Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 20:30

General

  • Target

    tmp.exe

  • Size

    423KB

  • MD5

    7fd2d4cf90f09e3c742766b2788e8a1f

  • SHA1

    707415c8ca9448193185c91ddeb54f32d43b41cb

  • SHA256

    73c1c8ae9461ae24e38f8ce58aa5d5837ddf773b46bfb43127f8417dac8034be

  • SHA512

    d01a88bfa3bb4d02f2af92d9639987a4e5c7f33868c3dc01225e8df07faa8763ad37a58854ad64cb56d224a75483126cb2d194cb6a691e5eae63aac3e2848d78

  • SSDEEP

    12288:SmLzrsyf07GVWWCNPLl3Muq++HFomaD2p:7Lzrz8K/CRLl8x+gFVp

Malware Config

Extracted

Family

vidar

Version

3.7

Botnet

e100c2b9c85dc9adbd913bfc4846b201

C2

https://steamcommunity.com/profiles/76561199501059503

https://t.me/mastersbots

Attributes
  • profile_id_v2

    e100c2b9c85dc9adbd913bfc4846b201

  • user_agent

    Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/112.0

Signatures

  • UAC bypass 3 TTPs 3 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 19 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • UAC bypass
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1248
    • C:\Program Files (x86)\LuckyWheel\LuckyWheel.exe
      "C:\Program Files (x86)\LuckyWheel\LuckyWheel.exe"
      2⤵
      • UAC bypass
      • Checks computer location settings
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4636
      • C:\Program Files (x86)\LuckyWheel\pub3.exe
        "C:\Program Files (x86)\LuckyWheel\pub3.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:4692
    • C:\Program Files (x86)\LuckyWheel\WindowsServices.exe
      "C:\Program Files (x86)\LuckyWheel\WindowsServices.exe"
      2⤵
      • Executes dropped EXE
      PID:724
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://zwoops.com/Escott/
      2⤵
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb286046f8,0x7ffb28604708,0x7ffb28604718
        3⤵
          PID:372
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1836744820536091802,13834996732211254993,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:2
          3⤵
            PID:4400
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,1836744820536091802,13834996732211254993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1280
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,1836744820536091802,13834996732211254993,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:8
            3⤵
              PID:2284
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1836744820536091802,13834996732211254993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:1
              3⤵
                PID:1672
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1836744820536091802,13834996732211254993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:1
                3⤵
                  PID:1968
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1836744820536091802,13834996732211254993,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:1
                  3⤵
                    PID:4876
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1836744820536091802,13834996732211254993,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:1
                    3⤵
                      PID:3212
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1836744820536091802,13834996732211254993,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:1
                      3⤵
                        PID:1876
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1836744820536091802,13834996732211254993,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6148 /prefetch:1
                        3⤵
                          PID:3512
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1836744820536091802,13834996732211254993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:8
                          3⤵
                            PID:2396
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                            3⤵
                            • Drops file in Program Files directory
                            PID:1608
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x130,0x204,0x228,0x11c,0x22c,0x7ff71b075460,0x7ff71b075470,0x7ff71b075480
                              4⤵
                                PID:1020
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1836744820536091802,13834996732211254993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:8
                              3⤵
                                PID:3664
                          • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                            "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{D5E8041D-920F-45e9-B8FB-B1DEB82C6E5E} -Embedding
                            1⤵
                              PID:4272
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3424
                              • C:\Program Files\Internet Explorer\iexplore.exe
                                "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
                                1⤵
                                • Modifies Internet Explorer settings
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SetWindowsHookEx
                                PID:1208
                                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1208 CREDAT:17410 /prefetch:2
                                  2⤵
                                  • Modifies Internet Explorer settings
                                  • Suspicious use of SetWindowsHookEx
                                  PID:4032

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files (x86)\LuckyWheel\ADSSTrayPopup.dll

                                Filesize

                                55KB

                                MD5

                                8c92e0740a0d72ee81f113ef625c984e

                                SHA1

                                ecf277620678359023e2a6f6842a117b666e4321

                                SHA256

                                091a8c575b8a3f6e88b682c9f9aa1388ff8ff0d03c15eb97bdb043901e1f639e

                                SHA512

                                35f978185ceb341beb79d36e50152fcc1e97f39eecacb7afdebf72f1838009cfb514dba3894493ab3ca01afa3408fb8d9b8779c9e279596faf2db7148ea37ac1

                              • C:\Program Files (x86)\LuckyWheel\LuckyWheel.exe

                                Filesize

                                71KB

                                MD5

                                6133f69f01608a83451e9b418348f1b0

                                SHA1

                                b2dc516d30d97a3221b8c726d5b619955305d3b5

                                SHA256

                                00a6465e2347daee6b6e00cf5d14740519a9520dfa0dafde076fdc2696414a14

                                SHA512

                                ab5d3f1af5ef71bdf5966d6bac13f0cfeea5b8e15d752daa742636db3e959a76e212f09ddca6baeda1d8954432693b3129892c43e177eb231d5042ee57d9d7fa

                              • C:\Program Files (x86)\LuckyWheel\LuckyWheel.exe

                                Filesize

                                71KB

                                MD5

                                6133f69f01608a83451e9b418348f1b0

                                SHA1

                                b2dc516d30d97a3221b8c726d5b619955305d3b5

                                SHA256

                                00a6465e2347daee6b6e00cf5d14740519a9520dfa0dafde076fdc2696414a14

                                SHA512

                                ab5d3f1af5ef71bdf5966d6bac13f0cfeea5b8e15d752daa742636db3e959a76e212f09ddca6baeda1d8954432693b3129892c43e177eb231d5042ee57d9d7fa

                              • C:\Program Files (x86)\LuckyWheel\Newtonsoft.Json.dll

                                Filesize

                                690KB

                                MD5

                                da5033255da26654935f7840def3c6a0

                                SHA1

                                f420e2935ec83c15fdf642c1d02e42fabe53a774

                                SHA256

                                7cbb3f382970b9b830529cb943f83ff35d817ba45f4d260b9330fe8f5095b277

                                SHA512

                                0dd5ea326d4073c5d340f8414f6fcd0a385d2a087e33a201433e36bfcb86f2321f8f805efaee8b7a3565dc5f2b8d7bed72c86db70fe545d792f70d5daca89d48

                              • C:\Program Files (x86)\LuckyWheel\WindowsServices.exe

                                Filesize

                                15KB

                                MD5

                                332fe4462b3c1fe60239772e81008311

                                SHA1

                                a3f4ef8eeb31e0e5b9877754d2e7d594b0d92d48

                                SHA256

                                d3ac8d5db7a6fd808795222d0cebce7e9115344a761dca09d92bc36ff2d38b07

                                SHA512

                                967313357aa43f75593afecf4cdc45499e6f50fbbe6a54c9257239e8ce1e2faa2d8e403c1cdc62186f1dbcba67811d62097f42fe044792f41dcbe092784346b2

                              • C:\Program Files (x86)\LuckyWheel\WindowsServices.exe

                                Filesize

                                15KB

                                MD5

                                332fe4462b3c1fe60239772e81008311

                                SHA1

                                a3f4ef8eeb31e0e5b9877754d2e7d594b0d92d48

                                SHA256

                                d3ac8d5db7a6fd808795222d0cebce7e9115344a761dca09d92bc36ff2d38b07

                                SHA512

                                967313357aa43f75593afecf4cdc45499e6f50fbbe6a54c9257239e8ce1e2faa2d8e403c1cdc62186f1dbcba67811d62097f42fe044792f41dcbe092784346b2

                              • C:\Program Files (x86)\LuckyWheel\pub3.exe

                                Filesize

                                3.7MB

                                MD5

                                9120afde816a0172af6bc617b775ba0d

                                SHA1

                                f349ba0090dbf1e1d15d07a3c644df57a7c31447

                                SHA256

                                cfaa965d4a0a0bafeeac69291511284e29747c0f67bdfbb264528f47fe0bca1a

                                SHA512

                                45caa50cc9c98e863f626bf32d0892d645b3e84c6f7e9583c537b09446bf45926772d3e1205ebec23677e077590c9887b3aa1d6f309b5a6e06770677d0e472f5

                              • C:\Program Files (x86)\LuckyWheel\pub3.exe

                                Filesize

                                3.7MB

                                MD5

                                9120afde816a0172af6bc617b775ba0d

                                SHA1

                                f349ba0090dbf1e1d15d07a3c644df57a7c31447

                                SHA256

                                cfaa965d4a0a0bafeeac69291511284e29747c0f67bdfbb264528f47fe0bca1a

                                SHA512

                                45caa50cc9c98e863f626bf32d0892d645b3e84c6f7e9583c537b09446bf45926772d3e1205ebec23677e077590c9887b3aa1d6f309b5a6e06770677d0e472f5

                              • C:\Program Files (x86)\LuckyWheel\pub3.exe

                                Filesize

                                3.7MB

                                MD5

                                9120afde816a0172af6bc617b775ba0d

                                SHA1

                                f349ba0090dbf1e1d15d07a3c644df57a7c31447

                                SHA256

                                cfaa965d4a0a0bafeeac69291511284e29747c0f67bdfbb264528f47fe0bca1a

                                SHA512

                                45caa50cc9c98e863f626bf32d0892d645b3e84c6f7e9583c537b09446bf45926772d3e1205ebec23677e077590c9887b3aa1d6f309b5a6e06770677d0e472f5

                              • C:\ProgramData\mozglue.dll

                                Filesize

                                593KB

                                MD5

                                c8fd9be83bc728cc04beffafc2907fe9

                                SHA1

                                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                SHA256

                                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                SHA512

                                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                              • C:\ProgramData\nss3.dll

                                Filesize

                                2.0MB

                                MD5

                                1cc453cdf74f31e4d913ff9c10acdde2

                                SHA1

                                6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                SHA256

                                ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                SHA512

                                dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

                                Filesize

                                2KB

                                MD5

                                b78db78e3dcbff2f4993153415214b1d

                                SHA1

                                48c8f741a8774c8d841513ca00e952a6402601b6

                                SHA256

                                31d7deb0b82d1351f2ca3f3d8ece5d25301295513ddb0dc44f68ce130771fa47

                                SHA512

                                6105a7f42e0b2d3134ef18d210162f7f63313cee8a6735e2d8dd5fca605f4419524c809f80a5e521eb465bac4bd601434b1297ef01283fa230fb02ce653b5dc3

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

                                Filesize

                                1KB

                                MD5

                                73a9c4dbb60ea94ff7c804507255b684

                                SHA1

                                5028e9a831ae95191bbe0bb946ebde9cdc07adfb

                                SHA256

                                d6e0d99d076d316a62d058a14d18fc5adf717a880ea3bd4ade3aff459b935d98

                                SHA512

                                e1e3d1eaedd29d44e030381c089b620e46cc74ff4bcbf08364efd0a574f16b7b8416b7f6c4198bdaf5f2b5c1d15590a29a626593f1cea1fa27ca7714faca70bf

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

                                Filesize

                                482B

                                MD5

                                57116cdf6cd31b42dd86b3ef9afb6a8e

                                SHA1

                                f803a3b72647b3a8bd9e5e7b4062d72f055c0782

                                SHA256

                                dd8d4268adc74cd19c754336a4734328bb11f292d5fad6cc110de07bd17d8929

                                SHA512

                                b4f6b4df7da38103deeb092a98b6cd937bcbf3e5c8dbfd5912f4bd94188f311cde1e315818e5e5aa27e5dab93cf26fea50c781b4b32351cab6950a079722dc4b

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

                                Filesize

                                486B

                                MD5

                                2be10a56eb4509ca5c3acf016db03ef4

                                SHA1

                                62a6862dcb69a37af56d6056884de06d282c03b0

                                SHA256

                                4396d80a9499ce8218a79bd556e9f81793b5b7bde270187e5687c54050c320bf

                                SHA512

                                5ea221612392a01eda6f5d7147ca922f365516d744916e66ab096a78749bdd16aab22539539c42de1b71b1aa99cc25fe054398a01642ce46e77d6dd73e639609

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                cd4f5fe0fc0ab6b6df866b9bfb9dd762

                                SHA1

                                a6aaed363cd5a7b6910e9b3296c0093b0ac94759

                                SHA256

                                3b803b53dbd3d592848fc66e5715f39f6bc02cbc95fb2452cd5822d98c6b8f81

                                SHA512

                                7072630ec28cf6a8d5b072555234b5150c1e952138e5cdc29435a6242fda4b4217b81fb57acae927d2b908fa06f36414cb3fab35110d63107141263e3bba9676

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                1d40312629d09d2420e992fdb8a78c1c

                                SHA1

                                903950d5ba9d64ec21c9f51264272ca8dfae9540

                                SHA256

                                1e7c6aa575c3ec46cd1fdf6df51063113d277012ed28f5f6b37aea95cd3a64ac

                                SHA512

                                a7073247ae95e451ed32ceeae91c6638192c15eaad718875c1272eff51c0564016d9f84690543f27df509a7d579de329d101fbf82fed7cbeb27af57393de24ac

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                Filesize

                                70KB

                                MD5

                                e5e3377341056643b0494b6842c0b544

                                SHA1

                                d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                SHA256

                                e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                SHA512

                                83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Microsoft Edge.lnk

                                Filesize

                                2KB

                                MD5

                                e086e02126a1f05c150fcd6e5f89effb

                                SHA1

                                6dff7b7f956ac65c7e97e703ba5acefce549607c

                                SHA256

                                bda9dcdf2f0edcdd0965818c28f33ac9f7079fc17ffcea332c43ecde9efc69ff

                                SHA512

                                b05f12ed53875afeb95da3ec1745e8f68aa57d3bce9bdaa811529e4ec1b83eab0f1e096290caf74c5a0fed29ee14e9807a7b35af938333faa2b1bb10a6a1db1a

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                111B

                                MD5

                                285252a2f6327d41eab203dc2f402c67

                                SHA1

                                acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                SHA256

                                5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                SHA512

                                11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                3KB

                                MD5

                                2c8ad054b21c368b4881fd8efe38ca8e

                                SHA1

                                0024039fee772b44af420fd33b2f6c9544c37e7d

                                SHA256

                                4cae47bbf855453322c7dc4a89d266ad0ef487dcad51395e032d7c3c8ebc4d48

                                SHA512

                                fee788f6cb82f3329f174c6ab1a10be6e27ceeb88d6c0ff179f3e3652dab3492bc037daac51d24d1a02210626edb0fa741ad302e25cc578444d9a551bbe86466

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                4KB

                                MD5

                                81f480ce70337b77fc8c9bb9ec1beb34

                                SHA1

                                3e6cebd23b3a44b80d7afe13aec3efbbe53b9586

                                SHA256

                                6092c8453640b01861b52778338b35399316996c99c9a9d2ec5b5131ebecd090

                                SHA512

                                b6a948f37c3a4d943497889ff071bd0eaf91fe68f74cc96263c2bcedf2f7a1be0aec489fb91eb9d9c900089d8d48cb76e34f0a82d7ed59001e672da457e2e65b

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                829a28743b178393760e29afc6d552ff

                                SHA1

                                ee15b367ccba3bd03e8f4bd2b6e6694479b2fef7

                                SHA256

                                5cf863a72476901da699920c48c455b82fd16ad2118abc50498dd3b154d37d8e

                                SHA512

                                4542aeb074de6e181ad862233e149c73e28605f0850b31c29da909f194388da9acc7a3446686e3812aa923623208fc5c2212e828d01467ba4307fafc8e4d06d6

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                ff30e79fa801793424a7b0e08bcb51db

                                SHA1

                                c9c9d682a75f3925e0c98208d590479447c5ba2a

                                SHA256

                                3a3f8f5977198fb1a9bd5f3e8f340fac78782335b1046c8a5c8f0093b1ddcfb3

                                SHA512

                                7689b3919507b90d1439cfd0a18e05be0c18c444484f9bf029da08ac7dd7cab8bd134b0304ec90cea6c2f568a842bad3b7daf0b011b3c8f9a79cf6e21c4f9460

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                Filesize

                                24KB

                                MD5

                                1e79203d0f70092bf25058099947d5c6

                                SHA1

                                20d5e2bd3a2ef807207bc3981bd5494c34839c0e

                                SHA256

                                decca6fa6de1f0dcc2b46a7c45e62d1754fda43b509d92393c628d56930851a6

                                SHA512

                                b06c5cb26083e2ef7a407be262f37d83d9fee4788e30a94ce258639f7c1fb2ccb4e37ca9b77e4fb30c0fa0a9e80f94a5b9719efd2499c87deafc87d260eb0568

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                Filesize

                                24KB

                                MD5

                                1463bf2a54e759c40d9ad64228bf7bec

                                SHA1

                                2286d0ac3cfa9f9ca6c0df60699af7c49008a41f

                                SHA256

                                9b4fd2eea856352d8fff054b51ea5d6141a540ca253a2e4dc28839bc92cbf4df

                                SHA512

                                33e0c223b45acac2622790dda4b59a98344a89094c41ffdb2531d7f1c0db86a0ea4f1885fea7c696816aa4ceab46de6837cc081cd8e63e3419d9fcb8c5a0eb66

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\CURRENT

                                Filesize

                                16B

                                MD5

                                46295cac801e5d4857d09837238a6394

                                SHA1

                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                SHA256

                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                SHA512

                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\MANIFEST-000001

                                Filesize

                                41B

                                MD5

                                5af87dfd673ba2115e2fcf5cfdb727ab

                                SHA1

                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                SHA256

                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                SHA512

                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                206702161f94c5cd39fadd03f4014d98

                                SHA1

                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                SHA256

                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                SHA512

                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                3KB

                                MD5

                                ea6594f238f03446ca37e5b7f16b7002

                                SHA1

                                70234e8e110b68446a15f7569c3ca2ba3705a638

                                SHA256

                                00e8b4565c5c25509e46af857a7ac84b947f8e079812bb11d1e9bee2054984a3

                                SHA512

                                9555820ae242d9cc80f222d6d450a3558091aaf546239dbee32b16e4b6de72a9052492418253fad95fc9f906b7499d3ebd99090308612404cbefcbe179c58f88

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                3KB

                                MD5

                                ea6594f238f03446ca37e5b7f16b7002

                                SHA1

                                70234e8e110b68446a15f7569c3ca2ba3705a638

                                SHA256

                                00e8b4565c5c25509e46af857a7ac84b947f8e079812bb11d1e9bee2054984a3

                                SHA512

                                9555820ae242d9cc80f222d6d450a3558091aaf546239dbee32b16e4b6de72a9052492418253fad95fc9f906b7499d3ebd99090308612404cbefcbe179c58f88

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                3KB

                                MD5

                                98a721a4c62277b780ae74197da7c542

                                SHA1

                                b2f1b2c1b8278e020eb0948d3f8b073336a03396

                                SHA256

                                f5f31911b05abc5f7af59baf5ec6287d67f7d63ff61d9c5866db980483d83490

                                SHA512

                                ad1dd2626084680d7805e3d20223b9ec6beb00b99be021bfc8751e146cdc582a83093eb259f8a656b1ecac9c2526ac4704cd50b0bfcbdceec1bc0db08ae45885

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                9KB

                                MD5

                                9fb5469c111cef886ff3460d691efe7d

                                SHA1

                                54b82c08c79fb330cdf4645b4ddd491d0a6a00aa

                                SHA256

                                9556e540f6b36a28e4d70e714c975e110cd3308e770936da135bfccc03d05458

                                SHA512

                                9c4510a6ea6bc000d01a90730e43b42856025d65fc45ea9770fc827584996ca6bde0a8c47c595b2876291eed350bfa28093a3f3ac82cedceb100b0be4337d801

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\TUIJN6ZA\headerBanner[5].htm

                                Filesize

                                15B

                                MD5

                                cf9752d163e399497aeab80ae3446246

                                SHA1

                                ea3b026dba8552e366b26fd78ee0b76465552d84

                                SHA256

                                3c2962d235bbc4f4e302c81eb7a2177d8dff2cdbe91b9494270d3ba83161d8f4

                                SHA512

                                513433cd330665d652649449ad8a75435721bde3919dcc2b6f8ce96b98cb692cea5bac5b6f1478b251dc59f883aa737a5152dc3458fe8722ae285fec9298bb59

                              • C:\Users\Admin\AppData\Local\Temp\nsz861E.tmp\KillProcDLL.dll

                                Filesize

                                4KB

                                MD5

                                99f345cf51b6c3c317d20a81acb11012

                                SHA1

                                b3d0355f527c536ea14a8ff51741c8739d66f727

                                SHA256

                                c2689ba1f66066afce85ca6457ecd36370be0fe351c58422e45efd0948655c93

                                SHA512

                                937aa75be84a74f2be3b54dc80fac02c17dad1915d924ef82ab354d2a49bc773ee6d801203c52686113783a7c7ea0e8ed8e673ba696d6d3212f7006e291ed2ef

                              • C:\Users\Admin\AppData\Local\Temp\nsz861E.tmp\KillProcDLL.dll

                                Filesize

                                4KB

                                MD5

                                99f345cf51b6c3c317d20a81acb11012

                                SHA1

                                b3d0355f527c536ea14a8ff51741c8739d66f727

                                SHA256

                                c2689ba1f66066afce85ca6457ecd36370be0fe351c58422e45efd0948655c93

                                SHA512

                                937aa75be84a74f2be3b54dc80fac02c17dad1915d924ef82ab354d2a49bc773ee6d801203c52686113783a7c7ea0e8ed8e673ba696d6d3212f7006e291ed2ef

                              • C:\Users\Admin\AppData\Local\Temp\nsz861E.tmp\KillProcDLL.dll

                                Filesize

                                4KB

                                MD5

                                99f345cf51b6c3c317d20a81acb11012

                                SHA1

                                b3d0355f527c536ea14a8ff51741c8739d66f727

                                SHA256

                                c2689ba1f66066afce85ca6457ecd36370be0fe351c58422e45efd0948655c93

                                SHA512

                                937aa75be84a74f2be3b54dc80fac02c17dad1915d924ef82ab354d2a49bc773ee6d801203c52686113783a7c7ea0e8ed8e673ba696d6d3212f7006e291ed2ef

                              • C:\Users\Admin\AppData\Local\Temp\nsz861E.tmp\KillProcDLL.dll

                                Filesize

                                4KB

                                MD5

                                99f345cf51b6c3c317d20a81acb11012

                                SHA1

                                b3d0355f527c536ea14a8ff51741c8739d66f727

                                SHA256

                                c2689ba1f66066afce85ca6457ecd36370be0fe351c58422e45efd0948655c93

                                SHA512

                                937aa75be84a74f2be3b54dc80fac02c17dad1915d924ef82ab354d2a49bc773ee6d801203c52686113783a7c7ea0e8ed8e673ba696d6d3212f7006e291ed2ef

                              • C:\Users\Admin\AppData\Local\Temp\nsz861E.tmp\KillProcDLL.dll

                                Filesize

                                4KB

                                MD5

                                99f345cf51b6c3c317d20a81acb11012

                                SHA1

                                b3d0355f527c536ea14a8ff51741c8739d66f727

                                SHA256

                                c2689ba1f66066afce85ca6457ecd36370be0fe351c58422e45efd0948655c93

                                SHA512

                                937aa75be84a74f2be3b54dc80fac02c17dad1915d924ef82ab354d2a49bc773ee6d801203c52686113783a7c7ea0e8ed8e673ba696d6d3212f7006e291ed2ef

                              • C:\Users\Admin\AppData\Local\Temp\nsz861E.tmp\Math.dll

                                Filesize

                                66KB

                                MD5

                                32f26ffa5c4d87c2074f95114bafe34b

                                SHA1

                                250d984cd9042d558b3e7a9f6835840cfe88de2e

                                SHA256

                                851ce1013420608baa53301de5302fbc1b772c5ac4be30df684d2ed9306ba7e7

                                SHA512

                                1c608c0c41cb467bc738957900cfe95466041849b64d94b6ae5865ff47cc4c592d258fe3610ed38122f842264097acba420abe805dcfb32d6ec2fa1ddc5bcfcc

                              • C:\Users\Admin\AppData\Local\Temp\nsz861E.tmp\Math.dll

                                Filesize

                                66KB

                                MD5

                                32f26ffa5c4d87c2074f95114bafe34b

                                SHA1

                                250d984cd9042d558b3e7a9f6835840cfe88de2e

                                SHA256

                                851ce1013420608baa53301de5302fbc1b772c5ac4be30df684d2ed9306ba7e7

                                SHA512

                                1c608c0c41cb467bc738957900cfe95466041849b64d94b6ae5865ff47cc4c592d258fe3610ed38122f842264097acba420abe805dcfb32d6ec2fa1ddc5bcfcc

                              • C:\Users\Admin\AppData\Local\Temp\nsz861E.tmp\Math.dll

                                Filesize

                                66KB

                                MD5

                                32f26ffa5c4d87c2074f95114bafe34b

                                SHA1

                                250d984cd9042d558b3e7a9f6835840cfe88de2e

                                SHA256

                                851ce1013420608baa53301de5302fbc1b772c5ac4be30df684d2ed9306ba7e7

                                SHA512

                                1c608c0c41cb467bc738957900cfe95466041849b64d94b6ae5865ff47cc4c592d258fe3610ed38122f842264097acba420abe805dcfb32d6ec2fa1ddc5bcfcc

                              • C:\Users\Admin\AppData\Local\Temp\nsz861E.tmp\System.dll

                                Filesize

                                11KB

                                MD5

                                cf85183b87314359488b850f9e97a698

                                SHA1

                                6b6c790037eec7ebea4d05590359cb4473f19aea

                                SHA256

                                3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac

                                SHA512

                                fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b

                              • C:\Users\Admin\AppData\Local\Temp\nsz861E.tmp\System.dll

                                Filesize

                                11KB

                                MD5

                                cf85183b87314359488b850f9e97a698

                                SHA1

                                6b6c790037eec7ebea4d05590359cb4473f19aea

                                SHA256

                                3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac

                                SHA512

                                fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b

                              • C:\Users\Admin\AppData\Local\Temp\nsz861E.tmp\UserInfo.dll

                                Filesize

                                4KB

                                MD5

                                d41cf0e4d88c60408f3d5b97f49d40c0

                                SHA1

                                1aa117b1ef998993f495833a08dd8cb12356be0f

                                SHA256

                                2dbdb3abd5652302254466aefa0f40048832f2a39fbb8a63c97fda8116021ff9

                                SHA512

                                35bf8f92d502a007838576c25aa25d1d7cc01a639df624cfb166085b51f1ba9cd4791c854f879e7b138492a3492365d88c0c5d7accfe5ac1e0e73685117f9209

                              • C:\Users\Admin\AppData\Local\Temp\nsz861E.tmp\UserInfo.dll

                                Filesize

                                4KB

                                MD5

                                d41cf0e4d88c60408f3d5b97f49d40c0

                                SHA1

                                1aa117b1ef998993f495833a08dd8cb12356be0f

                                SHA256

                                2dbdb3abd5652302254466aefa0f40048832f2a39fbb8a63c97fda8116021ff9

                                SHA512

                                35bf8f92d502a007838576c25aa25d1d7cc01a639df624cfb166085b51f1ba9cd4791c854f879e7b138492a3492365d88c0c5d7accfe5ac1e0e73685117f9209

                              • C:\Users\Admin\AppData\Local\Temp\nsz861E.tmp\UserInfo.dll

                                Filesize

                                4KB

                                MD5

                                d41cf0e4d88c60408f3d5b97f49d40c0

                                SHA1

                                1aa117b1ef998993f495833a08dd8cb12356be0f

                                SHA256

                                2dbdb3abd5652302254466aefa0f40048832f2a39fbb8a63c97fda8116021ff9

                                SHA512

                                35bf8f92d502a007838576c25aa25d1d7cc01a639df624cfb166085b51f1ba9cd4791c854f879e7b138492a3492365d88c0c5d7accfe5ac1e0e73685117f9209

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                Filesize

                                3KB

                                MD5

                                fcd48ef7180391e63b811415a1df8670

                                SHA1

                                338ada059efb278eed83f4b63e4dfffd278a0591

                                SHA256

                                694d1513c85cd4307d43380b8824a26f0ad0bedd8cbd28bebb8165b10828c0ac

                                SHA512

                                cb1b15e7c640098cfe79e639642028a89f609e6ab6e1d7bf0be0a7d753d05923219b45080c9914059bca814e38822c06e339636488ac8e774ce62a03eb99f2c2

                              • memory/724-187-0x0000020FBCA90000-0x0000020FBCAA0000-memory.dmp

                                Filesize

                                64KB

                              • memory/724-205-0x0000020FBCA90000-0x0000020FBCAA0000-memory.dmp

                                Filesize

                                64KB

                              • memory/724-185-0x0000020FA2640000-0x0000020FA2648000-memory.dmp

                                Filesize

                                32KB

                              • memory/1248-152-0x0000000002810000-0x0000000002813000-memory.dmp

                                Filesize

                                12KB

                              • memory/1248-153-0x0000000002810000-0x0000000002813000-memory.dmp

                                Filesize

                                12KB

                              • memory/1248-199-0x0000000002810000-0x0000000002813000-memory.dmp

                                Filesize

                                12KB

                              • memory/1248-160-0x0000000002810000-0x0000000002813000-memory.dmp

                                Filesize

                                12KB

                              • memory/1248-166-0x0000000002920000-0x000000000293A000-memory.dmp

                                Filesize

                                104KB

                              • memory/4636-306-0x000001E3A9640000-0x000001E3A9650000-memory.dmp

                                Filesize

                                64KB

                              • memory/4636-305-0x000001E3A9640000-0x000001E3A9650000-memory.dmp

                                Filesize

                                64KB

                              • memory/4636-179-0x000001E3A89E0000-0x000001E3A8A92000-memory.dmp

                                Filesize

                                712KB

                              • memory/4636-211-0x000001E3AA930000-0x000001E3AA952000-memory.dmp

                                Filesize

                                136KB

                              • memory/4636-233-0x000001E3A9640000-0x000001E3A9650000-memory.dmp

                                Filesize

                                64KB

                              • memory/4636-208-0x000001E3A9640000-0x000001E3A9650000-memory.dmp

                                Filesize

                                64KB

                              • memory/4636-207-0x000001E3A9640000-0x000001E3A9650000-memory.dmp

                                Filesize

                                64KB

                              • memory/4636-181-0x000001E38E860000-0x000001E38E86E000-memory.dmp

                                Filesize

                                56KB

                              • memory/4636-206-0x000001E3A9640000-0x000001E3A9650000-memory.dmp

                                Filesize

                                64KB

                              • memory/4636-177-0x000001E38E4F0000-0x000001E38E502000-memory.dmp

                                Filesize

                                72KB

                              • memory/4636-204-0x000001E3A9640000-0x000001E3A9650000-memory.dmp

                                Filesize

                                64KB

                              • memory/4636-249-0x000001E3A9640000-0x000001E3A9650000-memory.dmp

                                Filesize

                                64KB

                              • memory/4636-190-0x000001E3A9640000-0x000001E3A9650000-memory.dmp

                                Filesize

                                64KB

                              • memory/4636-189-0x000001E3A9640000-0x000001E3A9650000-memory.dmp

                                Filesize

                                64KB

                              • memory/4636-188-0x000001E3A9640000-0x000001E3A9650000-memory.dmp

                                Filesize

                                64KB

                              • memory/4636-266-0x000001EBAFE10000-0x000001EBB05B6000-memory.dmp

                                Filesize

                                7.6MB

                              • memory/4636-186-0x000001E3A9640000-0x000001E3A9650000-memory.dmp

                                Filesize

                                64KB

                              • memory/4692-352-0x0000000000400000-0x0000000000B28000-memory.dmp

                                Filesize

                                7.2MB

                              • memory/4692-400-0x0000000000400000-0x0000000000B28000-memory.dmp

                                Filesize

                                7.2MB

                              • memory/4692-223-0x0000000000400000-0x0000000000B28000-memory.dmp

                                Filesize

                                7.2MB

                              • memory/4692-230-0x0000000000400000-0x0000000000B28000-memory.dmp

                                Filesize

                                7.2MB

                              • memory/4692-273-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                Filesize

                                972KB

                              • memory/4692-240-0x0000000000400000-0x0000000000B28000-memory.dmp

                                Filesize

                                7.2MB

                              • memory/4692-300-0x0000000000400000-0x0000000000B28000-memory.dmp

                                Filesize

                                7.2MB