Analysis

  • max time kernel
    150s
  • max time network
    160s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08-04-2024 12:09

General

  • Target

    XClient.exe

  • Size

    84KB

  • MD5

    0b163732fcb85953d90e43880aa7e84f

  • SHA1

    de6d7a236ea98c489a91a3d75e0343061bbe832f

  • SHA256

    86cff0dbed58c5f05cc6ed8fcc6035f19e95803c2f44c879491d57c658b1694f

  • SHA512

    1d75eab9c69c1f6720b096d3337a155cc8821eda4e57ae01d4b1118d20be3141561aa23545cf8b823b9629ded73a33744ea877b8ac0d65a4d0d8aaac4b35de21

  • SSDEEP

    1536:39rC3KBSId2ckJb3GJ+raqLubhwVf3S6GYO226fUKMUJUWmdSs:Nrmod2ckV3GJ+erbcqYO2VUPUJUws

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:22569

147.185.221.19:22569

Attributes
  • Install_directory

    %Temp%

  • install_file

    java.exe

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\!Please Read Me!.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1 Next, please find the decrypt software on your desktop, an executable file named "!WannaDecryptor!.exe". If it does not exsit, download the software from the address below. (You may need to disable your antivirus for a while.) rar password: wcry123 Run and follow the instructions! �
Wallets

15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1

Signatures

  • Contains code to disable Windows Defender 3 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 2 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Downloads MZ/PE file
  • Drops startup file 4 IoCs
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 16 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 4 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:704
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
        2⤵
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:712
        • C:\Windows\system32\sc.exe
          "C:\Windows\system32\sc.exe" qc windefend
          3⤵
          • Launches sc.exe
          PID:3428
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
          3⤵
            PID:3764
          • C:\Windows\system32\whoami.exe
            "C:\Windows\system32\whoami.exe" /groups
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:5028
          • C:\Windows\system32\net1.exe
            "C:\Windows\system32\net1.exe" stop windefend
            3⤵
              PID:2032
            • C:\Windows\system32\sc.exe
              "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
              3⤵
              • Launches sc.exe
              PID:4824
        • C:\Users\Admin\AppData\Local\Temp\XClient.exe
          "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
          1⤵
          • Modifies Windows Defender Real-time Protection settings
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Drops startup file
          • Adds Run key to start application
          • Drops desktop.ini file(s)
          • Sets desktop wallpaper using registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4080
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1356
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5032
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\java.exe'
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3544
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'java.exe'
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4888
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "java" /tr "C:\Users\Admin\AppData\Local\Temp\java.exe"
            2⤵
            • Creates scheduled task(s)
            PID:996
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" Get-MpPreference -verbose
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1556
          • C:\Windows\system32\sc.exe
            "C:\Windows\system32\sc.exe" qc windefend
            2⤵
            • Launches sc.exe
            PID:1292
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
            2⤵
              PID:3728
            • C:\Windows\system32\whoami.exe
              "C:\Windows\system32\whoami.exe" /groups
              2⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4760
            • C:\Windows\system32\net1.exe
              "C:\Windows\system32\net1.exe" start TrustedInstaller
              2⤵
                PID:2876
              • C:\Windows\system32\net1.exe
                "C:\Windows\system32\net1.exe" start lsass
                2⤵
                  PID:788
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\How To Decrypt My Files.html
                  2⤵
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:996
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbe6453cb8,0x7ffbe6453cc8,0x7ffbe6453cd8
                    3⤵
                      PID:1340
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1796,10243369566979673254,8087796265497535079,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:2
                      3⤵
                        PID:3208
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1796,10243369566979673254,8087796265497535079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:3
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5008
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1796,10243369566979673254,8087796265497535079,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2580 /prefetch:8
                        3⤵
                          PID:3108
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,10243369566979673254,8087796265497535079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:1
                          3⤵
                            PID:1084
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,10243369566979673254,8087796265497535079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1
                            3⤵
                              PID:2236
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,10243369566979673254,8087796265497535079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2108 /prefetch:1
                              3⤵
                                PID:732
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,10243369566979673254,8087796265497535079,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:1
                                3⤵
                                  PID:2580
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1796,10243369566979673254,8087796265497535079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:8
                                  3⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4592
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,10243369566979673254,8087796265497535079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
                                  3⤵
                                    PID:1424
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1796,10243369566979673254,8087796265497535079,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:1
                                    3⤵
                                      PID:3908
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1796,10243369566979673254,8087796265497535079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:8
                                      3⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1992
                                  • C:\Users\Admin\AppData\Local\Temp\bgijzj.exe
                                    "C:\Users\Admin\AppData\Local\Temp\bgijzj.exe"
                                    2⤵
                                    • Drops startup file
                                    • Executes dropped EXE
                                    • Adds Run key to start application
                                    • Suspicious use of SetWindowsHookEx
                                    PID:3256
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c 246341712578348.bat
                                      3⤵
                                        PID:1988
                                        • C:\Windows\SysWOW64\cscript.exe
                                          cscript //nologo c.vbs
                                          4⤵
                                            PID:1536
                                        • C:\Users\Admin\AppData\Local\Temp\!WannaDecryptor!.exe
                                          !WannaDecryptor!.exe f
                                          3⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:980
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /f /im MSExchange*
                                          3⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3372
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /f /im Microsoft.Exchange.*
                                          3⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:232
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /f /im sqlserver.exe
                                          3⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3556
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /f /im sqlwriter.exe
                                          3⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2364
                                        • C:\Users\Admin\AppData\Local\Temp\!WannaDecryptor!.exe
                                          !WannaDecryptor!.exe c
                                          3⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2960
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd.exe /c start /b !WannaDecryptor!.exe v
                                          3⤵
                                            PID:4724
                                            • C:\Users\Admin\AppData\Local\Temp\!WannaDecryptor!.exe
                                              !WannaDecryptor!.exe v
                                              4⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:4768
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet
                                                5⤵
                                                  PID:632
                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                    wmic shadowcopy delete
                                                    6⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:780
                                            • C:\Users\Admin\AppData\Local\Temp\!WannaDecryptor!.exe
                                              !WannaDecryptor!.exe
                                              3⤵
                                              • Executes dropped EXE
                                              • Sets desktop wallpaper using registry
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2212
                                        • C:\Users\Admin\AppData\Local\Temp\java.exe
                                          C:\Users\Admin\AppData\Local\Temp\java.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4536
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:2692
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:2300
                                            • C:\Users\Admin\AppData\Local\Temp\java.exe
                                              C:\Users\Admin\AppData\Local\Temp\java.exe
                                              1⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2608
                                            • C:\Windows\system32\vssvc.exe
                                              C:\Windows\system32\vssvc.exe
                                              1⤵
                                                PID:1896

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\java.exe.log

                                                Filesize

                                                654B

                                                MD5

                                                2cbbb74b7da1f720b48ed31085cbd5b8

                                                SHA1

                                                79caa9a3ea8abe1b9c4326c3633da64a5f724964

                                                SHA256

                                                e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3

                                                SHA512

                                                ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                Filesize

                                                2KB

                                                MD5

                                                5ba388a6597d5e09191c2c88d2fdf598

                                                SHA1

                                                13516f8ec5a99298f6952438055c39330feae5d8

                                                SHA256

                                                e6b6223094e8fc598ad12b3849e49f03a141ccd21e0eaa336f81791ad8443eca

                                                SHA512

                                                ead2a2b5a1c2fad70c1cf570b2c9bfcb7364dd9f257a834eb819e55b8fee78e3f191f93044f07d51c259ca77a90ee8530f9204cbae080fba1d5705e1209f5b19

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                88e9aaca62aa2aed293699f139d7e7e1

                                                SHA1

                                                09d9ccfbdff9680366291d5d1bc311b0b56a05e9

                                                SHA256

                                                27dcdb1cddab5d56ac53cff93489038de93f61b5504f8595b1eb2d3124bbc12c

                                                SHA512

                                                d90dabe34504dde422f5f6dec87851af8f4849f521759a768dfa0a38f50827b099dfde256d8f8467460c289bdb168358b2678772b8b49418c23b882ba21d4793

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                341f6b71eb8fcb1e52a749a673b2819c

                                                SHA1

                                                6c81b6acb3ce5f64180cb58a6aae927b882f4109

                                                SHA256

                                                57934852f04cef38bb4acbe4407f707f137fada0c36bab71b2cdfd58cc030a29

                                                SHA512

                                                57ecaa087bc5626752f89501c635a2da8404dbda89260895910a9cc31203e15095eba2e1ce9eee1481f02a43d0df77b75cb9b0d77a3bc3b894fdd1cf0f6ce6f9

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                Filesize

                                                111B

                                                MD5

                                                807419ca9a4734feaf8d8563a003b048

                                                SHA1

                                                a723c7d60a65886ffa068711f1e900ccc85922a6

                                                SHA256

                                                aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                                SHA512

                                                f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                5KB

                                                MD5

                                                6f0536b73e56922c27ff87642f10563a

                                                SHA1

                                                5f4177dc8d8a8f3c9c4a81f33895af79429d6882

                                                SHA256

                                                82d449a13d5bc27b958165349386375a2bec1bc94b247e8ded690c85cdfdc9b8

                                                SHA512

                                                470866f8d503e5cda7d8753bdb2ef2cb5bd237a24ce63d7224f9d161591ddfbefc21da6a670b21cfa287f1deecf6cc21fb169633ebfc262192d5c7cd8183e56e

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                5KB

                                                MD5

                                                e82f354310a0c7eb5eeefe6f1120dae7

                                                SHA1

                                                b27820e201451d39bd741fb9c97d3ecf34410075

                                                SHA256

                                                5b4cc5d157849bd0408e1040c40d7c7fcd7ce297a0683473e6d68d5cb888600f

                                                SHA512

                                                b46b66791e30e1ef7453779a3e8cb0ca589fa0ee579e64cfe4820da3845666c3374f5cc8d28d12b6b08d9ce68aeed7b1021b7de3564c35623eccf1ec3ecc33b1

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                46295cac801e5d4857d09837238a6394

                                                SHA1

                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                SHA256

                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                SHA512

                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                206702161f94c5cd39fadd03f4014d98

                                                SHA1

                                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                SHA256

                                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                SHA512

                                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\heavy_ad_intervention_opt_out.db

                                                Filesize

                                                16KB

                                                MD5

                                                9a8e0fb6cf4941534771c38bb54a76be

                                                SHA1

                                                92d45ac2cc921f6733e68b454dc171426ec43c1c

                                                SHA256

                                                9ee9211a57c3f6fa211fe0323fa8cd521e7cbffcd8ff0896645a45795dc472be

                                                SHA512

                                                12ed22537dcc79d53f6c7d39e92a38f8fea076d793198928f5b7a5dd1234d50a3c0b4815632f3fadf8bc4ef0499773d22bd83f961d2d0ffd8afacf471bd3a5ae

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                95b33344c590a99ac8918c65005757e6

                                                SHA1

                                                f695ea88cc49f092e5820beffdc131ad248fbd03

                                                SHA256

                                                ef8be91cf086bea7e76d140433ba13c679e656e4fbb4146ba234c4b74fbe8d81

                                                SHA512

                                                df61edfdd975eab4770f8fa415a41dd8725e08d675d0ffdef047809c8cbf2d01718cc15904847205f7b8e372940d010767fbfe7b1608b061c6e5969ef04a2e00

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                0a3a834d72c335558710311cd9c9c7a4

                                                SHA1

                                                6565c6910e84c956a250e21f5e5e8654e5ee1ed3

                                                SHA256

                                                6844d080fac137c1af3bd5db13de2d238537633f3abdd020d7e93eb8e180d4cd

                                                SHA512

                                                98d7103b38e769fd28460b1b5827b44a7a68f3d5f6f35bbf85fab0a8ceab67f3f1aab7cb7d87f26f769274c824aef22469abd3888d0a44ec1cf8df1b3e10f51e

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                944B

                                                MD5

                                                1189a72e42e2321edf1ed3a8d5568687

                                                SHA1

                                                a2142fc754d6830de107d9d46f398483156f16a6

                                                SHA256

                                                009aee0a5f2d25ed79160e75cde58722def11663334ed20283e3afca32f971ea

                                                SHA512

                                                b1eb9b7aa7a57d0acec93b8152229b1f274a8d1b8f19133513486587f39b0636a9df89ddc6c2013e001d831f2b23cd0bb0fc084131824ea8e1dff134cd6d4f29

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                944B

                                                MD5

                                                283958a716803c6e613f6075bf56e005

                                                SHA1

                                                5a3258c7e9e33f0a7f1949de7c2025b13e9d0e99

                                                SHA256

                                                a179b8f9baf30b57d17bf2f543a3d9d276e1db0562cc842c5380d24664113c31

                                                SHA512

                                                691cc2281c8c524aa9a0d2524e4a834ce5d3fe56ea2ae20757630d46e9429aaeefc121d37abc92b44db79389d6db3a24216047d8e73f79e56d8506e2035fc9a4

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                944B

                                                MD5

                                                1ec5630fd1a07d7b9f61af2e0e101d2f

                                                SHA1

                                                d41e5deac4ac210344f1b53ed5f8c298b88c3059

                                                SHA256

                                                73e1789f5729099d7b849d498c67c345d9e62d8e11e79992bd2549c44b7885c7

                                                SHA512

                                                de1bc6a3aff6eddab8f1553e3f63b2e803f073956bcd2546cb506a82a836b8fcbd489fee524efc6d6eb5486688ba2d41c5ecace358ae1f4be98896eabb5fa299

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                944B

                                                MD5

                                                35867f4508aa755e020ccc04e72b4658

                                                SHA1

                                                85c955ca8168ab29e1a25a80f0787bbf66d20649

                                                SHA256

                                                a3b3cd85ccc18bd7419511de913f3cbf93d33b06fe9d7c6e8919459607a61936

                                                SHA512

                                                ac61e1434a692acbe730800dd7e1ff9ac8d88bc4d5867bcd4aaef5f40357d209a02855c6b50ef8b2da1cafec8b98fc8700feb7e37982d05ad75bbf7f4e50338d

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                944B

                                                MD5

                                                cc2210f652fff7eb769ceac982678f09

                                                SHA1

                                                dc1eebc04c9fc5dbfc05b80340ada3c63e16178e

                                                SHA256

                                                8fd1a8119831b8aec9d809642505b154c6ad3a6920a7bf7c8028e369da5978c5

                                                SHA512

                                                38db3e814c4e67f79938574d4d7b73248c61011dca46d2c77615aa1682fddf0554f41eef2097c4149ad4dee41b53db9c654901d001fc6f674d0a7c3ef5f58303

                                              • C:\Users\Admin\AppData\Local\Temp\!Please Read Me!.txt

                                                Filesize

                                                797B

                                                MD5

                                                afa18cf4aa2660392111763fb93a8c3d

                                                SHA1

                                                c219a3654a5f41ce535a09f2a188a464c3f5baf5

                                                SHA256

                                                227082c719fd4394c1f2311a0877d8a302c5b092bcc49f853a5cf3d2945f42b0

                                                SHA512

                                                4161f250d59b7d4d4a6c4f16639d66d21b2a9606de956d22ec00bedb006643fedbbb8e4cde9f6c0c977285918648314883ca91f3442d1125593bf2605f2d5c6b

                                              • C:\Users\Admin\AppData\Local\Temp\!WannaDecryptor!.exe.lnk

                                                Filesize

                                                1KB

                                                MD5

                                                6f5f6cd6f9bbab246916c08302076eab

                                                SHA1

                                                e79ba92f904cf81ca971e4b974ae330ab700c26d

                                                SHA256

                                                ee3ea1db0527047097f2c883b20740d9479b1d2b53e101f128460bef2f249b5c

                                                SHA512

                                                e4c094486b716c89e63d6fb1a409259dddd34e7c74771b5157a99a5a547a64b0699693a503bd1c3e164aa5f773d9366d24b12a71e5ae73c3df93fbcb23c0b10e

                                              • C:\Users\Admin\AppData\Local\Temp\00000000.res

                                                Filesize

                                                136B

                                                MD5

                                                54649dd9f091d0dff0f66fb958798d8e

                                                SHA1

                                                c321b9879668a30632afccb3d1b69f086cec0c4e

                                                SHA256

                                                9fe62b1de95155d5e6910ead26a9e5ac65600862285ef2ff869863e2bc7f5374

                                                SHA512

                                                17182aae5e95ef3f1918184fc842e3f7825bf4fa37762ba21caa11740ebe611191e1f51afe5cc37b21329d977dd620891a6035c1a8f2f90743856e35da3c0890

                                              • C:\Users\Admin\AppData\Local\Temp\00000000.res

                                                Filesize

                                                136B

                                                MD5

                                                4267e4a070d333ea8387dca7f1287303

                                                SHA1

                                                b2ec4230c09b2ec89aba609989173e63baeacd1d

                                                SHA256

                                                2087bbf33b054142becad99b8e67778188a89b87345bc317c883e2cbc3511eec

                                                SHA512

                                                ffe27ba2e2a7edccd75d2246f762024061143c969949af493f33250c4d51ffb8011ac95b6e804e53aeba2f92fe7c74d7d56f36341dd02c1eada5f03c63ab4c4e

                                              • C:\Users\Admin\AppData\Local\Temp\00000000.res

                                                Filesize

                                                136B

                                                MD5

                                                e8b276f83d81c0ad21ebee4ef75ae4d6

                                                SHA1

                                                283ed81779797886d6b54fc5dc2232db339ea940

                                                SHA256

                                                28c24ef2fe0869afe50907c3f7348cc919f4f2d14d5251db801a9bb719c8c70a

                                                SHA512

                                                fa9e2593182375ee66ce8f106fd375801795f11a53acbff60d0f0d55c3bda5ce3bf0434f65470c6fca551538906f5a29421834529fb0e04d0155d6768cb1914b

                                              • C:\Users\Admin\AppData\Local\Temp\246341712578348.bat

                                                Filesize

                                                336B

                                                MD5

                                                3540e056349c6972905dc9706cd49418

                                                SHA1

                                                492c20442d34d45a6d6790c720349b11ec591cde

                                                SHA256

                                                73872a89440a2cba9d22bf4961c3d499ea2c72979c30c455f942374292fedadc

                                                SHA512

                                                c949d147100aef59e382c03abf7b162ae62a4d43456eebd730fbedcf5f95f5e1a24f6e349690d52d75331878a6ee8f6b88a7162ee9cf2a49e142196b12d0133c

                                              • C:\Users\Admin\AppData\Local\Temp\XBackground.bmp

                                                Filesize

                                                5.5MB

                                                MD5

                                                83f9fa37f0e2ecc9223615646e3c3b1d

                                                SHA1

                                                848c6810464f4b7db16315699fc3dfa7a568cd72

                                                SHA256

                                                14a63e47220e866f335843841bb7e192bfbaec8782914380d057325e62d792d5

                                                SHA512

                                                fb445175f763ef4dd7c224343cd71620cf580603871be4dbb56735b5d1d844efb2d666f618141b9caa087bf2e539aa1d6a0cd553da9cae9d9ee6bbcff72e2a0b

                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_brkd5yzu.g2l.ps1

                                                Filesize

                                                60B

                                                MD5

                                                d17fe0a3f47be24a6453e9ef58c94641

                                                SHA1

                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                SHA256

                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                SHA512

                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                              • C:\Users\Admin\AppData\Local\Temp\bgijzj.exe

                                                Filesize

                                                224KB

                                                MD5

                                                5c7fb0927db37372da25f270708103a2

                                                SHA1

                                                120ed9279d85cbfa56e5b7779ffa7162074f7a29

                                                SHA256

                                                be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844

                                                SHA512

                                                a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206

                                              • C:\Users\Admin\AppData\Local\Temp\c.vbs

                                                Filesize

                                                219B

                                                MD5

                                                5f6d40ca3c34b470113ed04d06a88ff4

                                                SHA1

                                                50629e7211ae43e32060686d6be17ebd492fd7aa

                                                SHA256

                                                0fb5039a2fe7e90cdf3f22140d7f2103f94689b15609efe0edcc8430dd772fc1

                                                SHA512

                                                4d4aa1abd2c9183202fd3f0a65b37f07ee0166ba6561f094c13c8ea59752c7bdd960e37c49583746d4464bc3b1dc0b63a1fe36a37ce7e5709cd76ed433befe35

                                              • C:\Users\Admin\AppData\Local\Temp\c.wry

                                                Filesize

                                                628B

                                                MD5

                                                320f8260f1c7e75fde9b0ed4ce2cfabd

                                                SHA1

                                                6539777dcbb7abf10a94c34e04c6f62f19b230df

                                                SHA256

                                                7431591bcd1e0be9a91adc7751fb27d5eb4a1e14f3c1f50eef74e605fb89d423

                                                SHA512

                                                5d614b1720c692388c262cc1a43a6e3daa0a62e6f61c13fd88aa6b13a3e0d8d41375a831b15e75f2d5b8fc8c4e8a21fe4fa77ff3e3eefa76843f9406273e6880

                                              • C:\Users\Admin\AppData\Local\Temp\java.exe

                                                Filesize

                                                84KB

                                                MD5

                                                0b163732fcb85953d90e43880aa7e84f

                                                SHA1

                                                de6d7a236ea98c489a91a3d75e0343061bbe832f

                                                SHA256

                                                86cff0dbed58c5f05cc6ed8fcc6035f19e95803c2f44c879491d57c658b1694f

                                                SHA512

                                                1d75eab9c69c1f6720b096d3337a155cc8821eda4e57ae01d4b1118d20be3141561aa23545cf8b823b9629ded73a33744ea877b8ac0d65a4d0d8aaac4b35de21

                                              • C:\Users\Admin\AppData\Local\Temp\m.wry

                                                Filesize

                                                42KB

                                                MD5

                                                980b08bac152aff3f9b0136b616affa5

                                                SHA1

                                                2a9c9601ea038f790cc29379c79407356a3d25a3

                                                SHA256

                                                402046ada270528c9ac38bbfa0152836fe30fb8e12192354e53b8397421430d9

                                                SHA512

                                                100cda1f795781042b012498afd783fd6ff03b0068dbd07b2c2e163cd95e6c6e00755ce16b02b017693c9febc149ed02df9df9b607e2b9cca4b07e5bd420f496

                                              • C:\Users\Admin\AppData\Local\Temp\u.wry

                                                Filesize

                                                236KB

                                                MD5

                                                cf1416074cd7791ab80a18f9e7e219d9

                                                SHA1

                                                276d2ec82c518d887a8a3608e51c56fa28716ded

                                                SHA256

                                                78e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df

                                                SHA512

                                                0bb0843a90edacaf1407e6a7273a9fbb896701635e4d9467392b7350ad25a1bec0c1ceef36737b4af5e5841936f4891436eded0533aa3d74c9a54efa42f024c5

                                              • C:\Users\Admin\Desktop\How To Decrypt My Files.html

                                                Filesize

                                                639B

                                                MD5

                                                d2dbbc3383add4cbd9ba8e1e35872552

                                                SHA1

                                                020abbc821b2fe22c4b2a89d413d382e48770b6f

                                                SHA256

                                                5ca82cbc4d582a4a425ae328ad12fd198095e2854f4f87b27a4b09e91173a3be

                                                SHA512

                                                bb5e1bbf28c10c077644136b98d8d02bfec3b3e49c0829b4d4570b30e0aea0276eb748f749a491587a5e70141a7653be1d03c463a22e44efecde2e5a6c6e5e66

                                              • C:\Users\Admin\NTUSER.DAT{2fa72cf3-34ca-11ed-acae-cbf1edc82a99}.TMContainer00000000000000000001.regtrans-ms.ENC

                                                Filesize

                                                16B

                                                MD5

                                                37d6219e39a95797574cfc33cc9b66d4

                                                SHA1

                                                fe32065e4c55e8b9ba72d61cd0cef298af3b2e54

                                                SHA256

                                                28c19a1edd73b6910f470a6a0926dd1e7dc1654bddd80b7d564259cac52f31db

                                                SHA512

                                                9ff2d2d110898a98073f5c359b21995ad7f82370a0563ec76b9a4ead6d8dc40eb290a7a334a3824a204e7346aec49158067e99c6df48a565a5cba17942e68818

                                              • \??\pipe\LOCAL\crashpad_996_JEHOMUERXGZSOLCM

                                                MD5

                                                d41d8cd98f00b204e9800998ecf8427e

                                                SHA1

                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                SHA256

                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                SHA512

                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                              • memory/712-102-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/712-114-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/712-113-0x00000274322E0000-0x000002743242F000-memory.dmp

                                                Filesize

                                                1.3MB

                                              • memory/1356-12-0x0000016AC0AC0000-0x0000016AC0AD0000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/1356-8-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/1356-15-0x0000016AC0AC0000-0x0000016AC0AD0000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/1356-19-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/1356-18-0x0000016AC0BD0000-0x0000016AC0D1F000-memory.dmp

                                                Filesize

                                                1.3MB

                                              • memory/1356-13-0x0000016AC0A50000-0x0000016AC0A72000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/1356-14-0x0000016AC0AC0000-0x0000016AC0AD0000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/1556-91-0x0000022830EE0000-0x000002283102F000-memory.dmp

                                                Filesize

                                                1.3MB

                                              • memory/1556-78-0x0000022818830000-0x0000022818840000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/1556-92-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/1556-77-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/1556-89-0x0000022818830000-0x0000022818840000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/1556-79-0x0000022818830000-0x0000022818840000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/2608-1294-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/2608-1619-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/3256-312-0x0000000010000000-0x0000000010012000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/3544-39-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/3544-40-0x000001B51A3D0000-0x000001B51A3E0000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/3544-51-0x000001B51A3D0000-0x000001B51A3E0000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/3544-52-0x000001B51A3D0000-0x000001B51A3E0000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/3544-54-0x000001B51A4F0000-0x000001B51A63F000-memory.dmp

                                                Filesize

                                                1.3MB

                                              • memory/3544-55-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/4080-268-0x00000000016F0000-0x0000000001700000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4080-1-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/4080-1271-0x00000000016F0000-0x0000000001700000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4080-34-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/4080-2-0x00000000016F0000-0x0000000001700000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4080-0-0x0000000000D50000-0x0000000000D6C000-memory.dmp

                                                Filesize

                                                112KB

                                              • memory/4080-76-0x0000000003030000-0x000000000303E000-memory.dmp

                                                Filesize

                                                56KB

                                              • memory/4080-101-0x00000000016F0000-0x0000000001700000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4080-122-0x000000001C7C0000-0x000000001C7CC000-memory.dmp

                                                Filesize

                                                48KB

                                              • memory/4080-41-0x00000000016F0000-0x0000000001700000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4080-121-0x00000000016F0000-0x0000000001700000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4536-117-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/4536-120-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/4888-56-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/4888-68-0x000001A459FB0000-0x000001A459FC0000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4888-71-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/4888-57-0x000001A459FB0000-0x000001A459FC0000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/4888-70-0x000001A45A000000-0x000001A45A14F000-memory.dmp

                                                Filesize

                                                1.3MB

                                              • memory/4888-67-0x000001A459FB0000-0x000001A459FC0000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/5032-38-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/5032-23-0x000002DFA0750000-0x000002DFA0760000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/5032-21-0x00007FFBECC10000-0x00007FFBED6D2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/5032-22-0x000002DFA0750000-0x000002DFA0760000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/5032-33-0x000002DFA0750000-0x000002DFA0760000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/5032-35-0x000002DFA0750000-0x000002DFA0760000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/5032-37-0x000002DFA07D0000-0x000002DFA091F000-memory.dmp

                                                Filesize

                                                1.3MB