Resubmissions

05-09-2023 09:36

230905-llcqbseg77 10

12-04-2023 15:55

230412-tc7s4sdc52 10

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-04-2023 15:55

General

  • Target

    suspect_file_2.exe

  • Size

    360KB

  • MD5

    9ce01dfbf25dfea778e57d8274675d6f

  • SHA1

    1bd767beb5bc36b396ca6405748042640ad57526

  • SHA256

    5343947829609f69e84fe7e8172c38ee018ede3c9898d4895275f596ac54320d

  • SHA512

    d6ba89c1f221a94e3061bc4da896760d99935a7c766b8e4e30146266cf3356acd883835e75dbb86574bc869c83d381c8f63f23392101f6062bba4343af49978b

  • SSDEEP

    6144:4qZbqZToxIizLBZ6R56VkGM4ceLJ5vs5JGJceO/QCErIiuNAvwu:4qZb8oR3D6R5QHXZJy/Q50imAvB

Malware Config

Extracted

Path

C:\PerfLogs\_RECOVERY_+ydydo.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/DA58C9CD074DB0 2. http://tes543berda73i48fsdfsd.keratadze.at/DA58C9CD074DB0 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/DA58C9CD074DB0 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/DA58C9CD074DB0 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/DA58C9CD074DB0 http://tes543berda73i48fsdfsd.keratadze.at/DA58C9CD074DB0 http://tt54rfdjhb34rfbnknaerg.milerteddy.com/DA58C9CD074DB0 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/DA58C9CD074DB0
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/DA58C9CD074DB0

http://tes543berda73i48fsdfsd.keratadze.at/DA58C9CD074DB0

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/DA58C9CD074DB0

http://xlowfznrg4wf7dli.ONION/DA58C9CD074DB0

Extracted

Path

C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\_RECOVERY_+ydydo.html

Ransom Note
NOT YOUR LANGUAGE? USE Google Translate What happened to your files? of your files were protected by a strong encryption with AES More information about the encryption AES can be found https://en.wikipedia.org/wiki/AES at does this mean? his means that the structure and data within your files have been irrevocably changed, you will not be able work with them, read them or see them, it is the same thing as losing them forever, but with our help, you can restore them How did this happen? Especially for you, on our SERVER was generated the secret key All your files were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of YOUR FILES is only possible with the help of the private key and decrypt program which is on our Secret Server!!! at do I do? do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed If you really need your data, then we suggest you do not waste valuable time searching for other solutions becausen they do not exist. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/DA58C9CD074DB0 2 - http://tes543berda73i48fsdfsd.keratadze.at/DA58C9CD074DB0 3 - http://tt54rfdjhb34rfbnknaerg.milerteddy.com/DA58C9CD074DB0 If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser and wait for initialization. 3 - Type in the tor-browser address bar: xlowfznrg4wf7dli.onion/DA58C9CD074DB0 4 - Follow the instructions on the site. !!! IMPORTANT INFORMATION: Your Personal PAGES : http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/DA58C9CD074DB0 http://tes543berda73i48fsdfsd.keratadze.at/DA58C9CD074DB0 http://tt54rfdjhb34rfbnknaerg.milerteddy.com/DA58C9CD074DB0 Your Personal TOR-Browser page : xlowfznrg4wf7dli.onion/DA58C9CD074DB0 Your personal ID (if you open the site directly):
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/DA58C9CD074DB0

http://tes543berda73i48fsdfsd.keratadze.at/DA58C9CD074DB0

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/DA58C9CD074DB0

http://xlowfznrg4wf7dli.onion/DA58C9CD074DB0

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\suspect_file_2.exe
    "C:\Users\Admin\AppData\Local\Temp\suspect_file_2.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Windows\frckismuaivt.exe
      C:\Windows\frckismuaivt.exe
      2⤵
      • Modifies extensions of user files
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4780
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4452
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:3180
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1836
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb1ba146f8,0x7ffb1ba14708,0x7ffb1ba14718
          4⤵
            PID:1636
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,8753760719644012893,1965480842802679825,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:2
            4⤵
              PID:4316
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,8753760719644012893,1965480842802679825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:3
              4⤵
                PID:4956
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,8753760719644012893,1965480842802679825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:8
                4⤵
                  PID:2508
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8753760719644012893,1965480842802679825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:1
                  4⤵
                    PID:320
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8753760719644012893,1965480842802679825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:1
                    4⤵
                      PID:268
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8753760719644012893,1965480842802679825,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:1
                      4⤵
                        PID:4752
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8753760719644012893,1965480842802679825,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2696 /prefetch:1
                        4⤵
                          PID:2560
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,8753760719644012893,1965480842802679825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:8
                          4⤵
                            PID:3340
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                            4⤵
                              PID:4688
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff73b265460,0x7ff73b265470,0x7ff73b265480
                                5⤵
                                  PID:3388
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,8753760719644012893,1965480842802679825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:8
                                4⤵
                                  PID:4408
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8753760719644012893,1965480842802679825,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:1
                                  4⤵
                                    PID:1216
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8753760719644012893,1965480842802679825,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:1
                                    4⤵
                                      PID:4712
                                  • C:\Windows\System32\wbem\WMIC.exe
                                    "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                    3⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2100
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\FRCKIS~1.EXE
                                    3⤵
                                      PID:4412
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\SUSPEC~1.EXE
                                    2⤵
                                      PID:1908
                                  • C:\Windows\system32\vssvc.exe
                                    C:\Windows\system32\vssvc.exe
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4868
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:4604

                                    Network

                                    MITRE ATT&CK Enterprise v6

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\PerfLogs\_RECOVERY_+ydydo.html

                                      Filesize

                                      11KB

                                      MD5

                                      c7d96939005cc1c3d8909eab46166e6a

                                      SHA1

                                      d17c164acf20e1aac48797e43f6618c427d987b0

                                      SHA256

                                      2a8b3ef71b1fa630a2a0b389698e1f90a23c4a0fbd58cb5f4bbd6c9b488e885e

                                      SHA512

                                      3e3c60af5ec4590d9c91962ef6a85ad112362fb580411e46ab3d6d8eef236cd89897d519f18cc49d67d97c5925c3e82443e5f1dc27d054a7a81eec0c2550c8c3

                                    • C:\PerfLogs\_RECOVERY_+ydydo.png

                                      Filesize

                                      62KB

                                      MD5

                                      9e8de7ee50e40f2855beba7c66bd4ae1

                                      SHA1

                                      4c41be6973b3ceaed811ecf4016946bf6ced51bf

                                      SHA256

                                      be30ddc5a498a2a0894890a08914abb48d1cf0c6ec38ab20219954f6e4f8b141

                                      SHA512

                                      893553f2f672f6a1317f60fdf8d4e324a1bc13e575fd27132a0bb81ac3c3ab6bf6cd19fd024bbeae89a20da2f931107649eeb131b906f53849f185fbc9fa2d40

                                    • C:\PerfLogs\_RECOVERY_+ydydo.txt

                                      Filesize

                                      1KB

                                      MD5

                                      4329695d2d99ed60b26e3ffb6bcae527

                                      SHA1

                                      aa4bb2d6713b7a5aadbcec4699cd35dfff4463f8

                                      SHA256

                                      ed25daeabab6ce6586a39d55197065ce69dd32f165a76741bd9be5c1891eaf6c

                                      SHA512

                                      0265fa160545ba9a684e16fe288c7c61c29b53d5de97f6fb44258d4f377ffc6ddffa74f19aff4c4224703f5385e929cb6dde005d75b48e6a9f69077f29447486

                                    • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

                                      Filesize

                                      11KB

                                      MD5

                                      f61275f2ff2c7f1cd3b0981a4f187783

                                      SHA1

                                      0d09222621ca2a18e8d10d6de2dc3c42e4514bde

                                      SHA256

                                      75ba9ea87f43926b55dade8eafe9f711ce363e7e25ec8a73c58ddc21082c3450

                                      SHA512

                                      7720c8db75af8ac366e8fb1bce037515a6b33e1cc03cbf39ad1e3f614513a2ed35a5608057f1169d5cb3fd249179c42d26995f78a7b0fd027dbddf7747088cb2

                                    • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                      Filesize

                                      107KB

                                      MD5

                                      ae4b47aa895f83b5493bd31b11547668

                                      SHA1

                                      57fe999c32d03bf46c065b1b3ddeea080cb7f347

                                      SHA256

                                      f3d45a2bb387acbdcf81f832c888228c2b904e016be7c93d966f67e2f55102fc

                                      SHA512

                                      a099f7d543a14306b0ebe4c49681de4e6f4ca5df556bcd8fe534d7611b84febde498b87978273f97a759d58dfaa19cd77b03c6748279ebfb877dee3301ccd8b1

                                    • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME.txt

                                      Filesize

                                      173KB

                                      MD5

                                      7c33e79d56086f9f0a567601549c457e

                                      SHA1

                                      ca42fcbc8620f8b3bcc300ed7e21920adfda28bc

                                      SHA256

                                      ead35e087f251c439064defdc83f362a902a5e8f913f4be5b791e5ce98dad2a1

                                      SHA512

                                      1200ef5d80c9ccc66ec658307336ef07e859678b62205e24d9b093724f80adf7c1ff7d5e040d5b51ac89bf814e237e38fd7ffa5e4c21bcfe3518ccc4b73cdb19

                                    • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                      Filesize

                                      416B

                                      MD5

                                      613d501f1ec5604bb04ce54e6cc0c5b2

                                      SHA1

                                      4214a81778f6fc69eb9af296703089b7f2211888

                                      SHA256

                                      0a4ef4e1f4f36519dba33526c09057ffe93a64f0ec745aa6968c30ec6ce83ae5

                                      SHA512

                                      de406eccb766272372b7c0856ed306a0dfb2366c343fe5eb3ab6f025b9ba574de188258f1ec8fb6e80a4e3e39827bd3c10322d4b460fcbbf98dcb9e90540cf74

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\_RECOVERY_+ydydo.html

                                      Filesize

                                      11KB

                                      MD5

                                      c7d96939005cc1c3d8909eab46166e6a

                                      SHA1

                                      d17c164acf20e1aac48797e43f6618c427d987b0

                                      SHA256

                                      2a8b3ef71b1fa630a2a0b389698e1f90a23c4a0fbd58cb5f4bbd6c9b488e885e

                                      SHA512

                                      3e3c60af5ec4590d9c91962ef6a85ad112362fb580411e46ab3d6d8eef236cd89897d519f18cc49d67d97c5925c3e82443e5f1dc27d054a7a81eec0c2550c8c3

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\_RECOVERY_+ydydo.png

                                      Filesize

                                      62KB

                                      MD5

                                      9e8de7ee50e40f2855beba7c66bd4ae1

                                      SHA1

                                      4c41be6973b3ceaed811ecf4016946bf6ced51bf

                                      SHA256

                                      be30ddc5a498a2a0894890a08914abb48d1cf0c6ec38ab20219954f6e4f8b141

                                      SHA512

                                      893553f2f672f6a1317f60fdf8d4e324a1bc13e575fd27132a0bb81ac3c3ab6bf6cd19fd024bbeae89a20da2f931107649eeb131b906f53849f185fbc9fa2d40

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\_RECOVERY_+ydydo.txt

                                      Filesize

                                      1KB

                                      MD5

                                      4329695d2d99ed60b26e3ffb6bcae527

                                      SHA1

                                      aa4bb2d6713b7a5aadbcec4699cd35dfff4463f8

                                      SHA256

                                      ed25daeabab6ce6586a39d55197065ce69dd32f165a76741bd9be5c1891eaf6c

                                      SHA512

                                      0265fa160545ba9a684e16fe288c7c61c29b53d5de97f6fb44258d4f377ffc6ddffa74f19aff4c4224703f5385e929cb6dde005d75b48e6a9f69077f29447486

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      cd4f5fe0fc0ab6b6df866b9bfb9dd762

                                      SHA1

                                      a6aaed363cd5a7b6910e9b3296c0093b0ac94759

                                      SHA256

                                      3b803b53dbd3d592848fc66e5715f39f6bc02cbc95fb2452cd5822d98c6b8f81

                                      SHA512

                                      7072630ec28cf6a8d5b072555234b5150c1e952138e5cdc29435a6242fda4b4217b81fb57acae927d2b908fa06f36414cb3fab35110d63107141263e3bba9676

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      1d40312629d09d2420e992fdb8a78c1c

                                      SHA1

                                      903950d5ba9d64ec21c9f51264272ca8dfae9540

                                      SHA256

                                      1e7c6aa575c3ec46cd1fdf6df51063113d277012ed28f5f6b37aea95cd3a64ac

                                      SHA512

                                      a7073247ae95e451ed32ceeae91c6638192c15eaad718875c1272eff51c0564016d9f84690543f27df509a7d579de329d101fbf82fed7cbeb27af57393de24ac

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\_RECOVERY_+ydydo.html

                                      Filesize

                                      11KB

                                      MD5

                                      c7d96939005cc1c3d8909eab46166e6a

                                      SHA1

                                      d17c164acf20e1aac48797e43f6618c427d987b0

                                      SHA256

                                      2a8b3ef71b1fa630a2a0b389698e1f90a23c4a0fbd58cb5f4bbd6c9b488e885e

                                      SHA512

                                      3e3c60af5ec4590d9c91962ef6a85ad112362fb580411e46ab3d6d8eef236cd89897d519f18cc49d67d97c5925c3e82443e5f1dc27d054a7a81eec0c2550c8c3

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\_RECOVERY_+ydydo.png

                                      Filesize

                                      62KB

                                      MD5

                                      9e8de7ee50e40f2855beba7c66bd4ae1

                                      SHA1

                                      4c41be6973b3ceaed811ecf4016946bf6ced51bf

                                      SHA256

                                      be30ddc5a498a2a0894890a08914abb48d1cf0c6ec38ab20219954f6e4f8b141

                                      SHA512

                                      893553f2f672f6a1317f60fdf8d4e324a1bc13e575fd27132a0bb81ac3c3ab6bf6cd19fd024bbeae89a20da2f931107649eeb131b906f53849f185fbc9fa2d40

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\_RECOVERY_+ydydo.txt

                                      Filesize

                                      1KB

                                      MD5

                                      4329695d2d99ed60b26e3ffb6bcae527

                                      SHA1

                                      aa4bb2d6713b7a5aadbcec4699cd35dfff4463f8

                                      SHA256

                                      ed25daeabab6ce6586a39d55197065ce69dd32f165a76741bd9be5c1891eaf6c

                                      SHA512

                                      0265fa160545ba9a684e16fe288c7c61c29b53d5de97f6fb44258d4f377ffc6ddffa74f19aff4c4224703f5385e929cb6dde005d75b48e6a9f69077f29447486

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                      Filesize

                                      70KB

                                      MD5

                                      e5e3377341056643b0494b6842c0b544

                                      SHA1

                                      d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                      SHA256

                                      e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                      SHA512

                                      83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Microsoft Edge.lnk

                                      Filesize

                                      2KB

                                      MD5

                                      4d8cd17dda72c0bfc8f256b9441c628a

                                      SHA1

                                      26ef643b92983ff1c8a704242a8529dc97fcde4d

                                      SHA256

                                      6147c86583d00f391ff0f8a867007d4f6a550b63b2e6cc7e0ee9658b36b3dc0e

                                      SHA512

                                      b109c9abaf5d46883578e901454ee199138105dc619623d3bc5aa109306c3cdedd66a67bfc8492ddd91bb9984939e8008f65b41ab86c20a1c8c51e52aaeffcbf

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      111B

                                      MD5

                                      285252a2f6327d41eab203dc2f402c67

                                      SHA1

                                      acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                      SHA256

                                      5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                      SHA512

                                      11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      4KB

                                      MD5

                                      034948c7b9f40c902a4b15888f8a5587

                                      SHA1

                                      7d3e3b0278a9c541687c8a49b309fc8d3ac13992

                                      SHA256

                                      eea8c17660d7f859af948a8356e8005f6ad6ec4d9184f3bf5a494cf3c6a0370b

                                      SHA512

                                      78010084684f2cd953cd81bc309f24d4386ae98ac2d7349fb954bde9a7912c190eb0e5424edb8f4bdb321714f46b7f95542260361c7a4a171e26064dfc4a6a44

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      1efc074a792a91f9697e190d683c7cff

                                      SHA1

                                      b931da2ad921963092b8508f0ccda0f0a19e6619

                                      SHA256

                                      840729124209d0d6c5762d693249ebe5ef903c8baa9e0e689fa96a91b1a31ed2

                                      SHA512

                                      6f90eb8447ddc30970eebeb1e03bc76ecbb20437098f9248a987f36080fe236ce4d8c331e43d971206792f5a76b8ab771b67736da55d43a710c5e46e83c804f5

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                      Filesize

                                      24KB

                                      MD5

                                      1463bf2a54e759c40d9ad64228bf7bec

                                      SHA1

                                      2286d0ac3cfa9f9ca6c0df60699af7c49008a41f

                                      SHA256

                                      9b4fd2eea856352d8fff054b51ea5d6141a540ca253a2e4dc28839bc92cbf4df

                                      SHA512

                                      33e0c223b45acac2622790dda4b59a98344a89094c41ffdb2531d7f1c0db86a0ea4f1885fea7c696816aa4ceab46de6837cc081cd8e63e3419d9fcb8c5a0eb66

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      206702161f94c5cd39fadd03f4014d98

                                      SHA1

                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                      SHA256

                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                      SHA512

                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      46295cac801e5d4857d09837238a6394

                                      SHA1

                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                      SHA256

                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                      SHA512

                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001

                                      Filesize

                                      41B

                                      MD5

                                      5af87dfd673ba2115e2fcf5cfdb727ab

                                      SHA1

                                      d5b5bbf396dc291274584ef71f444f420b6056f1

                                      SHA256

                                      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                      SHA512

                                      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      439cb60788a343735a211424c973cbd2

                                      SHA1

                                      9ad5e01eac7e0f8c2d060a3aa3e807297a7e8556

                                      SHA256

                                      ee2a322b7b3b084cdeeb7782bca678daffa09646f9f5918ecf117ffd15903968

                                      SHA512

                                      553556f69e3e070a1d888f75dfe3e8811175c04ff6b586128e536662141155c83a7ac235ff49d0d8f5ca42fdaa8b6a8585e70cbc6e3cbf0c578a08b0a7b34152

                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133213997043705127.txt

                                      Filesize

                                      47KB

                                      MD5

                                      51c5f39e20eda8f70d4e7cf0549dfa49

                                      SHA1

                                      bd99f27c438d04d76cb3de77b88085b068320b78

                                      SHA256

                                      dc21c928d20290ba95bd848703ea89672df872a7ef07edd007d391b86eb062b2

                                      SHA512

                                      50d0e4b20b87aaebe045301850c9f476b067a636b6fb42d965e505554e78f00a39425074db6d4058a0a4659689e2d6a9fbaa2b9e9176ce04ac6ead81678d3d5f

                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133214008255402494.txt

                                      Filesize

                                      75KB

                                      MD5

                                      ccf71cb7a9cde9408a7b5a2081da5099

                                      SHA1

                                      5fe3b25fef0f4e292daf290e8a82fffbd3eafc61

                                      SHA256

                                      63b615f0aab3138168cadd76ffd0b9f9a367f26d0cd3719c9a347551d0ac7efa

                                      SHA512

                                      3fadecef267abeb41187eccf226e39f3cce52984afb393649aa29ace7d8e1cbf1b9a363e8681e3d512b2d11b8721c616cb895329be9daaeb22e8f74c3b412a59

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\_RECOVERY_+ydydo.html

                                      Filesize

                                      11KB

                                      MD5

                                      c7d96939005cc1c3d8909eab46166e6a

                                      SHA1

                                      d17c164acf20e1aac48797e43f6618c427d987b0

                                      SHA256

                                      2a8b3ef71b1fa630a2a0b389698e1f90a23c4a0fbd58cb5f4bbd6c9b488e885e

                                      SHA512

                                      3e3c60af5ec4590d9c91962ef6a85ad112362fb580411e46ab3d6d8eef236cd89897d519f18cc49d67d97c5925c3e82443e5f1dc27d054a7a81eec0c2550c8c3

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\_RECOVERY_+ydydo.png

                                      Filesize

                                      62KB

                                      MD5

                                      9e8de7ee50e40f2855beba7c66bd4ae1

                                      SHA1

                                      4c41be6973b3ceaed811ecf4016946bf6ced51bf

                                      SHA256

                                      be30ddc5a498a2a0894890a08914abb48d1cf0c6ec38ab20219954f6e4f8b141

                                      SHA512

                                      893553f2f672f6a1317f60fdf8d4e324a1bc13e575fd27132a0bb81ac3c3ab6bf6cd19fd024bbeae89a20da2f931107649eeb131b906f53849f185fbc9fa2d40

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\_RECOVERY_+ydydo.txt

                                      Filesize

                                      1KB

                                      MD5

                                      4329695d2d99ed60b26e3ffb6bcae527

                                      SHA1

                                      aa4bb2d6713b7a5aadbcec4699cd35dfff4463f8

                                      SHA256

                                      ed25daeabab6ce6586a39d55197065ce69dd32f165a76741bd9be5c1891eaf6c

                                      SHA512

                                      0265fa160545ba9a684e16fe288c7c61c29b53d5de97f6fb44258d4f377ffc6ddffa74f19aff4c4224703f5385e929cb6dde005d75b48e6a9f69077f29447486

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\_RECOVERY_+ydydo.html

                                      Filesize

                                      11KB

                                      MD5

                                      c7d96939005cc1c3d8909eab46166e6a

                                      SHA1

                                      d17c164acf20e1aac48797e43f6618c427d987b0

                                      SHA256

                                      2a8b3ef71b1fa630a2a0b389698e1f90a23c4a0fbd58cb5f4bbd6c9b488e885e

                                      SHA512

                                      3e3c60af5ec4590d9c91962ef6a85ad112362fb580411e46ab3d6d8eef236cd89897d519f18cc49d67d97c5925c3e82443e5f1dc27d054a7a81eec0c2550c8c3

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\_RECOVERY_+ydydo.png

                                      Filesize

                                      62KB

                                      MD5

                                      9e8de7ee50e40f2855beba7c66bd4ae1

                                      SHA1

                                      4c41be6973b3ceaed811ecf4016946bf6ced51bf

                                      SHA256

                                      be30ddc5a498a2a0894890a08914abb48d1cf0c6ec38ab20219954f6e4f8b141

                                      SHA512

                                      893553f2f672f6a1317f60fdf8d4e324a1bc13e575fd27132a0bb81ac3c3ab6bf6cd19fd024bbeae89a20da2f931107649eeb131b906f53849f185fbc9fa2d40

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\_RECOVERY_+ydydo.txt

                                      Filesize

                                      1KB

                                      MD5

                                      4329695d2d99ed60b26e3ffb6bcae527

                                      SHA1

                                      aa4bb2d6713b7a5aadbcec4699cd35dfff4463f8

                                      SHA256

                                      ed25daeabab6ce6586a39d55197065ce69dd32f165a76741bd9be5c1891eaf6c

                                      SHA512

                                      0265fa160545ba9a684e16fe288c7c61c29b53d5de97f6fb44258d4f377ffc6ddffa74f19aff4c4224703f5385e929cb6dde005d75b48e6a9f69077f29447486

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\_RECOVERY_+ydydo.html

                                      Filesize

                                      11KB

                                      MD5

                                      c7d96939005cc1c3d8909eab46166e6a

                                      SHA1

                                      d17c164acf20e1aac48797e43f6618c427d987b0

                                      SHA256

                                      2a8b3ef71b1fa630a2a0b389698e1f90a23c4a0fbd58cb5f4bbd6c9b488e885e

                                      SHA512

                                      3e3c60af5ec4590d9c91962ef6a85ad112362fb580411e46ab3d6d8eef236cd89897d519f18cc49d67d97c5925c3e82443e5f1dc27d054a7a81eec0c2550c8c3

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\_RECOVERY_+ydydo.png

                                      Filesize

                                      62KB

                                      MD5

                                      9e8de7ee50e40f2855beba7c66bd4ae1

                                      SHA1

                                      4c41be6973b3ceaed811ecf4016946bf6ced51bf

                                      SHA256

                                      be30ddc5a498a2a0894890a08914abb48d1cf0c6ec38ab20219954f6e4f8b141

                                      SHA512

                                      893553f2f672f6a1317f60fdf8d4e324a1bc13e575fd27132a0bb81ac3c3ab6bf6cd19fd024bbeae89a20da2f931107649eeb131b906f53849f185fbc9fa2d40

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\_RECOVERY_+ydydo.txt

                                      Filesize

                                      1KB

                                      MD5

                                      4329695d2d99ed60b26e3ffb6bcae527

                                      SHA1

                                      aa4bb2d6713b7a5aadbcec4699cd35dfff4463f8

                                      SHA256

                                      ed25daeabab6ce6586a39d55197065ce69dd32f165a76741bd9be5c1891eaf6c

                                      SHA512

                                      0265fa160545ba9a684e16fe288c7c61c29b53d5de97f6fb44258d4f377ffc6ddffa74f19aff4c4224703f5385e929cb6dde005d75b48e6a9f69077f29447486

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                      Filesize

                                      3KB

                                      MD5

                                      6871b625645e6d929203ae1d95b5b488

                                      SHA1

                                      0ac2b79f5a121723e139e1bbca7afc5eb994e309

                                      SHA256

                                      03e5c234b9074c4e23f0777003acfda54d788119973f9778e4bbad8cb16c3185

                                      SHA512

                                      4a78126885d87fd1155eb9e6974cd25858aa647194d83c42e4b49f94c06122665af93ee66424bad12d0d680b9f2b32fbca03090be84f6d237370e2c8e21e464f

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                      Filesize

                                      3KB

                                      MD5

                                      15666f0b47c7d9b0172bd42a1298e9b4

                                      SHA1

                                      1aad8ba97ec249d29321d3b871dc18e6a94485d0

                                      SHA256

                                      2fba4ea7bac6abdcfb4ebe0f747ca3ce3383c86d9651f32ad467697ef30e98b8

                                      SHA512

                                      19e7fa1c8111af9cd3f3ed88bbfc790dea8da783488c3b8eb219d59967eb4df6e9aead71c408b2474d453f8346da564f691547627e46dd737ecae4c74a9b3ccc

                                    • C:\Users\Admin\Desktop\RECOVERY.HTM

                                      Filesize

                                      11KB

                                      MD5

                                      c7d96939005cc1c3d8909eab46166e6a

                                      SHA1

                                      d17c164acf20e1aac48797e43f6618c427d987b0

                                      SHA256

                                      2a8b3ef71b1fa630a2a0b389698e1f90a23c4a0fbd58cb5f4bbd6c9b488e885e

                                      SHA512

                                      3e3c60af5ec4590d9c91962ef6a85ad112362fb580411e46ab3d6d8eef236cd89897d519f18cc49d67d97c5925c3e82443e5f1dc27d054a7a81eec0c2550c8c3

                                    • C:\Users\Admin\Desktop\RECOVERY.TXT

                                      Filesize

                                      1KB

                                      MD5

                                      4329695d2d99ed60b26e3ffb6bcae527

                                      SHA1

                                      aa4bb2d6713b7a5aadbcec4699cd35dfff4463f8

                                      SHA256

                                      ed25daeabab6ce6586a39d55197065ce69dd32f165a76741bd9be5c1891eaf6c

                                      SHA512

                                      0265fa160545ba9a684e16fe288c7c61c29b53d5de97f6fb44258d4f377ffc6ddffa74f19aff4c4224703f5385e929cb6dde005d75b48e6a9f69077f29447486

                                    • C:\Windows\frckismuaivt.exe

                                      Filesize

                                      360KB

                                      MD5

                                      9ce01dfbf25dfea778e57d8274675d6f

                                      SHA1

                                      1bd767beb5bc36b396ca6405748042640ad57526

                                      SHA256

                                      5343947829609f69e84fe7e8172c38ee018ede3c9898d4895275f596ac54320d

                                      SHA512

                                      d6ba89c1f221a94e3061bc4da896760d99935a7c766b8e4e30146266cf3356acd883835e75dbb86574bc869c83d381c8f63f23392101f6062bba4343af49978b

                                    • C:\Windows\frckismuaivt.exe

                                      Filesize

                                      360KB

                                      MD5

                                      9ce01dfbf25dfea778e57d8274675d6f

                                      SHA1

                                      1bd767beb5bc36b396ca6405748042640ad57526

                                      SHA256

                                      5343947829609f69e84fe7e8172c38ee018ede3c9898d4895275f596ac54320d

                                      SHA512

                                      d6ba89c1f221a94e3061bc4da896760d99935a7c766b8e4e30146266cf3356acd883835e75dbb86574bc869c83d381c8f63f23392101f6062bba4343af49978b

                                    • \??\pipe\LOCAL\crashpad_1836_ZDXZXWGGCHBPYXWW

                                      MD5

                                      d41d8cd98f00b204e9800998ecf8427e

                                      SHA1

                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                      SHA256

                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                      SHA512

                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                    • memory/4680-136-0x0000000000A80000-0x0000000000B05000-memory.dmp

                                      Filesize

                                      532KB

                                    • memory/4680-146-0x0000000000400000-0x000000000049E000-memory.dmp

                                      Filesize

                                      632KB

                                    • memory/4680-133-0x0000000000400000-0x000000000049E000-memory.dmp

                                      Filesize

                                      632KB

                                    • memory/4780-6590-0x0000000000400000-0x000000000049E000-memory.dmp

                                      Filesize

                                      632KB

                                    • memory/4780-7787-0x0000000000400000-0x000000000049E000-memory.dmp

                                      Filesize

                                      632KB

                                    • memory/4780-3143-0x0000000000400000-0x000000000049E000-memory.dmp

                                      Filesize

                                      632KB

                                    • memory/4780-5045-0x0000000000400000-0x000000000049E000-memory.dmp

                                      Filesize

                                      632KB

                                    • memory/4780-1829-0x0000000000400000-0x000000000049E000-memory.dmp

                                      Filesize

                                      632KB

                                    • memory/4780-1051-0x0000000000400000-0x000000000049E000-memory.dmp

                                      Filesize

                                      632KB

                                    • memory/4780-685-0x0000000000400000-0x000000000049E000-memory.dmp

                                      Filesize

                                      632KB

                                    • memory/4780-4223-0x0000000000400000-0x000000000049E000-memory.dmp

                                      Filesize

                                      632KB

                                    • memory/4780-145-0x0000000002130000-0x00000000021B5000-memory.dmp

                                      Filesize

                                      532KB

                                    • memory/4780-8719-0x0000000000400000-0x000000000049E000-memory.dmp

                                      Filesize

                                      632KB

                                    • memory/4780-9489-0x0000000000400000-0x000000000049E000-memory.dmp

                                      Filesize

                                      632KB

                                    • memory/4780-10361-0x0000000000400000-0x000000000049E000-memory.dmp

                                      Filesize

                                      632KB

                                    • memory/4780-10633-0x0000000000400000-0x000000000049E000-memory.dmp

                                      Filesize

                                      632KB

                                    • memory/4780-10647-0x0000000000400000-0x000000000049E000-memory.dmp

                                      Filesize

                                      632KB