Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

28/04/2024, 17:57

240428-wjzr7ade6y 5

28/04/2024, 17:55

240428-whkxmsde4x 7

28/04/2024, 17:53

240428-wgpt7sdb65 1

28/04/2024, 17:49

240428-wd521sdd7w 6

28/04/2024, 17:43

240428-wawdeadc9s 1

Analysis

  • max time kernel
    173s
  • max time network
    189s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/04/2024, 17:49

General

  • Target

    https://mega.nz/file/vbgCjYjC#eij-04fdXqkI-45KpR26ov5_b79ZV-jVEuAErQbnw_g

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 9 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 27 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://mega.nz/file/vbgCjYjC#eij-04fdXqkI-45KpR26ov5_b79ZV-jVEuAErQbnw_g"
    1⤵
      PID:2456
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3432
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • NTFS ADS
      PID:2088
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5068
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2880
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2772
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3284
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:3760
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2380
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:540
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
        PID:2948
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:5840
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Modifies registry class
          PID:5884
        • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
          "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:5552
        • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Clean.exe
          "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Clean.exe"
          1⤵
            PID:5672
          • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
            "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"
            1⤵
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:6060
            • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
              "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:4852
            • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
              "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:1828
            • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
              "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:2060
            • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
              "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:5860
            • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
              "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:1996
            • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
              "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /main
              2⤵
              • Writes to the Master Boot Record (MBR)
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3492
              • C:\Windows\SysWOW64\notepad.exe
                "C:\Windows\System32\notepad.exe" \note.txt
                3⤵
                • Suspicious use of FindShellTrayWindow
                PID:4688
          • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
            "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"
            1⤵
            • Suspicious use of SetWindowsHookEx
            PID:2168
          • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
            "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"
            1⤵
            • Suspicious use of SetWindowsHookEx
            PID:5172
          • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
            "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"
            1⤵
            • Suspicious use of SetWindowsHookEx
            PID:6036
          • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
            "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"
            1⤵
            • Suspicious use of SetWindowsHookEx
            PID:2644
          • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
            "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"
            1⤵
            • Suspicious use of SetWindowsHookEx
            PID:6120
          • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
            "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"
            1⤵
            • Suspicious use of SetWindowsHookEx
            PID:5828
          • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
            "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"
            1⤵
            • Suspicious use of SetWindowsHookEx
            PID:4468
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
            1⤵
            • Drops file in Windows directory
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:5816
          • C:\Windows\system32\browser_broker.exe
            C:\Windows\system32\browser_broker.exe -Embedding
            1⤵
              PID:5196
            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
              1⤵
              • Suspicious use of SetWindowsHookEx
              PID:5364
            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
              1⤵
              • Drops file in Windows directory
              • Modifies registry class
              PID:5368
            • C:\Windows\system32\OpenWith.exe
              C:\Windows\system32\OpenWith.exe -Embedding
              1⤵
              • Suspicious use of SetWindowsHookEx
              PID:2392
            • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
              "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"
              1⤵
              • Suspicious use of SetWindowsHookEx
              PID:5620
            • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
              "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"
              1⤵
              • Suspicious use of SetWindowsHookEx
              PID:3960
            • C:\Windows\system32\OpenWith.exe
              C:\Windows\system32\OpenWith.exe -Embedding
              1⤵
              • Suspicious use of SetWindowsHookEx
              PID:4664
            • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
              "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"
              1⤵
                PID:4832
                • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
                  "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog
                  2⤵
                    PID:4748
                  • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
                    "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog
                    2⤵
                      PID:2140
                    • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
                      "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog
                      2⤵
                        PID:3008
                      • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
                        "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog
                        2⤵
                          PID:708
                        • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
                          "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog
                          2⤵
                            PID:1328
                          • C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe
                            "C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /main
                            2⤵
                              PID:4048
                              • C:\Windows\SysWOW64\notepad.exe
                                "C:\Windows\System32\notepad.exe" \note.txt
                                3⤵
                                  PID:2792

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2TT8RSZ7\edgecompatviewlist[1].xml

                              Filesize

                              74KB

                              MD5

                              d4fc49dc14f63895d997fa4940f24378

                              SHA1

                              3efb1437a7c5e46034147cbbc8db017c69d02c31

                              SHA256

                              853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                              SHA512

                              cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\3PRK1H1O\fRSNKQanUHk53F1a1Bi8UA71Qt4.br[1].js

                              Filesize

                              289B

                              MD5

                              9085e17b6172d9fc7b7373762c3d6e74

                              SHA1

                              dab3ca26ec7a8426f034113afa2123edfaa32a76

                              SHA256

                              586d8f94486a8116af00c80a255cba96c5d994c5864e47deac5a7f1ae1e24b0d

                              SHA512

                              b27b776cb4947eef6d9e2a33b46e87796a6d4c427f4759c08cf5aa0ee410a5f12e89ca6ab9cddd86c8471037e3c505f43c8b7fc6d8417f97f9fe3c5c47216bc4

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\3PRK1H1O\stl[1].js

                              Filesize

                              182KB

                              MD5

                              6029ea0d7e342d1f8ac4b3d21af18238

                              SHA1

                              fdfa3448753dd83aeef9bfe49a6b0d7b776ad68c

                              SHA256

                              2fa7eecab5db277fa2aaf6707b99648a42c60a323c2af6b7e0c2936fdc31eaa7

                              SHA512

                              4b3e5740470c739916e64eb500042098acc16cca00ff6ac03f83d8867ebcb7b28479900f9ca8a22b0a448ee252fa2bf878d452751a50b3b6d30d517c41470071

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\J80QHTBB\4TQ6xhX_0XDFyLdFRS-kPhFXirA.br[1].js

                              Filesize

                              7KB

                              MD5

                              fbf143b664d512d1fa7aeeeba787129c

                              SHA1

                              f827b539ae2992d7667162dc619cc967985166d9

                              SHA256

                              e162ccd10a34933d736008eb0bc6b880c4e783cf81f944bca7311bf5f3cd4aff

                              SHA512

                              109ec6433329f001c9239c3298a10e414522f21be2a3d7b8a9eb0b0767322eaad1fdf8f5b11edb1f42882b4e75ae71bef7fe786716407c8efad4feacb3dcf348

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\J80QHTBB\nuFRD-vYSZviVYUb_rj3ij__anPXDTnCjmHKM4nYO7KN_k-UXt_A-Q[1].woff2

                              Filesize

                              28KB

                              MD5

                              54dc8147f54996ca05201938a6aec3fd

                              SHA1

                              a246379477d6f774059d088cc727b5753ae1c2b8

                              SHA256

                              4d073fea9dc9da8e5a2626c14c419ec6be0ec8acfb2d5ef5a90e9d995fc141bf

                              SHA512

                              025559c263757faa45c5e2d03882d770081ce72c647893fd9ea976b1f45ba57d25e0b4ef97f84a0353d3aabbe6dfbdd8e2abf0c86e5f78a6eb221bbf47e01943

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\J80QHTBB\nuFRD-vYSZviVYUb_rj3ij__anPXDTnCjmHKM4nYO7KN_qiTXt_A-Q[1].woff2

                              Filesize

                              27KB

                              MD5

                              66f533f5ff80956354d1fb4aab3b8a2c

                              SHA1

                              4a1753616e5ab51c3f7b8e784de99d007b2cba68

                              SHA256

                              b3ab1bcb5bd68010806f88134ad581b56fa75da2a2000753848c61bbac82f4e2

                              SHA512

                              817241abd6ba172d19704e69aee99895898cb4ad02a9f6880e210099b0201742e77c530146f92a0c1266b4d3f1376775f311a7bd4726fe618003476b4589a2b5

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\J80QHTBB\nuFvD-vYSZviVYUb_rj3ij__anPXJzDwcbmjWBN2PKdFvXDZbtM[1].woff2

                              Filesize

                              28KB

                              MD5

                              e4d6c8c57079b70dd94236cb4dbcd5be

                              SHA1

                              f8bb42bd8b6b3ddbf7d70d1cb2e9472bb5351e6e

                              SHA256

                              12e285b031f40e3970e0368331f02807ee64cab3d25dec9bc34975c9b5cf6b4f

                              SHA512

                              a21f5df08def6d84362d4231613aae319998c70ec783b7bbf1d2dad62b8ccad43a3e8612cb4bf4b5746cc3881b771319b7016e35fc89ddef973250ac178e0628

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\J80QHTBB\nuFvD-vYSZviVYUb_rj3ij__anPXJzDwcbmjWBN2PKeiunDZbtM[1].woff2

                              Filesize

                              29KB

                              MD5

                              f11f3e3360810e2035b9fdf79b261b72

                              SHA1

                              3b1b2f4ae87993aa400fc441142a24a8b42fff8a

                              SHA256

                              68de36afaca4d3ec77779ec9ef705fde578be0b5419b9cd520515747e75716e8

                              SHA512

                              2e1d376af2120ab4f1555bfdd4e3d1ccd1c18050c0c172c620b110b694dab7fa3188f5d8fb05b242b62706a6158a66a7f96fd903a274759cfa521e975911df5d

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\LV3CRZHK\s28667145.weebly[1].xml

                              Filesize

                              13B

                              MD5

                              c1ddea3ef6bbef3e7060a1a9ad89e4c5

                              SHA1

                              35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

                              SHA256

                              b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

                              SHA512

                              6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\LV3CRZHK\s28667145.weebly[1].xml

                              Filesize

                              2KB

                              MD5

                              fe34e072c3ae287fa2f164b309028063

                              SHA1

                              b5773ad8409ec9fcf8017622b4f94b74b287a054

                              SHA256

                              1983c6a2e80b9495d82774a5152f269a63f07efc490574206423ee43449ee740

                              SHA512

                              11a36a9fa88c1fc17c412bf5ed1f46fb14244209e4d2af13a5882f44527c9439ddce67bb37895222c9e2ec025684797b5c82a01724a16a61b45ad7c13d4ee44e

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_8BB34D7AC6ADCC019FE5325FE9DECAE8

                              Filesize

                              471B

                              MD5

                              5ebc073a67a03f9df24b7e4fe24d98a0

                              SHA1

                              b26f23a3b0c794a59febad444f479d4a80345387

                              SHA256

                              2f43123249e00c564b4b4585a0537c7d16a85475c8f5bb1af035490c86f08ba2

                              SHA512

                              3df82b5204bfbcb08d319dcae88e3db921edc5761bc738410f659a4adc88d2e01955bb6000cb48c71c58f8b33500ee66c8aa21c2b335a7fbdbeaccb7b33adec3

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_8BB34D7AC6ADCC019FE5325FE9DECAE8

                              Filesize

                              422B

                              MD5

                              4de78e2ecf99fd731f911251841799ef

                              SHA1

                              f868df422c31c440dfdc102c315d4cc73e1a4acd

                              SHA256

                              934c6ccff0c9b1dae8279bd3959ca0629ce76ade6987520586246e215bf0f5f4

                              SHA512

                              1216391b371fcb2daaa795cb65c136fa6326af8ef8f1da71a649bf9391566382e3a6ad0fc4a27c5b0e1fe383c400da6fe88f0f714716bb6aa4f335e1c4ab4ab2

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                              Filesize

                              4KB

                              MD5

                              1bfe591a4fe3d91b03cdf26eaacd8f89

                              SHA1

                              719c37c320f518ac168c86723724891950911cea

                              SHA256

                              9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

                              SHA512

                              02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\2AXSQ5VN\favicon[1].ico

                              Filesize

                              6KB

                              MD5

                              72f13fa5f987ea923a68a818d38fb540

                              SHA1

                              f014620d35787fcfdef193c20bb383f5655b9e1e

                              SHA256

                              37127c1a29c164cdaa75ec72ae685094c2468fe0577f743cb1f307d23dd35ec1

                              SHA512

                              b66af0b6b95560c20584ed033547235d5188981a092131a7c1749926ba1ac208266193bd7fa8a3403a39eee23fcdd53580e9533803d7f52df5fb01d508e292b3

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\5FF9316X\favicon[2].ico

                              Filesize

                              4KB

                              MD5

                              da597791be3b6e732f0bc8b20e38ee62

                              SHA1

                              1125c45d285c360542027d7554a5c442288974de

                              SHA256

                              5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

                              SHA512

                              d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\FAEBWE5U\favicon[1].ico

                              Filesize

                              4KB

                              MD5

                              4d27526198ac873ccec96935198e0fb9

                              SHA1

                              b98d8b73ad6a0f7477c3397561b4aab37bf262aa

                              SHA256

                              40a2146151863bcf46c786d596e81a308d1b0d26d74635be441e92656f29b1b4

                              SHA512

                              1ee4b73f4da9c2b237cd0b820ffad8e192d9125ce7d75d8a45a8b9642ce5fe85736646caf12d246a77364c576751c47919997d066587f17575442a9b9f7cc97f

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\LNKB6S0T\favicon-trans-bg-blue-mg[1].ico

                              Filesize

                              4KB

                              MD5

                              30967b1b52cb6df18a8af8fcc04f83c9

                              SHA1

                              aaf67cd84fcd64fb2d8974d7135d6f1e4fc03588

                              SHA256

                              439b6089e45ef1e0c37ef88764d5c99a3b2752609c4e2af3376480d7ffcfaf2e

                              SHA512

                              7cb3c09a81fbd301741e7cf5296c406baf1c76685d354c54457c87f6471867390a1aeed9f95701eb9361d7dfacce31afd1d240841037fc1de4a120c66c1b088c

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\r4g84b5\imagestore.dat

                              Filesize

                              28KB

                              MD5

                              839e0f228ad494eef52dd028961658c8

                              SHA1

                              db13afcff56fda67b882cbd8b0ebb025c52f1300

                              SHA256

                              591ddaf37133bfcdbb243c948f6715f1a9133a641c095339479c65fde3edee1a

                              SHA512

                              78808f63cab64e29ae42e862cae146ba9dba9f7815c42c7795d04d818e88134cd6d16d772890dbec5a039347f1d207399f4fd5e06d08f22e508d7593e5e2944b

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF688BAC4DB946C116.TMP

                              Filesize

                              24KB

                              MD5

                              d3cdb7663712ddb6ef5056c72fe69e86

                              SHA1

                              f08bf69934fb2b9ca0aba287c96abe145a69366c

                              SHA256

                              3e8c2095986b262ac8fccfabda2d021fc0d3504275e83cffe1f0a333f9efbe15

                              SHA512

                              c0acd65db7098a55dae0730eb1dcd8aa94e95a71f39dd40b087be0b06afc5d1bb310f555781853b5a78a8803dba0fb44df44bd2bb14baeca29c7c7410dffc812

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\6WOQCUH1\memz-master[1].zip

                              Filesize

                              15KB

                              MD5

                              c83bed29066c2b16dc67b9099dd1c6ff

                              SHA1

                              1c7b4959ee2031c9e14301e8fcb6d0664f2b4f86

                              SHA256

                              b2e1e267b6cab98d5c73baa537616c809d89b85218d5bdc15c4d6424dd8dbe12

                              SHA512

                              5288326c692902f8d880c8b07f382d6ed273ce130db8906f2a1e0b1c3b1a4f03dafcd00856e89b1ae557ace66f4fc58224b262fa643de88d7550905b43d85f81

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\6WOQCUH1\memz-master[1].zip

                              Filesize

                              17KB

                              MD5

                              4790677e05d72ef7429dddf35562bf4a

                              SHA1

                              4243d6ea53db7e8cc0c355e70d6cffb54787b90b

                              SHA256

                              319bf6087040d17b87f46cd05f5ee064c291ba9ca46e1910f28d1f4c57cb3d96

                              SHA512

                              a93c5f691938bc1bdd9ef20b975f0b22cf494543e7df82ec31838bf811552ead5cd855959be4e47186ee7de944be005030f52f58b9dc85e7cde719cb97b794e3

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\6XF5IM80.cookie

                              Filesize

                              101B

                              MD5

                              a748c59711ab7a32a4f1f42d2b3e23d7

                              SHA1

                              6ca2c0790dc12d06e213e61d12c05b086f9e8161

                              SHA256

                              5a28fc0abbda0352c0b51c18cbdea70557b0103ee44b3a0622a4f0b53f2c1a2a

                              SHA512

                              6c57bc8593c0d2167b84e9c99651c8ce4f7df50ad08565fb6fba2f85cbde114800548cbe24867d197efc59d6b7fb7b4b9059340204a9f609c8170ba69a1862d1

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\JA5OFELK.cookie

                              Filesize

                              1016B

                              MD5

                              b68a7644d39d41716ec0703a142d9df2

                              SHA1

                              8a30e262b339accb1f5e81c97d8355a8072a5f16

                              SHA256

                              501cc355f2a8c557d16794e739d323a4426a94d66c3c914fabaeb023882b2f3b

                              SHA512

                              9e3f0b3fad776995fb1b1a2603dd78160b7b54ebc8f74b834358684852ba7035573988383c5b7e2c8c30d0abada00f2deea39741274871c8d4ce8497fd145490

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\POK1TKYQ.cookie

                              Filesize

                              1KB

                              MD5

                              85119e51b3e6a075ab96defd42cbee99

                              SHA1

                              e6a4fcbbb888ec25701dbbf116f3331fb53a4f07

                              SHA256

                              b2202e161b7dec370fb80e92a0acc070126f98954780217107edea2cd9212bd7

                              SHA512

                              6612a91021f2362942296fa8bbbd66eb2eb0744e477c41f8aad1ba6be3f5c10c8fc87cde22c686a39df091df1cccb02d92608b4362ce008ae49d96165cc2f991

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\Y3DKTZO1.cookie

                              Filesize

                              908B

                              MD5

                              b7a942031e1c2dd5cba3d05402ff5ac3

                              SHA1

                              f9424a057758f176216925098a1e734959298d57

                              SHA256

                              83250078ec0e31ba835f38d3379c4f08958185c423c0299e48fa26a20375ad12

                              SHA512

                              1533d6a0884a461a77f91ab7d1ba99e9d0e7b60dd09577d857da1bd57015f9d1c066dd32a64de44676b0a7be1c6edf37198716254aa45eaaf3e0c7ffb3d71ec0

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\Y7VQPWQI.cookie

                              Filesize

                              411B

                              MD5

                              60399731ec238bf22942d1965392d81b

                              SHA1

                              5f0f720959b3779eacf32c5007b4d7632c02bb0d

                              SHA256

                              279b95f4074bad4a1db72403d89a582eec109d1deaa6913ea2be5319f1d36ec0

                              SHA512

                              ccade13e9d93789f0dd6bfc812bb16b39367a64f4073556ee12caeda5fc22e7ec78f9c59193410795757fc593f1bb333ffa0648e773660b70b9ae1ce103a98a1

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                              Filesize

                              717B

                              MD5

                              822467b728b7a66b081c91795373789a

                              SHA1

                              d8f2f02e1eef62485a9feffd59ce837511749865

                              SHA256

                              af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

                              SHA512

                              bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118A

                              Filesize

                              312B

                              MD5

                              1c83e4cd5207f3b0cca54027e23fda4e

                              SHA1

                              669546dea73c32bc7e07f99c93803b64cdf007c7

                              SHA256

                              b87319bd59f5b3ee411fdcfea59cf879f4a34311ad56de7e80970e826dcb31c5

                              SHA512

                              e72bb44555d9932f3333ad0923c92fc92d7c9c59b35680f06f36d11ec3c11088ac0e65c51a9dc3d907f8467cbb7c42471513b43bc360616fa4fd58b59670a5c8

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                              Filesize

                              192B

                              MD5

                              f07a91e7ae5952607f6f2ba71b12f66b

                              SHA1

                              ce77c00e86048f8313bd66610e7993b4ef6e7fa2

                              SHA256

                              a316435e79f1e0ee69361faefed678e87dc50eac8406606a2daa5b30b02d108d

                              SHA512

                              3d645e7ebab6bc29270d73c86ed1cef96596331fa76ed368e1786420d4c7814a28fca0a3ac776badbb2246b0cbe579aa437b17b351a6d6ee85bbcbe2fc7f028d

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118A

                              Filesize

                              404B

                              MD5

                              93ac2a7ad3fcc0cd1216f98cc22ffdf9

                              SHA1

                              01c8db3c54b8816514b75cd3c2d8516674712cf9

                              SHA256

                              d082c3580353b889c3d22810d483299837d363746ee6a1db085ea294a474d6ee

                              SHA512

                              e63ceb567ffb1177f057efceb0a32753d5b71a8568afdedab072019ee6a9e57847f4d1eec4e3152b73835e8bc0526857ddfea70598d8c0741457488f89477e9b

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.log

                              Filesize

                              512KB

                              MD5

                              1f5a820524b3a21aa5ef052b2d6d85b7

                              SHA1

                              e72e7ab0fb11598927f5d5dd50d82fdae5501461

                              SHA256

                              4ca64cdb72df6eded33a6a620944a32464f140b7e8552b3795a6b7fb8e81e7fc

                              SHA512

                              e406a0c9439f55b63197f1dfac9270125cc8800f5e45767f94705142ecf4b9fe2e9166ff055c63a8fdbff3345c9f4f2f24c866b6538d7de7bd1ac0678b7913e0

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chk

                              Filesize

                              8KB

                              MD5

                              71c50abe699fa1d19e8eb919be6f6c19

                              SHA1

                              3e368eb7c4bad29f2b05225cf5474050768bda17

                              SHA256

                              7f392b930dc9ca771e1639be079dd18de78783b3d03fa81321e66ba4e362340d

                              SHA512

                              243db0ebd08f3871955f0bed5f726c5e41b03a89583934b141e62ed8bb9fe899e36d9c87a5bb7dd133142cbab8c9cbb0005716ab98eed703da36e6dfb1990d6f

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edb

                              Filesize

                              2.0MB

                              MD5

                              48a29ce3f2c3e9c5d91356ca2a7c7cc0

                              SHA1

                              de42be08b2e8b0410dec162fdbfe19031b141dd8

                              SHA256

                              585ec2d0dc89ec455df77f37d86a57f0ddae5546a345e3919dc395ca3894c0d4

                              SHA512

                              04033c897eaa7832356456be4d2145a4a7a00b5062b83e98a5bfc186f856ac3483a2dc951c3b5b24fe5d6c173b942707cba70f73058aa4c206dea546bfeaf7ba

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfm

                              Filesize

                              16KB

                              MD5

                              95edee7d6d43d6df80f8617448c32021

                              SHA1

                              fd25d73cca55c03b47d1b70480fde42e6f3edb7f

                              SHA256

                              eadf3d7a6616506e75fa6c9bd2b388689a5db21181b2f0fc62498969d2e6b941

                              SHA512

                              4d11133b267f49cb0ea7450f95a2a0d3cda614bd87fdc663609c10b8d5d94d2421936f62a425e7d1e75c36a559518824bfde230c6c9cfe884d62eebf00a79306

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\r4g84b5\imagestore.dat

                              Filesize

                              20KB

                              MD5

                              8c07cfc05160706f7ca6368ae9e1b056

                              SHA1

                              68b9552527e275dd4482d9e133c1325d269a488a

                              SHA256

                              fabcd40307864edff7e19a4c45580d6a87c81339d0bcc7e9ed80cb1b82218967

                              SHA512

                              6510b364e48a0b22a7a3ec49c6a5e1501e055d335b9efbe8d8ddfcf6e303c7d195547e7a81c1c0fecacf4017a8f6a92a4a4bed739aa28ee3f8fb9d828c7fafb9

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{A44797BF-3DEB-404E-B074-8FA65FB1EBBD}.dat

                              Filesize

                              5KB

                              MD5

                              5288e18bda31daf66b6d5c731ee9b2da

                              SHA1

                              2b0bc00753953aad647e8cc5a0088ab7eaa927db

                              SHA256

                              f701c0e40efb74c96d8712ba42502043eba96f552514277a782e8872f73fffab

                              SHA512

                              9375b66eea84058952a26ede638f0c5b769bd87a93ce50389587b6178378c435857103fcabc56d655bbf49c8848e4373f49c871b1a223a5f59b834e27797c8b1

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{0EFCAAC7-3F09-44AF-BBCD-FA453DCF0D96}.dat

                              Filesize

                              8KB

                              MD5

                              93924aa0d4cfd68bc45163bfcee2dd36

                              SHA1

                              b50c74e51704e4687177ecdd9c8987735bafa3a0

                              SHA256

                              c74988243f9a5aa4044bf064e768775c2a6814e654e93b832ed296d8f6d34a0a

                              SHA512

                              1868c876475f5d109740e6d193b144a57e3c0023f8cb9a71953c02649b2868dffa4201fe666f30bd38bcae57fb5b74fd7cd914aff4249b40a0dfb824f1205acb

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{3757F727-7EAA-4C2A-A6F9-F56085C2FB7F}.dat

                              Filesize

                              5KB

                              MD5

                              8e245f44fb153099344a0675c0f7c247

                              SHA1

                              78974eaa5a2ee576e6180671cb83f53050affe58

                              SHA256

                              769207604319e0def3c4e00a819151c581ca6c4037100517501649080d525ea8

                              SHA512

                              2c239ffc0a1c8761f08526efb7e9074a2896ab9a0fa75e9a1de05a1fc800d750f56bfb4f25543a7f1a49b5a5fd58a602b1bbbfe0f07f0feef8c8106f7e917c8d

                            • C:\note.txt

                              Filesize

                              218B

                              MD5

                              afa6955439b8d516721231029fb9ca1b

                              SHA1

                              087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

                              SHA256

                              8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

                              SHA512

                              5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf

                            • memory/2772-133-0x0000028A214E0000-0x0000028A214E2000-memory.dmp

                              Filesize

                              8KB

                            • memory/2772-81-0x0000028A212A0000-0x0000028A212A2000-memory.dmp

                              Filesize

                              8KB

                            • memory/2772-147-0x0000028A23100000-0x0000028A23200000-memory.dmp

                              Filesize

                              1024KB

                            • memory/2772-160-0x0000028A23420000-0x0000028A23422000-memory.dmp

                              Filesize

                              8KB

                            • memory/2772-158-0x0000028A23400000-0x0000028A23402000-memory.dmp

                              Filesize

                              8KB

                            • memory/2772-148-0x0000028A23000000-0x0000028A23100000-memory.dmp

                              Filesize

                              1024KB

                            • memory/2772-127-0x0000028A211D0000-0x0000028A211D2000-memory.dmp

                              Filesize

                              8KB

                            • memory/2772-253-0x0000028A21080000-0x0000028A21082000-memory.dmp

                              Filesize

                              8KB

                            • memory/2772-135-0x0000028A21FA0000-0x0000028A21FA2000-memory.dmp

                              Filesize

                              8KB

                            • memory/2772-129-0x0000028A214A0000-0x0000028A214A2000-memory.dmp

                              Filesize

                              8KB

                            • memory/2772-131-0x0000028A214C0000-0x0000028A214C2000-memory.dmp

                              Filesize

                              8KB

                            • memory/2772-258-0x0000028A21090000-0x0000028A21092000-memory.dmp

                              Filesize

                              8KB

                            • memory/2772-282-0x0000028A20FE0000-0x0000028A21000000-memory.dmp

                              Filesize

                              128KB

                            • memory/2772-77-0x0000028A21260000-0x0000028A21262000-memory.dmp

                              Filesize

                              8KB

                            • memory/2772-79-0x0000028A21280000-0x0000028A21282000-memory.dmp

                              Filesize

                              8KB

                            • memory/2772-154-0x0000028A22BC0000-0x0000028A22BC2000-memory.dmp

                              Filesize

                              8KB

                            • memory/2772-61-0x0000028A10D00000-0x0000028A10E00000-memory.dmp

                              Filesize

                              1024KB

                            • memory/2772-281-0x0000028A10BB0000-0x0000028A10BD0000-memory.dmp

                              Filesize

                              128KB

                            • memory/2772-164-0x0000028A21410000-0x0000028A21412000-memory.dmp

                              Filesize

                              8KB

                            • memory/2772-449-0x0000028A10630000-0x0000028A10650000-memory.dmp

                              Filesize

                              128KB

                            • memory/2772-156-0x0000028A22BE0000-0x0000028A22BE2000-memory.dmp

                              Filesize

                              8KB

                            • memory/2880-45-0x0000026DE9520000-0x0000026DE9620000-memory.dmp

                              Filesize

                              1024KB

                            • memory/3284-235-0x000002521E1D0000-0x000002521E1F0000-memory.dmp

                              Filesize

                              128KB

                            • memory/3284-230-0x000002521DEE0000-0x000002521DF00000-memory.dmp

                              Filesize

                              128KB

                            • memory/3432-17-0x000001B983C30000-0x000001B983C40000-memory.dmp

                              Filesize

                              64KB

                            • memory/3432-0-0x000001B983B20000-0x000001B983B30000-memory.dmp

                              Filesize

                              64KB

                            • memory/3432-35-0x000001B9810C0000-0x000001B9810C2000-memory.dmp

                              Filesize

                              8KB

                            • memory/3432-97-0x000001B98A320000-0x000001B98A321000-memory.dmp

                              Filesize

                              4KB

                            • memory/3432-96-0x000001B98A310000-0x000001B98A311000-memory.dmp

                              Filesize

                              4KB