Analysis

  • max time kernel
    119s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/04/2023, 17:55

General

  • Target

    Naval Warfare Script - Linkvertise Downloader.html

  • Size

    2KB

  • MD5

    19231f0f25ad59fa0c386b8ab3046d46

  • SHA1

    4811e40c663ff339b7ecc6b5c825d775ed493ced

  • SHA256

    3c7355938b1deebccad5d6d29fac9a1c358ddf37ea63280ca2bb2ea4be8b7ff5

  • SHA512

    cc0bd358c22817db60f9cb37d3dc74f0cd449d5eb674e2d1a8555076967940b7e69048a906337ef017b370e3be667ffce265d6bbb48ae6913cd67371f9731d5c

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" "C:\Users\Admin\AppData\Local\Temp\Naval Warfare Script - Linkvertise Downloader.html"
    1⤵
    • Adds Run key to start application
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe96159758,0x7ffe96159768,0x7ffe96159778
      2⤵
        PID:1868
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1972 --field-trial-handle=1760,i,13958800309872635268,10582494408354984205,131072 /prefetch:8
        2⤵
          PID:1412
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1760,i,13958800309872635268,10582494408354984205,131072 /prefetch:2
          2⤵
            PID:1576
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2128 --field-trial-handle=1760,i,13958800309872635268,10582494408354984205,131072 /prefetch:8
            2⤵
              PID:3908
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1760,i,13958800309872635268,10582494408354984205,131072 /prefetch:1
              2⤵
                PID:3996
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3216 --field-trial-handle=1760,i,13958800309872635268,10582494408354984205,131072 /prefetch:1
                2⤵
                  PID:4540
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5276 --field-trial-handle=1760,i,13958800309872635268,10582494408354984205,131072 /prefetch:8
                  2⤵
                    PID:4668
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 --field-trial-handle=1760,i,13958800309872635268,10582494408354984205,131072 /prefetch:8
                    2⤵
                      PID:3324
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1760,i,13958800309872635268,10582494408354984205,131072 /prefetch:8
                      2⤵
                        PID:4920
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5224 --field-trial-handle=1760,i,13958800309872635268,10582494408354984205,131072 /prefetch:1
                        2⤵
                          PID:3916
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=876 --field-trial-handle=1760,i,13958800309872635268,10582494408354984205,131072 /prefetch:8
                          2⤵
                            PID:1036
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3156 --field-trial-handle=1760,i,13958800309872635268,10582494408354984205,131072 /prefetch:8
                            2⤵
                              PID:1488
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:4560
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:2440
                              • C:\Users\Admin\Desktop\Naval Warfare Script 2 - Linkvertise Downloader_CKloi-1.exe
                                "C:\Users\Admin\Desktop\Naval Warfare Script 2 - Linkvertise Downloader_CKloi-1.exe"
                                1⤵
                                  PID:3776
                                  • C:\Users\Admin\AppData\Local\Temp\is-I4B96.tmp\Naval Warfare Script 2 - Linkvertise Downloader_CKloi-1.tmp
                                    "C:\Users\Admin\AppData\Local\Temp\is-I4B96.tmp\Naval Warfare Script 2 - Linkvertise Downloader_CKloi-1.tmp" /SL5="$701E4,1785071,899584,C:\Users\Admin\Desktop\Naval Warfare Script 2 - Linkvertise Downloader_CKloi-1.exe"
                                    2⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SetWindowsHookEx
                                    PID:4744
                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                  1⤵
                                  • Drops file in Windows directory
                                  • Modifies Internet Explorer settings
                                  • Modifies registry class
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1368
                                • C:\Windows\system32\browser_broker.exe
                                  C:\Windows\system32\browser_broker.exe -Embedding
                                  1⤵
                                  • Modifies Internet Explorer settings
                                  PID:5048
                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                  1⤵
                                  • Modifies registry class
                                  • Suspicious behavior: MapViewOfSection
                                  • Suspicious use of SetWindowsHookEx
                                  PID:224
                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                  1⤵
                                  • Drops file in Windows directory
                                  • Modifies Internet Explorer settings
                                  • Modifies registry class
                                  PID:2120
                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                  1⤵
                                  • Drops file in Windows directory
                                  • Modifies Internet Explorer settings
                                  • Modifies registry class
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1128
                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                  1⤵
                                  • Modifies registry class
                                  PID:1340
                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                  1⤵
                                    PID:3564
                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                    1⤵
                                    • Drops file in Windows directory
                                    • Modifies registry class
                                    PID:5008
                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                    1⤵
                                    • Drops file in Windows directory
                                    • Modifies registry class
                                    PID:4148
                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                    1⤵
                                      PID:5360

                                    Network

                                          MITRE ATT&CK Enterprise v6

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                            Filesize

                                            1KB

                                            MD5

                                            08c5ec86994543c9183f5f5db8fb69b4

                                            SHA1

                                            e70c51ac553fc6feec0ff9abac73e8689b735425

                                            SHA256

                                            c0cc7de1c954fd49ea61c7c02c25dc5b97ea8ed4d9375a0ef5d8c2a6278e1332

                                            SHA512

                                            d3879839ad5eb86ed184cea858e5be453aa141ea86e0346b7dae4090e862cb0d51ddff6deebd6a4ddee230b7c8aaf0828536ac09c5b0f745fe6a11569742e3c7

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                            Filesize

                                            538B

                                            MD5

                                            127419d154ed6b22944359d0b17c6799

                                            SHA1

                                            ec94258360e4a5a56b01eb7f5dbe5845f994e11d

                                            SHA256

                                            d66382fecee5f48f7f3c986dc7dad03093cb26b0c539dabb9fbe3c40d1b5ddea

                                            SHA512

                                            2c0c92ebd81f352b06303802a7628cb31b60307b2eec7dcd147aa02d4af6a2a4ca71dedb41ebcdd7562b2cb6772676cd8067328fe9bb3e6e9238f92aee3351ea

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            966e84e668b09dd6143d7d0d0af8d2c2

                                            SHA1

                                            efc4c7c1eee7364ae4bf3b25a93bd74b1175e541

                                            SHA256

                                            10403973ba2490fe6ced58ab0b22a2138910b7226f0e8b38fcca731ccb3a1776

                                            SHA512

                                            1d73a79a1537006a92e72ed941d34612da73e79bee8758b623a3933015a5aab6c7cbed0baa673a3b6ebf5132f56e9d0337744d966782efbeff818c9fc6d2535a

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            321a717bb60354a7d226896ac1790fc7

                                            SHA1

                                            4fc9268d17c81abb9e0bcc339971d2b83aee0e17

                                            SHA256

                                            56080554f8c334782d777dfe2331f6083feeba4db7633d8f5f3b87b9efdfe5dc

                                            SHA512

                                            05130e9fed3e6da8d2057f95eff14bcb6183fc791026548efd77ce1f7badccbdf500635126c9e438fe2260eb2c4fe2d1501f4597d63d255f455637873ad2904e

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            183b5f9537ac2df7b0fca2ebce4376fb

                                            SHA1

                                            fe8600ac9cda29043aad1d4d86b61b9e1f76bb87

                                            SHA256

                                            2b02ec0a9d3fc2cf1eda7661aef4822c89370b64fce7f44274d9f897b26aa6db

                                            SHA512

                                            83c149b6d3c7ce6170bd8bcd6264e5c4b00893035de54a0f0ae66a3d1b70c66b5c0173e1f19078c6d5abb81c39cee1d94f48fc9a1ececb0fde1efcb193138d89

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            f7f3dc6e13aab8f340a130a2c09ad232

                                            SHA1

                                            1ca591f28ef818ae237c8e3b06428d0f1c3d8fef

                                            SHA256

                                            1ec3e10b027d89f2b44ebfa763ea3ae2d842a762c27a2838dd7d2a1c941cef8b

                                            SHA512

                                            5bef2c25986acf23c192a31fce392f27e96025e4c0b04e8545a8d5012483ea9c8182fa766e4e2d8df6c424d8dd75629ef568928bb166b0248a47c845f6b8c90f

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                            Filesize

                                            12KB

                                            MD5

                                            a3dba7727bc833f32dcc21c82536c71d

                                            SHA1

                                            cbd7793667cdaaf077a987cdaf0002bb2087ae93

                                            SHA256

                                            01505a96d9cea29d717a4636b0bea5b5a04b3438a43923e4c9670926e1cc0bda

                                            SHA512

                                            ecee3018f9f61ddb38978100d82572b47713fac7cbb9693f55cb259fa619c05284736b4e979b77fd58fec001a143b8a323f7120be858099e8e08cca3ea692fe7

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            89308a04324239ddf52276c08f974d31

                                            SHA1

                                            4c84336ff0d7e69f9dececd08bd09ce93661e65b

                                            SHA256

                                            4620b2e0c8d6922cf35083429984aa161e7a5eb5c5b1f2d56f2fdf4437eaa90e

                                            SHA512

                                            9c6affec199220fe28621f974aca8357254db939f9117c6c227b0a1664a5c4a7c7a3f52f173c39e946a230ad13d7b8e92390969acf9d47ac53e98dfdd0d84029

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            199KB

                                            MD5

                                            a0630dfb7a598000cb3b24cb32af72c1

                                            SHA1

                                            7f75da6f40eb6bb9f3a789eeaf63ad3972ee014f

                                            SHA256

                                            bdb317c13caf0609a777c15541ffa057083b6f4072189b4e6d0f64f0cb99ddb1

                                            SHA512

                                            c3f78947e31785a4e660af761c7a73b8e099dccb48bfaf3b5ab84817949451264381f60b1735251389cc912c54dae3c851b39ea26bcfab9aee7002bcedee30b8

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            199KB

                                            MD5

                                            e26dc8da118da3a247818816d04dd796

                                            SHA1

                                            1ca15dc01865ad25fbbd938d62d657719133f553

                                            SHA256

                                            3a5f0d9fb27d6609614df26bacf1819d5e786fa488f4d51c5588bd263b8d31bb

                                            SHA512

                                            c0f7409c62197a319d619879959e68d7a2ae3d53b6c32ae19c36c14dc2db388215212fbd8f5586bd6bf47fccd8eedf8acec4fcafabacb0f0e7614ad6768805f3

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                            Filesize

                                            2B

                                            MD5

                                            99914b932bd37a50b983c5e7c90ae93b

                                            SHA1

                                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                            SHA256

                                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                            SHA512

                                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                          • C:\Users\Admin\AppData\Local\MicrosoftEdge\SharedCacheContainers\MicrosoftEdge_iecompat\IECompatData.xml

                                            Filesize

                                            74KB

                                            MD5

                                            d4fc49dc14f63895d997fa4940f24378

                                            SHA1

                                            3efb1437a7c5e46034147cbbc8db017c69d02c31

                                            SHA256

                                            853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                                            SHA512

                                            cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\HWUANHE3\warmup[2].gif

                                            Filesize

                                            43B

                                            MD5

                                            325472601571f31e1bf00674c368d335

                                            SHA1

                                            2daeaa8b5f19f0bc209d976c02bd6acb51b00b0a

                                            SHA256

                                            b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

                                            SHA512

                                            717ea0ff7f3f624c268eccb244e24ec1305ab21557abb3d6f1a7e183ff68a2d28f13d1d2af926c9ef6d1fb16dd8cbe34cd98cacf79091dddc7874dcee21ecfdc

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\TRY6OQTB\fRSNKQanUHk53F1a1Bi8UA71Qt4.br[1].js

                                            Filesize

                                            289B

                                            MD5

                                            9085e17b6172d9fc7b7373762c3d6e74

                                            SHA1

                                            dab3ca26ec7a8426f034113afa2123edfaa32a76

                                            SHA256

                                            586d8f94486a8116af00c80a255cba96c5d994c5864e47deac5a7f1ae1e24b0d

                                            SHA512

                                            b27b776cb4947eef6d9e2a33b46e87796a6d4c427f4759c08cf5aa0ee410a5f12e89ca6ab9cddd86c8471037e3c505f43c8b7fc6d8417f97f9fe3c5c47216bc4

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\TRY6OQTB\sXBuN34gVodVFZ4ibhvLSgv15Ks.br[1].js

                                            Filesize

                                            4KB

                                            MD5

                                            56b91eab01144db91d100617ba0ef2a6

                                            SHA1

                                            5994c12e9338175d82e2ee3053265f738d858e20

                                            SHA256

                                            ee7f4b86a5c2b3d2781d6a0ba8f3deff6ef943d21a5a92f435453c87b99f9509

                                            SHA512

                                            84715f3b86201e40ddf0b6e052c2fdfb8cb9c6fb79fe42df01ed4ac26197993439cdd917480ca21e5c04f6c39725695cbcf1e7ec7f4726573390f62088bbf85a

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\R9FJUIBN\tinyurl[1].xml

                                            Filesize

                                            13B

                                            MD5

                                            c1ddea3ef6bbef3e7060a1a9ad89e4c5

                                            SHA1

                                            35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

                                            SHA256

                                            b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

                                            SHA512

                                            6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\Cache\JY5BG9QE\jquery-2.1.1.min[1].js

                                            Filesize

                                            82KB

                                            MD5

                                            9a094379d98c6458d480ad5a51c4aa27

                                            SHA1

                                            3fe9d8acaaec99fc8a3f0e90ed66d5057da2de4e

                                            SHA256

                                            b2ce8462d173fc92b60f98701f45443710e423af1b11525a762008ff2c1a0204

                                            SHA512

                                            4bbb1ccb1c9712ace14220d79a16cad01b56a4175a0dd837a90ca4d6ec262ebf0fc20e6fa1e19db593f3d593ddd90cfdffe492ef17a356a1756f27f90376b650

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\User\Default\AppCache\7Q4PAC7D\2\kernel-a9509dac[1].css

                                            Filesize

                                            103KB

                                            MD5

                                            c500a0a101dbc9730798aa1714fe0f27

                                            SHA1

                                            9f1f0251ceffd556e7cf9a7a8f341b31493a983a

                                            SHA256

                                            f5ce1339bbfb388d0ac2647e1cfb58bf5255a359f09e2ed42acd24c50c1fa960

                                            SHA512

                                            821a88f222ed3cc6f15262e6a91177aa86943bd4e328605a530801d2702d0fa83fcf505c169fcbf3327794ef4af8633a8f7e7c07ebd52b2562a5dafc4ed54bc7

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\User\Default\AppCache\7Q4PAC7D\2\kernel-e08e67f3[1].js

                                            Filesize

                                            291KB

                                            MD5

                                            dd7e2dc937ff9a689913227613c4d0bf

                                            SHA1

                                            8e9038f87093458dc80ef022525c21a83090f5e4

                                            SHA256

                                            18e2e2f4a9644f7dda598a04ce4f655e2b689088eef9ce8b306de6ae1c3cabc5

                                            SHA512

                                            9da01fef5d19163c7274be23b4408a00106341b06f0c7fe25f759c9f8c644dfaf0d1c25b9b33bb8139a5b9781fe15467727de75a8d2df9d3e683baf207b37767

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\User\Default\DOMStore\9QWDBWOP\www.msn[1].xml

                                            Filesize

                                            289B

                                            MD5

                                            aef3c343b5ed3f8393e064c84f66f0d9

                                            SHA1

                                            927fa95f6a74e7042920a31d1a5e2989c8faf068

                                            SHA256

                                            e6e54ea44864b868f11d5db803a5c0ff65b5fc6fac5e1825e18a109fe25710ef

                                            SHA512

                                            9a7b77340ba28a4a0637d2aa67b1556896456c61a1985ef23865545da150cef8f679ba51ec99a866848b16d2effa00eb321784590aa45ad014c47f5991ca43b8

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\User\Default\DOMStore\9QWDBWOP\www.msn[1].xml

                                            Filesize

                                            4KB

                                            MD5

                                            964610ff4fe098738c7d1a74d4071a5f

                                            SHA1

                                            322becd56c5ddc9a8a02ca85a8f78957d06f8a91

                                            SHA256

                                            8cfd6cfd52180ca94690c66d35330b96bbd40d297d33be102b02df7908304f18

                                            SHA512

                                            076dcd6c1cfbf9ac92b06ad1556b9aede9f5ce7e868824c114bc54b396d3f15e5803ae2b80443e6ecc6544fe8b3f7806bb15866790d49e2e5ca4f06f3db4844e

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                            Filesize

                                            4KB

                                            MD5

                                            f7dcb24540769805e5bb30d193944dce

                                            SHA1

                                            e26c583c562293356794937d9e2e6155d15449ee

                                            SHA256

                                            6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

                                            SHA512

                                            cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\Microsoft\Windows\3720402701\2219095117.pri

                                            Filesize

                                            207KB

                                            MD5

                                            e2b88765ee31470114e866d939a8f2c6

                                            SHA1

                                            e0a53b8511186ff308a0507b6304fb16cabd4e1f

                                            SHA256

                                            523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e

                                            SHA512

                                            462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\LNAUTGZ0\favicon-trans-bg-blue-mg[1].ico

                                            Filesize

                                            4KB

                                            MD5

                                            30967b1b52cb6df18a8af8fcc04f83c9

                                            SHA1

                                            aaf67cd84fcd64fb2d8974d7135d6f1e4fc03588

                                            SHA256

                                            439b6089e45ef1e0c37ef88764d5c99a3b2752609c4e2af3376480d7ffcfaf2e

                                            SHA512

                                            7cb3c09a81fbd301741e7cf5296c406baf1c76685d354c54457c87f6471867390a1aeed9f95701eb9361d7dfacce31afd1d240841037fc1de4a120c66c1b088c

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\TMMJHENZ\favicon-16[1].png

                                            Filesize

                                            378B

                                            MD5

                                            deb99cd5544b90e1c583d1847c80cc33

                                            SHA1

                                            d48cb46e2d21312c41204515699c984330c36a98

                                            SHA256

                                            3f4ce708e191bce27d269601a4aaac0008588d9dadec729eed7a7b01ff215fcf

                                            SHA512

                                            305e271719c06ac0e796c4d23ba87b79e3ad94057e4943af25e4ed737111c8b546e332e82f766cc602bd145e2e2da9c9f28477ad3b1cb145cc33988a4b5467be

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\TTM1HOEN\Favicon_EdgeStart[1].ico

                                            Filesize

                                            33KB

                                            MD5

                                            7fb4a1f2d92cec689e785fd076ae7281

                                            SHA1

                                            f3477f75f8d14dd3bcf5f50176f8cdfdcd3944f5

                                            SHA256

                                            8ffb08e22d8848b0dc64e13ef43a5db913a3b4c112f67b0346f1508f2811aeb1

                                            SHA512

                                            bfc68283080028dd1b93bf28600f2abd8cb3c375c6433649972485e027b6d72e81535221ff2c89c2e5b255dc24ef3a1db28129a95eb872f236ca624f1ca9d02c

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\Z31X8ZJM\favicon[1].ico

                                            Filesize

                                            4KB

                                            MD5

                                            da597791be3b6e732f0bc8b20e38ee62

                                            SHA1

                                            1125c45d285c360542027d7554a5c442288974de

                                            SHA256

                                            5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

                                            SHA512

                                            d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\kqssbdg\imagestore.dat

                                            Filesize

                                            34KB

                                            MD5

                                            1a6ca67dddcbdd89d9f9e0d57d11fec7

                                            SHA1

                                            1572d0bca86abd8ea35c068487b590881a057fa9

                                            SHA256

                                            16f8cd73aa3a47f63a41a617feae48ae3492b1dbaa8c5e847fc244abb38a495d

                                            SHA512

                                            b80cef213656bcea4bc95af93d37c2c1931d6b8e9fed982f614e0f07f635f5d69839bc4dedbca9855d5bfc85c3fc1c6569054e7b716409b2b287e95bda586e76

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63

                                            Filesize

                                            1KB

                                            MD5

                                            5c325fe4cb9c626931171a05920a7159

                                            SHA1

                                            5dbac59c5a9d29588f5d28a6210d6bd98a06cb17

                                            SHA256

                                            279df13ccde94ac96d995bcfc46202c8faa35d25b5259cf5b6d4b793ec9fdd53

                                            SHA512

                                            cfc1068d54997264902f27495e12b869724cf0b7f4a33e6546ec983b2ab9e833f9eee245be81770c847ccbb0567e9c6aa1ac7cfa32907f8510645c13fd2b3393

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

                                            Filesize

                                            1KB

                                            MD5

                                            6b398711210b0675210eb10ecb7a2743

                                            SHA1

                                            507499f974b71d3647eab0e79a4055d1213b471b

                                            SHA256

                                            efc19a88e1f6db3d5ea7ad0cbf5b09775abe2e0d40c104dec80bd87b4267bbe5

                                            SHA512

                                            ea85c613167df7254c3d93aa8f0c86c4ff7bd1151fe12e3f5b0532fdee0805b1c2d2757b80cab457c0081ee4ee4c4ce0ae1310dfb9e2fa29ec169553ff630b84

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63

                                            Filesize

                                            404B

                                            MD5

                                            fdd7688529bbb48b963a7be294f20112

                                            SHA1

                                            bcb49a54770bd9151432afc508934d80e6a9a8c1

                                            SHA256

                                            a74029cc3dc3c0c37a32e131d5837ef085d47c51b41257cb33ba5a24a227cd72

                                            SHA512

                                            62d0f731229211763728e5bc387165d7be8fa3fd4249a1ec4da5f4394ce731ebed1fa4a19200d58961d6371a3c359a2804cc2ca82bdd9d0cf68aba4c0a384553

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

                                            Filesize

                                            458B

                                            MD5

                                            21a300cc0bde6111a20a253ec02747f1

                                            SHA1

                                            d8dca8115c9aa081a20a317c5466c553bc28e1e0

                                            SHA256

                                            c7706167284e3a0fcec47b2d23a4b3ddd2d5d1b3a729a0dcc019c9e9420f4712

                                            SHA512

                                            6ddad8ac717c3c89c40fc67da5cee633b512ab9a6bf435376a12fb9934170ceaeded3fbe8524a0c06af23bd0c8c1126ea91f4da66b15f4de56eb2dffe0c175fc

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\Windows\3720402701\2219095117.pri

                                            Filesize

                                            207KB

                                            MD5

                                            e2b88765ee31470114e866d939a8f2c6

                                            SHA1

                                            e0a53b8511186ff308a0507b6304fb16cabd4e1f

                                            SHA256

                                            523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e

                                            SHA512

                                            462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d

                                          • C:\Users\Admin\AppData\Local\Temp\is-4R8TM.tmp\loader.gif

                                            Filesize

                                            3KB

                                            MD5

                                            d35d95fc6bd8be33d3ce5da2630b90bd

                                            SHA1

                                            be2fb4098a151f6c77a85ce8c274a3054a61178b

                                            SHA256

                                            dfa608be394c8f6d19aff352185917720f04072ac0412a8cab1174fec4939c08

                                            SHA512

                                            078fa3cf9c08c8bdaa554a52b153a159f537de3ee0ba923d64928cdd99b4f2528b4eb229c1b2352b946ef417efd478b453588a6cda1afc91b374e709afc730e4

                                          • C:\Users\Admin\AppData\Local\Temp\is-4R8TM.tmp\side-logo.png

                                            Filesize

                                            24KB

                                            MD5

                                            e2d3022fb249af38288c47246bc60228

                                            SHA1

                                            bf7a44230ec7dc0f45e89224a6fe821d25f91f55

                                            SHA256

                                            9a7462e436d86f26ae9c0808b30810b8d2fd25ceef7af24ff09a1af32e63e2a9

                                            SHA512

                                            510d60ed51bc972b6bb3ac80a86d31b6d797a1af0a3ffce068089f0adf39d6591471de7ef7f21ecaccb67255e57bbe04786534256a12bcae5017078df56f12cc

                                          • C:\Users\Admin\AppData\Local\Temp\is-I4B96.tmp\Naval Warfare Script 2 - Linkvertise Downloader_CKloi-1.tmp

                                            Filesize

                                            3.0MB

                                            MD5

                                            eaf2c9683c1424abb77a6104b339fda5

                                            SHA1

                                            82fe536dc66036a759f620003f324bc726192da0

                                            SHA256

                                            a2c20488f11814b0bb8eb471f364c58d8f16a34fb526b84ccb97d15b98450d9a

                                            SHA512

                                            49d9482bb2f41aa87654d22f3ffc31abed183ac68545cef87125de932cf745f8c68a31d17e142c4a4f0f21e2bf1edab8cda59ba2b1b1827f8c84837352196bf1

                                          • C:\Users\Admin\Downloads\Naval Warfare Script 2 - Linkvertise Downloader.zip.crdownload

                                            Filesize

                                            2.0MB

                                            MD5

                                            f233902367b1976663bdc6e14716a7a2

                                            SHA1

                                            500c870be91dab3023118d2a5acf140ff6f1ddd0

                                            SHA256

                                            fef07dbb8a492f1ba36faa92089789c7805f1a611db52134078aa0d20bde188c

                                            SHA512

                                            a3059b68e425cf4d32851f44c9bb1c6d1bcb53eb094a6fde34440fcd41b9de8fc68aab7a59bcce6cae4aefb6b683b7064d2a5e560e0b25424bd9bc0bf3844aa7

                                          • \Users\Admin\AppData\Local\Temp\is-4R8TM.tmp\botva2.dll

                                            Filesize

                                            37KB

                                            MD5

                                            67965a5957a61867d661f05ae1f4773e

                                            SHA1

                                            f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

                                            SHA256

                                            450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

                                            SHA512

                                            c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

                                          • \Users\Admin\AppData\Local\Temp\is-4R8TM.tmp\botva2.dll

                                            Filesize

                                            37KB

                                            MD5

                                            67965a5957a61867d661f05ae1f4773e

                                            SHA1

                                            f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

                                            SHA256

                                            450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

                                            SHA512

                                            c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

                                          • \Users\Admin\AppData\Local\Temp\is-4R8TM.tmp\zbShieldUtils.dll

                                            Filesize

                                            2.0MB

                                            MD5

                                            e1f18a22199c6f6aa5d87b24e5b39ef1

                                            SHA1

                                            0dcd8f90b575f6f1d10d6789fe769fa26daafd0e

                                            SHA256

                                            62c56c8cf2ac6521ce047b73aa99b6d3952ca53f11d34b00e98d17674a2fc10d

                                            SHA512

                                            5a10a2f096adce6e7db3a40bc3ea3fd44d602966e606706ee5a780703f211de7f77656c79c296390baee1e008dc3ce327eaaf5d78bbae20108670c5bc809a190

                                          • memory/1128-525-0x000002CF647C0000-0x000002CF647E0000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/1128-577-0x000002CF75640000-0x000002CF75660000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/1128-595-0x000002CF75D70000-0x000002CF75D90000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/1128-613-0x000002CF76310000-0x000002CF76312000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1128-615-0x000002CF77F20000-0x000002CF77F22000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1128-620-0x000002CF77F40000-0x000002CF77F42000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1368-375-0x0000021BACDD0000-0x0000021BACDD2000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1368-372-0x0000021BA76F0000-0x0000021BA76F2000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1368-629-0x0000021BB05E0000-0x0000021BB05E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1368-333-0x0000021BA8320000-0x0000021BA8330000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/1368-351-0x0000021BA8B00000-0x0000021BA8B10000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/1368-370-0x0000021BA7690000-0x0000021BA7691000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1368-374-0x0000021BACDA0000-0x0000021BACDA2000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1368-633-0x0000021BB05F0000-0x0000021BB05F1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2120-413-0x000001FDEF1E0000-0x000001FDEF1E2000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/2120-409-0x000001F5DD0E0000-0x000001F5DD1E0000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2120-410-0x000001FDEF1A0000-0x000001FDEF1A2000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/2120-416-0x000001FDEF570000-0x000001FDEF572000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/2120-421-0x000001FDEF590000-0x000001FDEF592000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/3776-329-0x0000000000400000-0x00000000004E9000-memory.dmp

                                            Filesize

                                            932KB

                                          • memory/3776-387-0x0000000000400000-0x00000000004E9000-memory.dmp

                                            Filesize

                                            932KB

                                          • memory/3776-294-0x0000000000400000-0x00000000004E9000-memory.dmp

                                            Filesize

                                            932KB

                                          • memory/4744-385-0x0000000000400000-0x000000000070B000-memory.dmp

                                            Filesize

                                            3.0MB

                                          • memory/4744-330-0x0000000000400000-0x000000000070B000-memory.dmp

                                            Filesize

                                            3.0MB

                                          • memory/4744-318-0x0000000005610000-0x000000000561F000-memory.dmp

                                            Filesize

                                            60KB

                                          • memory/4744-331-0x0000000005610000-0x000000000561F000-memory.dmp

                                            Filesize

                                            60KB

                                          • memory/4744-299-0x0000000000DB0000-0x0000000000DB1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4744-332-0x0000000000DB0000-0x0000000000DB1000-memory.dmp

                                            Filesize

                                            4KB