/4596-623-0x0000000007120000-0x000000000712E000-memory.dmp

            Filesize

            56KB

          • memory/4596-617-0x0000000007580000-0x0000000007BFA000-memory.dmp

            Filesize

            6.5MB

          • memory/4596-626-0x0000000007160000-0x0000000007168000-memory.dmp

            Filesize

            32KB

          • memory/4596-604-0x0000000006B50000-0x0000000006B82000-memory.dmp

            Filesize

            200KB

          • memory/4596-605-0x000000006FC40000-0x000000006FC8C000-memory.dmp

            Filesize

            304KB

          • memory/4596-615-0x0000000006D90000-0x0000000006DAE000-memory.dmp

            Filesize

            120KB

          • memory/4596-616-0x0000000006DB0000-0x0000000006E53000-memory.dmp

            Filesize

            652KB

          • memory/4596-602-0x0000000005C50000-0x0000000005C9C000-memory.dmp

            Filesize

            304KB

          • memory/4596-625-0x0000000007220000-0x000000000723A000-memory.dmp

            Filesize

            104KB

          • memory/4596-620-0x0000000007180000-0x0000000007216000-memory.dmp

            Filesize

            600KB

          • memory/4596-619-0x0000000006F50000-0x0000000006F5A000-memory.dmp

            Filesize

            40KB

          • memory/4596-622-0x00000000070E0000-0x00000000070F1000-memory.dmp

            Filesize

            68KB

          • memory/4596-600-0x00000000057D0000-0x0000000005B24000-memory.dmp

            Filesize

            3.3MB

          • memory/4596-624-0x0000000007130000-0x0000000007144000-memory.dmp

            Filesize

            80KB

          • memory/4696-12-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/4696-14-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/4696-34-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/4908-113-0x0000000000400000-0x0000000000528000-memory.dmp

            Filesize

            1.2MB

          • memory/4940-808-0x00000000317E0000-0x00000000317F0000-memory.dmp

            Filesize

            64KB

          • memory/4940-797-0x0000000033430000-0x0000000033438000-memory.dmp

            Filesize

            32KB

          • memory/4940-882-0x000000006D490000-0x000000006DEF8000-memory.dmp

            Filesize

            10.4MB

          • memory/4940-880-0x000000006D490000-0x000000006DEF8000-memory.dmp

            Filesize

            10.4MB

          • memory/4940-878-0x000000006D490000-0x000000006DEF8000-memory.dmp

            Filesize

            10.4MB

          • memory/4940-746-0x0000000000F50000-0x00000000010D4000-memory.dmp

            Filesize

            1.5MB

          • memory/4940-876-0x000000006D490000-0x000000006DEF8000-memory.dmp

            Filesize

            10.4MB

          • memory/4940-750-0x0000000005A00000-0x0000000005A24000-memory.dmp

            Filesize

            144KB

          • memory/4940-874-0x000000006D490000-0x000000006DEF8000-memory.dmp

            Filesize

            10.4MB

          • memory/4940-758-0x00000000059F0000-0x00000000059FA000-memory.dmp

            Filesize

            40KB

          • memory/4940-872-0x000000006D490000-0x000000006DEF8000-memory.dmp

            Filesize

            10.4MB

          • memory/4940-754-0x0000000005E40000-0x0000000005E86000-memory.dmp

            Filesize

            280KB

          • memory/4940-759-0x0000000006140000-0x00000000061F2000-memory.dmp

            Filesize

            712KB

          • memory/4940-760-0x0000000006200000-0x0000000006554000-memory.dmp

            Filesize

            3.3MB

          • memory/4940-761-0x0000000006CB0000-0x00000000071DC000-memory.dmp

            Filesize

            5.2MB

          • memory/4940-762-0x0000000006A40000-0x0000000006A62000-memory.dmp

            Filesize

            136KB

          • memory/4940-763-0x0000000006BD0000-0x0000000006BEE000-memory.dmp

            Filesize

            120KB

          • memory/4940-764-0x0000000006C10000-0x0000000006C2A000-memory.dmp

            Filesize

            104KB

          • memory/4940-765-0x0000000006C00000-0x0000000006C0A000-memory.dmp

            Filesize

            40KB

          • memory/4940-768-0x0000000006C30000-0x0000000006C3A000-memory.dmp

            Filesize

            40KB

          • memory/4940-767-0x0000000006BF0000-0x0000000006BF8000-memory.dmp

            Filesize

            32KB

          • memory/4940-766-0x0000000006C60000-0x0000000006C86000-memory.dmp

            Filesize

            152KB

          • memory/4940-769-0x0000000006C40000-0x0000000006C4A000-memory.dmp

            Filesize

            40KB

          • memory/4940-770-0x0000000030310000-0x000000003031A000-memory.dmp

            Filesize

            40KB

          • memory/4940-771-0x00000000307A0000-0x00000000307C6000-memory.dmp

            Filesize

            152KB

          • memory/4940-772-0x0000000030770000-0x0000000030780000-memory.dmp

            Filesize

            64KB

          • memory/4940-773-0x0000000031470000-0x0000000031502000-memory.dmp

            Filesize

            584KB

          • memory/4940-778-0x0000000030DB0000-0x0000000030DB8000-memory.dmp

            Filesize

            32KB

          • memory/4940-780-0x0000000032D90000-0x0000000032DC8000-memory.dmp

            Filesize

            224KB

          • memory/4940-781-0x0000000031460000-0x000000003146E000-memory.dmp

            Filesize

            56KB

          • memory/4940-794-0x00000000348B0000-0x0000000034E54000-memory.dmp

            Filesize

            5.6MB

          • memory/4940-869-0x000000006D490000-0x000000006DEF8000-memory.dmp

            Filesize

            10.4MB

          • memory/4940-799-0x0000000033480000-0x0000000033494000-memory.dmp

            Filesize

            80KB

          • memory/4940-800-0x00000000334A0000-0x00000000334A8000-memory.dmp

            Filesize

            32KB

          • memory/4940-798-0x0000000033460000-0x0000000033472000-memory.dmp

            Filesize

            72KB

          • memory/4940-801-0x00000000344A0000-0x00000000344B2000-memory.dmp

            Filesize

            72KB

          • memory/4940-802-0x0000000034820000-0x000000003483E000-memory.dmp

            Filesize

            120KB

          • memory/4940-805-0x0000000031620000-0x0000000031630000-memory.dmp

            Filesize

            64KB

          • memory/4940-806-0x0000000031680000-0x00000000316BA000-memory.dmp

            Filesize

            232KB

          • memory/4940-807-0x00000000317D0000-0x00000000317D8000-memory.dmp

            Filesize

            32KB

          • memory/4940-867-0x000000006D490000-0x000000006DEF8000-memory.dmp

            Filesize

            10.4MB

          • memory/4940-809-0x0000000031810000-0x000000003182E000-memory.dmp

            Filesize

            120KB

          • memory/4940-810-0x000000006D490000-0x000000006DEF8000-memory.dmp

            Filesize

            10.4MB

          • memory/4940-811-0x0000000036770000-0x00000000368F6000-memory.dmp

            Filesize

            1.5MB

          • memory/4940-812-0x00000000341F0000-0x0000000034200000-memory.dmp

            Filesize

            64KB

          • memory/4940-815-0x0000000036530000-0x0000000036546000-memory.dmp

            Filesize

            88KB

          • memory/4940-816-0x0000000036500000-0x0000000036510000-memory.dmp

            Filesize

            64KB

          • memory/4940-838-0x0000000036A40000-0x0000000036A8A000-memory.dmp

            Filesize

            296KB

          • memory/4940-839-0x0000000037560000-0x00000000375AC000-memory.dmp

            Filesize

            304KB

          • memory/4940-850-0x0000000037AE0000-0x0000000037B83000-memory.dmp

            Filesize

            652KB

          • memory/4940-851-0x0000000038C70000-0x0000000038CE6000-memory.dmp

            Filesize

            472KB

          • memory/4940-852-0x0000000038BF0000-0x0000000038C01000-memory.dmp

            Filesize

            68KB

          • memory/4940-853-0x0000000038560000-0x0000000038592000-memory.dmp

            Filesize

            200KB

          • memory/4940-862-0x000000006D490000-0x000000006DEF8000-memory.dmp

            Filesize

            10.4MB

          • memory/4940-865-0x000000006D490000-0x000000006DEF8000-memory.dmp

            Filesize

            10.4MB

          • memory/5060-78-0x0000000006580000-0x00000000065CC000-memory.dmp

            Filesize

            304KB

          • memory/5060-65-0x0000000005DF0000-0x0000000005E56000-memory.dmp

            Filesize

            408KB

          • memory/5060-77-0x0000000006550000-0x000000000656E000-memory.dmp

            Filesize

            120KB

          • memory/5060-72-0x0000000005ED0000-0x0000000006224000-memory.dmp

            Filesize

            3.3MB

          • memory/5060-66-0x0000000005E60000-0x0000000005EC6000-memory.dmp

            Filesize

            408KB

          • memory/5060-62-0x0000000004F00000-0x0000000004F36000-memory.dmp

            Filesize

            216KB

          • memory/5060-63-0x00000000056C0000-0x0000000005CE8000-memory.dmp

            Filesize

            6.2MB

          • memory/5060-64-0x0000000005510000-0x0000000005532000-memory.dmp

            Filesize

            136KB