Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe
-
Size
114KB
-
MD5
9fd2cde2647f2219276bfa855f0ea7f0
-
SHA1
7155488826119ff145f362c04c1c1b4f8cc29e87
-
SHA256
39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2
-
SHA512
9cd749f1a6e9efee80a2ab29c681b466a14d3d305a5e89b0703a3414946950b970f3fe903fe93697a408d0981e53aaab46aa7274237c1d1a522207e125dee860
-
SSDEEP
3072:9QWpze+eJfFpsJOfFpsJ5D1QWpze+eJfFpsJOfFpsJ5DZms:Lpe+ewDDpe+ewDZms
Malware Config
Signatures
-
Renames multiple (4701) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
Processes:
_choco.exe.ignore.exeZombie.exepid process 2356 _choco.exe.ignore.exe 1388 Zombie.exe -
Loads dropped DLL 4 IoCs
Processes:
39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exepid process 2812 39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe 2812 39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe 2812 39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe 2812 39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe -
Drops file in System32 directory 2 IoCs
Processes:
39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exedescription ioc process File created C:\Windows\SysWOW64\Zombie.exe 39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Zombie.exe_choco.exe.ignore.exedescription ioc process File created C:\Program Files\Common Files\System\msadc\ja-JP\msdaprsr.dll.mui.tmp Zombie.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\content-background.png.tmp Zombie.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\bg.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-uisupport.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\chkrzm.exe.mui.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\vlc.mo.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\7.png.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\tipresx.dll.mui.tmp _choco.exe.ignore.exe File created C:\Program Files\Java\jre7\lib\zi\America\Guyana.exe.tmp _choco.exe.ignore.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\Saipan.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\picturePuzzle.js.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\play_hov.png.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\settings.js.tmp Zombie.exe File opened for modification C:\Program Files\Mozilla Firefox\softokn3.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libparam_eq_plugin.dll.tmp _choco.exe.ignore.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\NextMenuButtonIcon.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_it.properties.tmp _choco.exe.ignore.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Guayaquil.tmp _choco.exe.ignore.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\epl-v10.html.tmp _choco.exe.ignore.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-api-annotations-common.jar.tmp Zombie.exe File created C:\Program Files\Microsoft Games\Hearts\HeartsMCE.lnk.exe.tmp _choco.exe.ignore.exe File created C:\Program Files\Windows Journal\de-DE\MSPVWCTL.DLL.mui.tmp Zombie.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\redmenu.png.tmp _choco.exe.ignore.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\btn-previous-static.png.tmp _choco.exe.ignore.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\org-netbeans-api-visual.xml_hidden.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\init.js.tmp _choco.exe.ignore.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\currency.js.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\handler.reg.tmp _choco.exe.ignore.exe File created C:\Program Files\Common Files\System\wab32.dll.tmp _choco.exe.ignore.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler.xml.exe.tmp _choco.exe.ignore.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Web.Entity.Resources.dll.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\icon.png.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\highDpiImageSwap.js.tmp _choco.exe.ignore.exe File created C:\Program Files\Windows Media Player\de-DE\WMPMediaSharing.dll.mui.tmp _choco.exe.ignore.exe File created C:\Program Files\Windows Media Player\wmplayer.exe.tmp Zombie.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrlatinlm.dat.tmp Zombie.exe File created C:\Program Files\DVD Maker\fr-FR\WMM2CLIP.dll.mui.tmp Zombie.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-application.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Antarctica\Macquarie.exe.tmp _choco.exe.ignore.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Kuala_Lumpur.exe.tmp _choco.exe.ignore.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\VDK10.SYD.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\fonts\LucidaTypewriterBold.ttf.tmp Zombie.exe File opened for modification C:\Program Files\Windows NT\Accessories\wordpad.exe.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\vlc.mo.tmp _choco.exe.ignore.exe File created C:\Program Files\Windows Mail\fr-FR\WinMail.exe.mui.tmp Zombie.exe File opened for modification C:\Program Files\DVD Maker\Shared\Common.fxh.tmp Zombie.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\en-GB.pak.tmp Zombie.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ko.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.http.jetty_3.0.200.v20131021-1843.jar.tmp _choco.exe.ignore.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director_2.3.100.v20140224-1921.jar.tmp _choco.exe.ignore.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Windows.Presentation.resources.dll.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_right_pressed.png.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\Gadget_Main_Background_Loading.png.tmp _choco.exe.ignore.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\msdaprsr.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe.tmp _choco.exe.ignore.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.RSA.tmp _choco.exe.ignore.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\artifacts.xml.tmp _choco.exe.ignore.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Management.Instrumentation.dll.tmp Zombie.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\fa.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+2.tmp _choco.exe.ignore.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-io_zh_CN.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\bin\server\Xusage.txt.tmp Zombie.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exedescription pid process target process PID 2812 wrote to memory of 2356 2812 39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe _choco.exe.ignore.exe PID 2812 wrote to memory of 2356 2812 39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe _choco.exe.ignore.exe PID 2812 wrote to memory of 2356 2812 39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe _choco.exe.ignore.exe PID 2812 wrote to memory of 2356 2812 39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe _choco.exe.ignore.exe PID 2812 wrote to memory of 1388 2812 39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe Zombie.exe PID 2812 wrote to memory of 1388 2812 39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe Zombie.exe PID 2812 wrote to memory of 1388 2812 39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe Zombie.exe PID 2812 wrote to memory of 1388 2812 39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe Zombie.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\39ebf920b6649ab6822a74b3b6b9a531b819aea8d7b7179ff6efc49ca1f4c7e2_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\_choco.exe.ignore.exe"_choco.exe.ignore.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.exe.tmpFilesize
115KB
MD51b16ee2768a9bdb4eb6f146cb80905ad
SHA1cc9251c89388deae305fe0000cc2099e91a5aea9
SHA256a63e56edb8c9b921825139677ad621eea3d65637966dccb68c3f1f2b349b4381
SHA51253677dd7dbc56ad9f0fc33b54a6dc1dd76cd59632061118185f23ad3a6c67808953643b8203530cf04905d5749efbedf14b625b6a37ec61e94aca5f0b7810239
-
C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmpFilesize
58KB
MD5dd605408fe4c5ef16e211328374100e6
SHA121aa6eda53e8d76633211d3423a3f91511d46fd9
SHA256ca8cf48cf8bf83977838e8e817dc95cda50329fd7fd787f94bceca0ba72889c0
SHA512504bf139cfa1052dcc1d190a26f7542b92ab4859590d88dd7089baef2f6fe55ea6a507924f4ed49f74882b278ae9a532432ac56c0d8a7e765f061f0ccf9cb1db
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\OWOW64WW.cab.tmpFilesize
17.7MB
MD5ef178631a19726455f59e7a6d3ecac41
SHA150012a0e3f3549c02374ade8edf2d9639738b006
SHA2563473d67e07ba0067202118d4c1b6626dc907474e00aa99f74e7ca22e2600449b
SHA5120412e831c2cc2e7a7ab01baf6ab49d9f80a02207f6b854012a4ac5ce8efe107805505784af02b772cc6659177fbc5ad635326d06911814d966fec64aebf9ba90
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.msi.tmpFilesize
2.9MB
MD5bc242d259a9825ea993a01821dc3d306
SHA109b7af59ca96bb096470554fe15ae6444930c3c2
SHA256a3fcb4e0909cdea0492b6dce5b561338df0986323b179bf580fad1e69eccbdf9
SHA5129a7968ec1d77eb025a257a629e218c3c43386f7b89aca68d2fdd6e8ccbabb5f92cfe91212d00900a1c4e046d4a3a58915be6ab6412c0db0616437b913a3c5d10
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPlusWW.msi.tmpFilesize
1.9MB
MD598904e57576a745997962de95ea1e6a3
SHA1bf683717c341a394cbdcf4611ce2a3e448f4cae1
SHA256a4f3b98cb80b00d9e008f3ed25f09fc6b905f86106ef9390a4fd1ffe1fa3792b
SHA512d8bd5968362a34b1a52b6b4ca945fe2963373117350a9a52198706bceaf5b3de1871d1f8a6a6465618702da4c791c0e9d7fc1d47d8222574c6d637abb424af96
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exeFilesize
204KB
MD5f0c1e2007b9e2bfa07305269302f341c
SHA10c417641d0e4585542b479d2d4160dca3c9035a7
SHA256aaef209d0f12d340a17e5e5c6b3121a57d7b120689c4d08baed5356821ba1316
SHA5123ac6024568286749726b91cb06611ac89b856864b8d41c0419f05f10f9c147b4941f28f2a16d3736cf0e1df2264628169d9aa279c5a0e135534840d008ae7c02
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\osetup.dll.tmpFilesize
5.6MB
MD5f84a37d21fceb88ef9578c3a26f964e9
SHA189b00090b7c106671c63ceb3d5ac76cd7481c137
SHA2568ff9025b26fcab31954ddcaae0f6fb7f587d54c6c69134770e9c9d871dacbaee
SHA512d98dac803b84e3f7ddfc007b55fa9750392ac632dd0ab542dbcffc263402e6f9d40c9ed3a66a215dd7a0784e779277d7bfe29ef8f1c02c71297e8c5756d472a5
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe.tmpFilesize
1.1MB
MD5f1a7eaa0c3c24edb9ee562593c4c6205
SHA12c6d52b40b90c694027984a0327dcf74053bc52b
SHA256ca06534c16fadc06dfc51d7d6beb221f54c76a686417cd91071c280dbe6b7a53
SHA512f163016d9797fde0c749c4c1b9d760e846ff08557f8b5bd4c29d59fc0d9edea2b70bcb308fa2fdbfa6ea72f924b25b4be82982714dc6de40ffedc76adcf3da92
-
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\ExcelLR.cab.tmpFilesize
2.5MB
MD56499420ed50189d179846f70e2662a6f
SHA17b295c0c7ecdfefb98711cbb4bc60d19250e3657
SHA256191668a7c499f2c5869811e7c19d852bad5a7d9b7beae2fea1fd469fa10200d4
SHA5120e5038d663e8ec0bffddb73cfb1cb2770d2bbcbe0c8ab42d9a96ab767e3a9a35c67794d3e98c590f5eea973f3e6454872d1d1d58b739159cebcac2b9ce5e6ebd
-
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\PowerPointMUI.msi.tmpFilesize
92KB
MD57f31a296fe04c0d5039adf32b6762fa4
SHA14be72a51368342e4233b3468b272c9b73956f4ff
SHA256c2c8bfc1388f32ec9957224830474cbdca0e8638d383d8d3e769822803241aa8
SHA512aed3137199753aea683a4ba3f1b4fc1ca72f402369a965368d17ba76b69751c9ada87f3997d8cca79c285b963a751f0270741a513e42f36994c197783e1b2b48
-
C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\PubLR.cab.tmpFilesize
2.5MB
MD5d65fdcf0ccf9a7d5c69b6b5431a006df
SHA1ed32f9febb82a516802b2d916ee1138352243265
SHA256cb05a2ab2471fe7f4da8319f093a9983e94cab38b73cd138adc622f7184b097f
SHA51234d4966aa8f5a98b6490449976d82e3e77d2fc151da5de7bb4c144933a57c5ca58dc7fd863cd78dba5d63d2a4a50caffebc6728d8fde4ee8137ca58c250664c3
-
C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\PublisherMUI.msi.tmpFilesize
1.8MB
MD51276cb9d5044749da7ba51b6b01ff849
SHA182169336b43baa4adf45f1b0bf141188626e0356
SHA2568219eb2c3f9d57e17bf09620c75214723eb54c9a5174b02e0b2d3ad84bd8154f
SHA512793b112af49a89500f36533c03b9fc77a00ca608825c7185e5440899788c2eb4ecb7661cf59d161d210213ed37e811728f3b7e95173f30ece203b944bb095d13
-
C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\PublisherMUI.msi.tmpFilesize
1.8MB
MD51d5ba6e5866bacee962b6e516d01cfa4
SHA1bd6f3176bb76bdd2d83f8d05783c23015f0e47c9
SHA2569ff95cf08e550d75f365fdb50bda3eec0a4dfea8c340360eec35eaee0f5ca598
SHA512affb73763200733b11d86be65424060361b0b9263a6e9a83d0bbcd63aaeb446641a7633b3ab950414f2ce97f4f30680f6d96e68ccfe99eaa3f02936bc56830b2
-
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\OutlkLR.cab.tmpFilesize
4.1MB
MD5512b882517ace7721a11431d4f7f0914
SHA1d5bbf8d62d8cd7af392bb23c8ef977caca5bf0d8
SHA25697a9084c4f755c79478acb96b2b821f2d2b0d085318a83061ee57387e3afb97f
SHA5122c868c5e6cb00d7800f67a94e7f675ee73d2f3276d5dbe144db05d60fc0b2f058ee7a5e78676751f98073fd535b1db61569bca8b9373162b767903629dd478b6
-
C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\Setup.xml.exeFilesize
60KB
MD5849cfc508dfe99f4304297bc46fa50fa
SHA1fee6d576e85ef633dad6a6d66f6c69ac9a27ccdf
SHA256c5bb4644f0e25b171e63f1cc76b7792a22dab0cecc2c3b6f5bba0aff08064a6c
SHA5124a8f48f4964b89dbc42fd0968de807829cd789d2e84b7bf1f9e6ca361251d9c7000711a41bc388070ef00cb4d663e3785055009865575df2c7cec0606716607a
-
C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WordMUI.msi.tmpFilesize
944KB
MD53fff789e8d3e3a2456d3ce0a117e8a86
SHA1041682d48b0c6933644879361ec951dfcae7f29a
SHA256c98d4fd9e4794eb0e0bd9b8021e93cbc7452cf7eda38f62adc6432b97760f3b2
SHA512d44bc0a3e89661cd10b54119ec8d3052811d19e67919a4bdce751d0effd812e9fc1f9992394cd8e652829e77839353b4ac7f22ff7bfc086a51f79afcaa58e8eb
-
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\Proof.cab.tmpFilesize
1.1MB
MD563069369556e84f7ef56a085e46af386
SHA14a77e688b418a544b05f5024a70562cd73c14110
SHA256a41e63829633e5ebc42f3dca9418b3665729330f3873ebdb139323bdf4f9a99f
SHA51233e062bcedd61f19314713331f5089a495eed76291e93e01cadda5b21b272b831b3e11f14b188ef6128a27b6c9d998ffad2fd7c524447acd3e10362f1e6846e7
-
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\Proof.cab.tmpFilesize
10.5MB
MD5bcb27f7e1193abc53094592004edf3be
SHA104086c945e902d05f8e5281fc269fcfea4335ca6
SHA25697a05cb8c68ff0177438626c05a6de7de38be968074c9350ad196ded7062190f
SHA512e672e7b8da8d799de5e054a7d4608290c17e01932551ed66e1c65f94705d58b6f8b0db93f4a8f1e4b21abe96a836930e561a913090e16dd01481a01c3ac73bf4
-
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\Proof.cab.tmpFilesize
4.1MB
MD53711f8dbc17ff8e42116236ce062f24b
SHA174e875517dcf82771bdbc36c23d2f8f34fd758b0
SHA256107566385f8a35d38296f7b176a8cc0c25086164176238ec65714b5fbca61161
SHA512275d6140327d50a03e92b137365defa7e61fe7a2bb7ec815d6c56d5281e5298260a91842e6594ffa2d86b97c9ade332853e7ea91a68f59e09acc061840c60170
-
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\Proof.msi.tmpFilesize
703KB
MD5444bdf50793d419ee34add5278089539
SHA1919145838c3532e435220ed06b1bd98f98c75543
SHA256a8e7d7c9ce260ca20270f42289bedb06a618bf517b65fade6ed643346fd3fb58
SHA5120cbb8771da63ed24b08c79a12a20ea7950e030a222ae8a29bd5dc324a1f4777a846b54c09e50f6d8928ddcbc57b84d8e724055ce848fdeb817172dc79cac6d28
-
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\Proof.cab.tmpFilesize
56KB
MD5e10d356e8d708b40a48734c74fd2ec80
SHA19e024c4824616cbe8710555028653e959fa34084
SHA2568215728c6604451b041bf58e4bd3fcbe518f61fec147eeaebc2f3ec9e9448a32
SHA5128002db426aa24ac166502f57c8e356970fd94d51d11ff8b689eb1ba2250b395417277f1a19af9ee6bd2e7cbd975756c10dbc23f416d93a541b3607bc503b8e1f
-
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\Proof.cab.tmpFilesize
19.6MB
MD5af35a49f59bb25f637edeb4629da9d54
SHA1c7b89b3dc478e507bb908333bedec2ce69beda4c
SHA256de127066c01a09c73ffa88cbabdb6d22a9e21c215265480324c101021a8eb99c
SHA512b2d9ff406e1985159cb440f0762990ea268f4dd92a3ce23fec37af07deb0fbea5000e5796a2c9acd4b91659425386726335729db18116a3444d46f803ceac6a8
-
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\Proof.msi.tmpFilesize
64KB
MD551dc733c5fc500414ebd5e8e26492096
SHA1b4347c5a8f5ba4fc658b26534f543744bd842cda
SHA256583781c834ca46fdab541963be444412933886ce114519cbc595f3124b23dc2a
SHA5128db298a9676945d32396ea9a656b688ed50476a7677a68538f896b518464ab0e42cfbe97faa89b4c7c2c1345579104b4a5d7488f838ca7f28172e836f5de9e4d
-
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proofing.msi.tmpFilesize
693KB
MD573a76d60daaff5ae087e8c750f5fc242
SHA116a58587b3ab8654b691562e19093b46d9cf7417
SHA256b48752e5699cfe32e03b496d44cbffcf04dc5a88e983f763b4a7a98d84ad90e4
SHA5122cffd3dfafff13d6dfebea227478c95217518346640923782fb2f40ee97bb3a309d195204eea43b5042c8cf40a9fdc4967ad3e437441246511d7b11bb8c90b7a
-
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\InfLR.cab.tmpFilesize
15.0MB
MD53d71b2d49395fcc69ae6471697039c44
SHA1a85fcf01065cf949d6f1699ec7495809f9d6cf96
SHA25621113650a3f306eda6c154f11bd9ff60697b6e9408fdc38816b811131fd44cbd
SHA512791f84ede82d87fcabaab9a0822c974582de855d3bdf2a7faccbfb9cf68eb4043d036208bdc6f9e235cd055946be0d09af9425256c45ce05d992fd13241608d0
-
C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\OneNoteMUI.msi.exeFilesize
1.8MB
MD50f5d44d5e4ee3f9d929bc90083da0575
SHA1fd086a21963cc8738b7708f25c8d0eadcffab795
SHA2562691baff0180624d89a68d0b2e8ea43a4c595eb963fe1fd2826ae296e5741b8b
SHA5123ce1c903006186c21f64ec53393ef5965e10f645bba8666bbde26d87bb1dfae2ac7321c728de74ca3fee7159d16256ceaa6a24110f57dec697b487ba812b034b
-
C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\OneNoteMUI.xml.exeFilesize
61KB
MD558f676d1392b297d9050f17ba4fce5c0
SHA1362495d1bebe022d6c65d7efbc6dc8bf0c8343f4
SHA2567d565040fbf2c6df4d19d14b4d374b6e04e94860a907a89a30d81c40f2298b41
SHA51208e940f4511cd72de3e2cce88a46fd1ebad335861756be7000c9f251cefc35eeb5333eaac33fdc20eaa27992c29d6f86174be3507abd1392fb6877c7c7eadb93
-
C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\OnoteLR.cab.tmpFilesize
16.7MB
MD5c3339766ccf3c80f3d7cff2051d4f2ae
SHA1cbc2bb0ef7700ac56fcdc502dc71223ddd8caa29
SHA25624006e2f0f1d9edaf14f21a9951a809868c7a53b6c914abd1a6bcf1aa843643b
SHA512fb8e3f9cc982b528b7f2cb6d7b74405f2aed9e052cdc8e2c677bfcee4cbd4a5c605058e3a90e901c01db73e706ccb958baf85e4a2b99c85fae6c16aaddcd5d39
-
C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\GrooveLR.cab.exeFilesize
4.0MB
MD5f61398c7204382ccc0077b8be481d2ff
SHA1d6fd46a990a7d9b7cd33dab176ad7f0ab1b732a4
SHA2566ba045a14fffdc5f853baafc0e04c2753ef86c358607f52874664038d674a11d
SHA512792f0da0f4d187c8cf7f85c1f6c62dd8b8eff48d165cee2b69d597544bc38099d2590b8ca2b20b2a56065b1e73aa514150b52be8fdee2f09069ddf6347161cbc
-
C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\GrooveMUI.msi.tmpFilesize
1.8MB
MD5cb8309de41b4943c740f6fec2bcd5634
SHA1c1868bc64824324dac9208cd5d71d54e4e792a09
SHA256452157879f1aecce0c9c9f49e8dd17a6c977edce5321eb1feb3f00eaa320b5c0
SHA512c8c65dc3f94e7b8ea145a86bd2767917b702223fac0c07a2b549e853980bb5446ded32d0ac312698e1a4e3d2845be1f36b16319fcb06db446ae2df2f1f85b675
-
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\dwintl20.dll.exeFilesize
164KB
MD506d40d57789530b5275313c314824bd3
SHA1dc8f18d1a805fd4312f83e3be92356c47c71130b
SHA256d2bd36bb72360079b234ef2a272888d9b85586a99ddae7965a89715298c0a829
SHA512d37364f94c90ffcfcc117db78c98ca5567b76b936e8da48e6b157148704d29dced828252e2fe486cec7355ccfc9a812fcbb6365b52d3613b7282400a5c42466e
-
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXEFilesize
877KB
MD5b47ae104d9119a3d2a72b741fe6207e2
SHA18eb4f24f16e33606b847aed9cffbdc3dfebec711
SHA2561b8d9f95e094d941249cdb95c8878a2e8eb782b595aac2a8b2299b3df2e5d80b
SHA512d61453191aa04c361cfc5710d4def2362cf4520e0859ccac5b8d7c1448b7432c8b41e7ea31e26f21e30de39b18926d40cf1ef3c1f35974d407e1c2b5125520f5
-
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\OfficeLR.cab.tmpFilesize
1.0MB
MD55829dfb1f70c872589071c3bac87a434
SHA10f291e4252cb1bd2d420038a38ab37acf0421fdb
SHA25645b0a684d769919c6ba4e77ceecd9c3660c8fda7f2b0fd49290d71538ffcfc94
SHA5126daaa18c080d8a441a66511a3a71ea050da9fb500307991104123efcbaa7b4522efe23b47177d5cf53adc505df324ec22775e95386ede384f6bdb33d1dfe0848
-
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\OfficeMUI.msi.tmpFilesize
2.8MB
MD508fb6486fea1f486f1ac8d81c31262b5
SHA16c48fc704eb83e3fd791b4f7e4391a7ffc59bcae
SHA256a8b52e08e315c0d3adfe2bec5eb19fafd26ecda40ceba5ff413e69b6c1907877
SHA5125f639aedfef7ef74db773d9afa793777844cf9445b42e73280639012018186523c9a6e380aff8387058dab97159a5341a3e17ce866382525b5c55829058e45d5
-
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\ShellUI.MST.tmpFilesize
65KB
MD5413cca9f773c0bd9a1231b379395028d
SHA14648d2c6e21604fbf454a3dd942368ccc2687dfd
SHA2564e4c9b3b6b3675365460dd30de3ea28a5efb953f62029051c2d9bfd796767a93
SHA512d7dd6182f76a1ddd38ce4a7c28cdab1dd347795114ddf3ab284f73292b8ba7223a70fc8050437b31b2d41812753d3d1a17a4a7d3cc3559bd4a970dede13fd04d
-
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\branding.xml.exeFilesize
641KB
MD5d8e9a7759839d681f5fb3b6910ddafb5
SHA1a33ac00e6b97de968a89625e0e3a6ffa8b9ab2aa
SHA256e3b743792b6d3392b24a8b58a1db923727d4d3203170b04466e63e3cf3a09529
SHA512de9c9b8dd81bf386d5027ff03aa2287aa4b74ae6fff39112690f2b68e7f219d96e2c2a329e191a5dd9db3fe9f3679babb9a115660d1078afa3ede1b89d714fe9
-
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwdcw20.dll.tmpFilesize
572KB
MD51b7eb4ee114c5e008269d02d7289baae
SHA1adc39d750221831b3fcc4902a10ae1aa33a7a5e8
SHA256e51effec23a8e73208060423d495e816584139b3e6c37ecee0d3bead0ff75b57
SHA512840b89cfad6cf92f29f10964cac8777b3f870b168380212589f23281d93908db9410491ee6f60fb8518f26e3623fa78bf13c6ff60905a0f499fc56536dcc0357
-
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe.tmpFilesize
566KB
MD5a7708ca79691ff2a260d06cac86a8adc
SHA13daa8c794ac8684bf35de85e2cb51e5c4cdc8290
SHA256bae7e1dca60f1a39047f73e66848536ffcafddf536fbef4687dc9de512c08720
SHA5129d4f2c3e39a9146fc545a7350b9f03cf52ce2c484e2bd4412b09863f261b3815d684cffb2f96a3abdd3f8aab79d42536325132b3503bfaed8f7943cf80f0d36f
-
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\msvcr90.dll.tmpFilesize
699KB
MD51691c69cb3467a4aeb4ab2b8ebd555cc
SHA1f1abb822f63d6e9e0386f4a9e17aa4c05d58abcb
SHA256b5ab7b5023661ef83e580414878e4f647b39a015ee861ebd612085d94f343384
SHA512eb4cfaa9adbbc55a7010e3dc6cb3a79c5080d76e731e1c74d12389e356183fd8e08d3999f57d75ec233248c23dabfc58e3554085c08971b90ee380dcfe5e93f5
-
C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\OWOW64LR.cab.tmpFilesize
1.2MB
MD57489a2409a925fc6a57bce565cdd96cf
SHA14ac7da83097fa15ac6048e5554817b7bbaef76d1
SHA256395e2e8dad063270957e4588d6e6c4dcbf9e350017ec3122a5d44362800dc15f
SHA512f5b7df67652bc7381139b36c251cfc4886eab266507769bd82bd8ec7488a422956c3e31ee5770ddbdecbf71ee33878e9397b48bfe7e691d1252cfb7c40a082f0
-
C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\Office64MUISet.msi.tmpFilesize
693KB
MD509463750b0caa2f22b766456b8d51243
SHA1151cfdef84e87410ee5bfd576de7397380a3f38a
SHA256ce06e1b9f07cf6e8b376d3dd4ca6e2093f405195c70e3f6467dabda860c65ec2
SHA51268d1aa0a8de412c095c88d7d3ecc228d3a0575defa8517f67fe0a2c51319060e62dcbeec872e613d93efdc82cca7ecbba812ce6b2f03e4d58668f2ab22f0e4a8
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\AccLR.cab.tmpFilesize
26.8MB
MD5446debbf959abf5ecab28418dd2380f3
SHA174dd200ee240dfaa4feb9a37a9058ec9834c2175
SHA2563dcf89c7ee05ee9757da901e150316d0136b5ab24ee245758c2789986279f145
SHA5125605dbb970d33056d0a6772ff82c498f634c0b9b0662b309f3dded0bbd1c54f8f9f4454a68af09d1f3caa487ffc0e7421363bb9a22ae0bb58af31c0f7998d52d
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\AccessMUI.msi.tmpFilesize
1.8MB
MD5d3bb6b6ea61b5fd2c4a7c706ba2a8553
SHA1e088f9446d926cd70fa913c3db3382380f8cde8e
SHA2568371cb5694e251307d2bc0e324737f5aef87f97bc664a5f8e5ae6990195dee70
SHA512092920d41f9e04597073840f1789b2fc7007e9b274be0553dd9a2ff15ec8c55f0e0a1d0bc612b709bb9986ffabc1082baf69c701e7bb32a4f90bbcd3a5aa2ff1
-
C:\Program Files\7-Zip\7-zip.chm.exeFilesize
171KB
MD5844e67b81e1c88d0ff55a47628b4c52b
SHA16e611136d42b76fb5b8081289fba6a23a8608051
SHA2562a0c0ea65bb1e8c9cb83a7112cdb49576206b3b5298652b02ddbde1a0b884345
SHA512d3bfae155117e826e82256025d070c2fee4f51cf16b4bba5373b9790e762f192c41e1c5c5bdba40f05bd4bcf8d2fcafbf58f6a10cd0e777fface65c7e7d757be
-
C:\Program Files\7-Zip\7-zip32.dll.exeFilesize
123KB
MD54f5a7e7bc77ce094ed7108224c523d69
SHA13a86dcafb5e0b7aaa9d5e189df20031fec2cb0fe
SHA256a785539248cdce343e615f4c98974ff6bd10320509ca9c3fe17650fc68152253
SHA512f18d795e02b5a67436f5d53c3526efcae8f591a0c997dc9ce1fe37cde54a063eca5838fa9d71510d32fae28a1a53e5d26a54619598e8d4a7035cb78dc30968bb
-
C:\Program Files\7-Zip\7z.dll.exeFilesize
1.8MB
MD5bd1e6e0c97d492b2c720555101e23ebe
SHA133c977c65540a79adb0e269c0e5c1e8bf8075659
SHA25640392be8f91f16bdbb4869c243bc0c6cbddcdc5e10d00851c323870171a1e145
SHA5129d193a4dff3fe8e3adc76b78af6f8ca6870022b583e6ff1a5d2bb04dd8a3e2eb0a07f7bdd43f98322985c1cbcc456e6b150d08164151644d7b3ca3e0e15d14fe
-
C:\Program Files\7-Zip\7z.exeFilesize
602KB
MD5c2e58bc64a01f0fbc85885b769b215c9
SHA160fd31e10821a2f1bf4f4fd5f1fbf94254c757b3
SHA2568884a39e434854c48e61583015d10bc98c2ab0e103bb8e2a09df92d2e86542ee
SHA512f3457090765476d9ea4f370e332a680384886e62750a19b83e863172f70eb36b35ad82ee1ff826eceb83e5c531e23cf095728a4bbafda332329fe908855e91c4
-
C:\Program Files\7-Zip\7zFM.exe.tmpFilesize
989KB
MD59203de2d2f900a4fbee658bc5f362f50
SHA176ad2ea46eb76bcbcff116b5f5cee7977d8d3ab8
SHA256a404213335a0d02df569ec7ae4137ec7af79c703f764c359086ea780e613e688
SHA5125eb0e75347ea67bd8ca2914d918ed29e9161910b196a2741203a18dd91848060dd1e66b6c603031513317aba95472c4d6adf06b784e3a9b9260d14982d9f51bd
-
C:\Program Files\7-Zip\7zG.exe.tmpFilesize
60KB
MD527b93f9d1ec124951cce4f6506fbe8fd
SHA17f80b7e729773f704e0f0222d03983bcd1a82e1a
SHA256197132ee90605c14116ba028a868810e30deea5eec460693d57450bdc652fef7
SHA512bab72e230cd091daf0cd40cb7ac2c37ecb19ecdd1e13ea2cf5eacca9875baa8afd4553c0564e21815c63ceedc8cd8c3fd025ed92dfe1630fdfe07bc5f73773a1
-
C:\Program Files\7-Zip\7zG.exe.tmpFilesize
742KB
MD5943d3147cc580fa1fbeb1f78a2657c85
SHA1f469529ba7d6afe214963166be20013b5b254d1d
SHA256f9d665fd64f488c3f2d02f2694d676e9dbb7c2435e169b853d3950bd0b921c1d
SHA512b12cefe446abbe8388e0fe667d34c23f8ee42324c3fa31486299fa9e8084b428629ef7a9cee0dc01c833aece0434f5770ea7b0e88524afbb1b0c3824202e8ce2
-
C:\Program Files\7-Zip\Lang\af.txt.tmpFilesize
68KB
MD5b6b5eeacc3c3e5657bd80ff0be595e93
SHA1ff0c632dfeb646ce280ed5bfb5c9889f683500a8
SHA256b4a40da94206816b33aa8000832d5c8f72db1f245a13a49d47d14d48736854d5
SHA512ad7223ca856837f2d1884dad78b441c6ec87a4c2079d75ce2f51e09a2b474782d0ebd457048ae09cfef5aeefb5cc49b731595264428b785ff889f0e682264e8d
-
C:\Program Files\7-Zip\Lang\an.txt.tmpFilesize
66KB
MD59841838ddb022897d2afff28294de528
SHA1b792328dd4ed87d46a18b665002e273ba7b59b53
SHA25638dce424f7306ffd9b3a96f7cda54670ac4552f1d2a8481b91842fc831c85476
SHA512e17857ed160eae90002ba79d73d6e1d7461c77630e88738c48dee0cf4bf0cdc3b80027cb86de898231ce3aa169163559f5cca2af9d848d3f0617dbefe1ead27e
-
C:\Program Files\7-Zip\descript.ion.tmpFilesize
59KB
MD58460c7f8d012390f1ce3552b735cdfb9
SHA157445d4ab70d63c7672575be17cd5e28da288951
SHA2560a00da9288c86cfaf7da2c18460749969a3d802543830f6235b2e458bb524ff2
SHA51231ae5c5d7b3ac09462f7bb051d7faa9e8169a8da5039f0bb77bae65257f378dd87718d0f773f4e5a00c52241a4ea6c728360a579f30c547a3d5d375870309fec
-
C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-13.tmpFilesize
58KB
MD5940d123937aeeefde9e49e8cf33f9194
SHA177e147e0aa8fe73d00bc3cb8bab6d1915ace363a
SHA25634d1c35047fb08688c51edf065df8f363ebda3efe6c1da14204cd41c9f858348
SHA51282593c876834f698513175f06c6cb0d1feaf649fbb920c542d28c66b8d29ad7b4fa5b05c3e1b807c278f1443bc3964f633f6cff383802f17553d793095005d76
-
C:\Windows\SysWOW64\Zombie.exeFilesize
55KB
MD5b5defe64f89ec378bfe1ee99c291fd3e
SHA1417f4bf0474e62c34fea9c2570134931323e7746
SHA256b7e22594f21bd4aee4a2ac11f4f6cfff598237091e1f37a7ff6d97ad2cb3673e
SHA512f1f416105e51bbae86baeced0aaad2b089b8e355769b35a645dc938d4cd30958ff921e7caecf55e7680877c6aba42c0eac8e7c25cd10096e86ef4e43da536a66
-
\Users\Admin\AppData\Local\Temp\_choco.exe.ignore.exeFilesize
58KB
MD56854785396ff4c19a587c8c4dcee9c71
SHA1f68f1395d391368865746cdf20d039af1da8e545
SHA256c1563c258695b1ec406810fd8304d6de5f67e3cf7cb4aca81c3db65e0c7e3534
SHA5129c555120f8253a2eec7ce35be47a9ad03541f92898e7c21bdbefc60ff4b9d0d6fce0e091102deb471e2fc1e30b57f6f7ff2ce251aedf5d5a00c2dd9f21601c17
-
memory/2812-0-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2812-13-0x00000000001F0000-0x00000000001F8000-memory.dmpFilesize
32KB
-
memory/2812-280-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2812-1143-0x00000000001F0000-0x00000000001F8000-memory.dmpFilesize
32KB
-
memory/2812-1341-0x00000000001F0000-0x00000000001F8000-memory.dmpFilesize
32KB