Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2024, 11:14

General

  • Target

    SolaraBootstrapper.exe

  • Size

    13KB

  • MD5

    6557bd5240397f026e675afb78544a26

  • SHA1

    839e683bf68703d373b6eac246f19386bb181713

  • SHA256

    a7fecfc225dfdd4e14dcd4d1b4ba1b9f8e4d1984f1cdd8cda3a9987e5d53c239

  • SHA512

    f2399d34898a4c0c201372d2dd084ee66a66a1c3eae949e568421fe7edada697468ef81f4fcab2afd61eaf97bcb98d6ade2d97295e2f674e93116d142e892e97

  • SSDEEP

    192:konexQO0FoAWyEfJkVIaqaLHmr/XKT0ifnTJ1jvVXctNjA:HnexHAWyEfJoIaqayzKAifd1LVEj

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Themida packer 17 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 52 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 60 IoCs
  • Suspicious use of SendNotifyMessage 28 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe
      "C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1996
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3032
    • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe
      "C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:4168
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb548246f8,0x7ffb54824708,0x7ffb54824718
        2⤵
          PID:4532
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:2
          2⤵
            PID:4248
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:680
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3048 /prefetch:8
            2⤵
              PID:4548
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
              2⤵
                PID:4856
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
                2⤵
                  PID:960
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:1
                  2⤵
                    PID:4572
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:1
                    2⤵
                      PID:4344
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:8
                      2⤵
                        PID:1764
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:552
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:1
                        2⤵
                          PID:4260
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:1
                          2⤵
                            PID:5348
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:1
                            2⤵
                              PID:5412
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:1
                              2⤵
                                PID:5420
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3608 /prefetch:8
                                2⤵
                                  PID:5536
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4816 /prefetch:8
                                  2⤵
                                  • Modifies registry class
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5544
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:1
                                  2⤵
                                    PID:5848
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6240 /prefetch:8
                                    2⤵
                                      PID:5856
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:1
                                      2⤵
                                        PID:5864
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6568 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5876
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6800 /prefetch:1
                                        2⤵
                                          PID:2752
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6828 /prefetch:1
                                          2⤵
                                            PID:3616
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:1
                                            2⤵
                                              PID:5392
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6320 /prefetch:8
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5404
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:1
                                              2⤵
                                                PID:5812
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5824
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4472 /prefetch:1
                                                2⤵
                                                  PID:1764
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7148 /prefetch:1
                                                  2⤵
                                                    PID:5172
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1840 /prefetch:1
                                                    2⤵
                                                      PID:5180
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5100 /prefetch:8
                                                      2⤵
                                                        PID:5284
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:1
                                                        2⤵
                                                          PID:5824
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7379234074493206100,8993271464828938035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:1
                                                          2⤵
                                                            PID:6120
                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                          1⤵
                                                            PID:4128
                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                            1⤵
                                                              PID:2664

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                              Filesize

                                                              152B

                                                              MD5

                                                              4158365912175436289496136e7912c2

                                                              SHA1

                                                              813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59

                                                              SHA256

                                                              354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1

                                                              SHA512

                                                              74b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                              Filesize

                                                              152B

                                                              MD5

                                                              ce4c898f8fc7601e2fbc252fdadb5115

                                                              SHA1

                                                              01bf06badc5da353e539c7c07527d30dccc55a91

                                                              SHA256

                                                              bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa

                                                              SHA512

                                                              80fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001c

                                                              Filesize

                                                              207KB

                                                              MD5

                                                              e955953b801c04327c1e96c67dd3c618

                                                              SHA1

                                                              f9061d3780f153e863478106bf1afd85132bccb0

                                                              SHA256

                                                              e8965a2d52ef25918ebee58ab6971745d396177a7943acf1ed53a65bb4dddd45

                                                              SHA512

                                                              6318ff1eb838954dd73dab5ed891d47f4f39089fa5e899d30183c32269c5620bd09d169af4cf8303e3d5c2ebab23cfe9ae5d9fa5c3281023abb009f66a25782a

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                              Filesize

                                                              3KB

                                                              MD5

                                                              85bc33ef1e6d728473e89f8fda9378f3

                                                              SHA1

                                                              3dff26daf3f6434b66800f38b062a6fda1cc9ada

                                                              SHA256

                                                              0f2c002fbaa09964e99a85f1696b06f4de05ae5eecacfdcaa1be9592bb7c4363

                                                              SHA512

                                                              bf0faca0fa0da15309a0255a48499e61dfe9cc253b09ac9c97e315dd30d3d1f9fa6cb8b2e51a92985075d61afd3927ff5d8c55bb4a89123a29a57457438c6afe

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              c81d65a773a0183c7c66b7f36f6411bd

                                                              SHA1

                                                              1b6dbba119302ae965eb6beaa8b4fbcf69213485

                                                              SHA256

                                                              877943590e5506e20a2a1906e86c4a6ea104fdf769beea243876459761b86686

                                                              SHA512

                                                              9ca86107dd2f7e51b504d310633940fb969532c9cb49d4894cedada660c461b807ae2a0c0563507faca2e24926cae719422c5eb9b06f396611fa3e1ada068c11

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              8414348d263574e1da6121bf968433ce

                                                              SHA1

                                                              fc23f635393ce1e78667bb73baaa84f98a3449d1

                                                              SHA256

                                                              02a65d195d0ab7fe10a173938aa9dfd4d051861367a174a2c0ade1d5d6d2c1a7

                                                              SHA512

                                                              82cb371eeada8bd754e0b0e3d0844f11e7f8728b4097e3fa293a702607aec1e772d6fa164972b7bc8a114eca9067252bcef8e63f593bf51f2a3bb28e7d7d16b4

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              7KB

                                                              MD5

                                                              9e168e7458c198784d93d926fa967f29

                                                              SHA1

                                                              bf5103d18b1ef987b4f8dde3d07daae25430a6e9

                                                              SHA256

                                                              42176428aaf80969af96d1a6803bfa34b103bd7459c0aa735dc47d01b9bd21a6

                                                              SHA512

                                                              bf66c0c36e8b5669e23e0ca8b35ea2208a803c8a1aef5a6373108ee72230eee7236b5f8d95acec87c3c082681ef4837cefe4793d3374ff2d86993d828a9a6bc1

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              8KB

                                                              MD5

                                                              68082aae4540be4031287411dd24126c

                                                              SHA1

                                                              7543825096df410b281af266a644f852495259c0

                                                              SHA256

                                                              43b04fb3d2c46a7b47e878bce5fe5883d26d42c63fd9a03318ffb2355cb18049

                                                              SHA512

                                                              cb76aef86fa601e197bce5072f9e521035d84be3e8e990e8a79811a2d14ee43c2d64ee6c1a2c7f09a789babd8bfb9db4866503e68686116471ad8f5e6fa5147e

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              5KB

                                                              MD5

                                                              b59cfad92f7f8095a87cdf67730e0e66

                                                              SHA1

                                                              ce9944610d86508619d2fd7afc02838b5b70e036

                                                              SHA256

                                                              9f79833fcdb9a23a8cfaaa7f9d2f68c49134d89b9a5c335f5d780d69c485658e

                                                              SHA512

                                                              27a2e720ff2f43c8db5bc59c2d8389b81d0884de627135709969af87a4569221df31b41ae8c3520f4890f087c2b1fff80124e35ba79c0b65ed51fed3ec199ede

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              2c3aa85c10affe48b614cf89920ac1c5

                                                              SHA1

                                                              0ee8625a016d8569fe5696cc177917ed60718db0

                                                              SHA256

                                                              93780f64ecde51049bfa64f80b3cea9c9e1e4e1aeae37ccafe1e12c2bbdcb962

                                                              SHA512

                                                              fcb57ce1db1e85927c96fd5373922a97d1f743ce485911b7591000de2dca8a5ec7479f64248aa544d633cb23ba57576995dea55b08d602488d9d8aa279bf1f64

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                              Filesize

                                                              72B

                                                              MD5

                                                              42e0e436c4d3b5fb90b69e765bdad432

                                                              SHA1

                                                              9d073258d45ceb26dbea31f7d029ffc4f8e012d7

                                                              SHA256

                                                              267e91f7dacc3774776bb1b5f111c6ea02d20c0cb52468a5e8a605e862c0d614

                                                              SHA512

                                                              e4a7a89bc1d9e6d5e863c81c572741385f61a981dd208a98a74faa889b31d21b12a95ac3ed6e8e97092076149ac35ae33a077e012593e775b924c504a20648fd

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe589dd1.TMP

                                                              Filesize

                                                              48B

                                                              MD5

                                                              3606fa82782236ee5666e227f68a0396

                                                              SHA1

                                                              c8e0f3eec8e0d867c3e6acd181c1c71910efc921

                                                              SHA256

                                                              4896858bb9c7df21ea1baee23a8e5871762b9ef79dcf7e88bc3bb1f313f4743d

                                                              SHA512

                                                              fdfd342dd2bd358db6e587424e55690c9ce3ffcdf107ce3676517d5f5cd29611c348d8f669f106ced13709fdb7ab1030c22a3cc6445567bcf361c23f6f65c443

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              8df21a89c6f8190cb8c133a394f79f5e

                                                              SHA1

                                                              a9e3d5c1c3103c3ce0c57279750c466a2721c269

                                                              SHA256

                                                              d340188968d42bbb012a2351f30548c818f5cbc0305918bb6f70a09fab5e5969

                                                              SHA512

                                                              59819042d808e42b4cd5095f2560dd95c62e52bf580adfa3ee43af1cdeab40d3bdde198a9892a954319f803cdf49d5dd965a0eb9d6dd7abdef04169c4f9b2ac3

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5870e5.TMP

                                                              Filesize

                                                              538B

                                                              MD5

                                                              f4dfb142e68a8bafe0c281b24af943f0

                                                              SHA1

                                                              96b59491a8e740f24783f1d3ec5025302760783c

                                                              SHA256

                                                              2460a5bcc6de0836f09b889d248f843cfded5d6a9a5894598aefad7c53ce1d23

                                                              SHA512

                                                              b185c29d4a5def3c09a230df2835ba3625ee604e7800d338bb3ed9d603567acadf421d362555cf138d095ebca72388729312095787ac5cb5f06e8358af6a287d

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                              Filesize

                                                              16B

                                                              MD5

                                                              6752a1d65b201c13b62ea44016eb221f

                                                              SHA1

                                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                              SHA256

                                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                              SHA512

                                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                              Filesize

                                                              12KB

                                                              MD5

                                                              0071649763d200e7c26123e5d7e66e1d

                                                              SHA1

                                                              8152b3f4c03ae3155fe027e9901962a8328ab5cb

                                                              SHA256

                                                              75a686dd615e98dd039db3b3f9f58466d7a9af0a56623f208a58e630189539fc

                                                              SHA512

                                                              8968be28b3759d91cf3850b95b89e4965a9185b1d08258e1c7bf9f8e684445a3a1da269cd3b13d860c347fb71d3cbbb890b2e8656c30c4bb546067d17df6415f

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              e22db0259d40fd8188897f8b7f4431c1

                                                              SHA1

                                                              c0f573afafb713e5a3e7b84d9924ec188fd291b2

                                                              SHA256

                                                              59f844e65e30fce4475fa9ace17bb5c7c9c088a683601d5c3e7a18dced24d20e

                                                              SHA512

                                                              fe57a0c14639dafb1449d733a4d788a02c17fbac06cff103cb051aa4cffff75ade67b13552db41695fd028e8bdf2d34dd7c881ad21627355195c1d409dd84bd7

                                                            • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.Core.dll

                                                              Filesize

                                                              488KB

                                                              MD5

                                                              851fee9a41856b588847cf8272645f58

                                                              SHA1

                                                              ee185a1ff257c86eb19d30a191bf0695d5ac72a1

                                                              SHA256

                                                              5e7faee6b8230ca3b97ce9542b914db3abbbd1cb14fd95a39497aaad4c1094ca

                                                              SHA512

                                                              cf5c70984cf33e12cf57116da1f282a5bd6433c570831c185253d13463b0b9a0b9387d4d1bf4dddab3292a5d9ba96d66b6812e9d7ebc5eb35cb96eea2741348f

                                                            • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.Wpf.dll

                                                              Filesize

                                                              43KB

                                                              MD5

                                                              34ec990ed346ec6a4f14841b12280c20

                                                              SHA1

                                                              6587164274a1ae7f47bdb9d71d066b83241576f0

                                                              SHA256

                                                              1e987b22cd011e4396a0805c73539586b67df172df75e3dded16a77d31850409

                                                              SHA512

                                                              b565015ca4b11b79ecbc8127f1fd40c986948050f1caefdd371d34ed2136af0aabf100863dc6fd16d67e3751d44ee13835ea9bf981ac0238165749c4987d1ae0

                                                            • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\get-intrinsic\.nycrc

                                                              Filesize

                                                              139B

                                                              MD5

                                                              d0104f79f0b4f03bbcd3b287fa04cf8c

                                                              SHA1

                                                              54f9d7adf8943cb07f821435bb269eb4ba40ccc2

                                                              SHA256

                                                              997785c50b0773e5e18bf15550fbf57823c634fefe623cd37b3c83696402ad0a

                                                              SHA512

                                                              daf9b5445cfc02397f398adfa0258f2489b70699dfec6ca7e5b85afe5671fdcabe59edee332f718f5e5778feb1e301778dffe93bb28c1c0914f669659bad39c6

                                                            • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\has-proto\.eslintrc

                                                              Filesize

                                                              43B

                                                              MD5

                                                              c28b0fe9be6e306cc2ad30fe00e3db10

                                                              SHA1

                                                              af79c81bd61c9a937fca18425dd84cdf8317c8b9

                                                              SHA256

                                                              0694050195fc694c5846b0a2a66b437ac775da988f0a779c55fb892597f7f641

                                                              SHA512

                                                              e3eca17804522ffa4f41e836e76e397a310a20e8261a38115b67e8b644444153039d04198fb470f45be2997d2c7a72b15bd4771a02c741b3cbc072ea6ef432e9

                                                            • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\hasown\.nycrc

                                                              Filesize

                                                              216B

                                                              MD5

                                                              c2ab942102236f987048d0d84d73d960

                                                              SHA1

                                                              95462172699187ac02eaec6074024b26e6d71cff

                                                              SHA256

                                                              948366fea3b423a46366326d0bb2e54b08abd1cf0b243678ba6625740c40da5a

                                                              SHA512

                                                              e36b20c16ceeb090750f3865efc8d7fd983ae4e8b41c30cc3865d2fd4925bf5902627e1f1ed46c0ff2453f076ef9de34be899ef57754b29cd158440071318479

                                                            • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\vary\LICENSE

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              13babc4f212ce635d68da544339c962b

                                                              SHA1

                                                              4881ad2ec8eb2470a7049421047c6d076f48f1de

                                                              SHA256

                                                              bd47ce7b88c7759630d1e2b9fcfa170a0f1fde522be09e13fb1581a79d090400

                                                              SHA512

                                                              40e30174433408e0e2ed46d24373b12def47f545d9183b7bce28d4ddd8c8bb528075c7f20e118f37661db9f1bba358999d81a14425eb3e0a4a20865dfcb53182

                                                            • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Newtonsoft.Json.dll

                                                              Filesize

                                                              695KB

                                                              MD5

                                                              195ffb7167db3219b217c4fd439eedd6

                                                              SHA1

                                                              1e76e6099570ede620b76ed47cf8d03a936d49f8

                                                              SHA256

                                                              e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

                                                              SHA512

                                                              56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

                                                            • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\WebView2Loader.dll

                                                              Filesize

                                                              133KB

                                                              MD5

                                                              a0bd0d1a66e7c7f1d97aedecdafb933f

                                                              SHA1

                                                              dd109ac34beb8289030e4ec0a026297b793f64a3

                                                              SHA256

                                                              79d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36

                                                              SHA512

                                                              2a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50

                                                            • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Wpf.Ui.dll

                                                              Filesize

                                                              5.2MB

                                                              MD5

                                                              aead90ab96e2853f59be27c4ec1e4853

                                                              SHA1

                                                              43cdedde26488d3209e17efff9a51e1f944eb35f

                                                              SHA256

                                                              46cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed

                                                              SHA512

                                                              f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d

                                                            • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\bin\path.txt

                                                              Filesize

                                                              34B

                                                              MD5

                                                              0e2184f1c7464b6617329fb18f107b4f

                                                              SHA1

                                                              6f22f98471e33c9db10d6f6f1728e98852e25b8f

                                                              SHA256

                                                              dbf5f44e1b84a298dbbcad3c31a617d2f6cfa08eb5d16e05a5c28726c574d4eb

                                                              SHA512

                                                              8e745c0215d52e15702551f29efb882a5eba97b5f279ccc29293b1a9b1b8661bf71b548569f9a99fa35c35a15d1b6b288d3c381c1292418c36dc89e2fa0b3a37

                                                            • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.dll

                                                              Filesize

                                                              5.5MB

                                                              MD5

                                                              33c7ccc9b7e59aac07bff3ae5cda4153

                                                              SHA1

                                                              aba0f4d917c0769647f34ad4a210a47bb45773bb

                                                              SHA256

                                                              732b473fccd1b6a9d17008c43dbf9afd7b2db9c432de0e622ba3a99ff29d8b1b

                                                              SHA512

                                                              29d61e5e567db2ef32d9abe6578af74dd01602eb02941b9d428f6b5e3288b4202bc3663308e8d4fed2f724531c326daefbcc9fe868d969e57fa066a267350de7

                                                            • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe

                                                              Filesize

                                                              85KB

                                                              MD5

                                                              f8f4522d11178a26e97e2046f249dfa7

                                                              SHA1

                                                              8b591d9a37716e235260fb6b3f601e4ccbebf15d

                                                              SHA256

                                                              3c372a8919c28dc76414b2f30da423c3e1018b1a8444527949ce20cc3fc93ed0

                                                              SHA512

                                                              52ea881cad501cf1d5e8ac47355e862ac1bd39cb6e1ff3d362d392b6f2d676e74878832505d17a552aaa3bc8f3977da11fa3f9903722eedd23716fb46ddb7492

                                                            • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\libcurl.dll

                                                              Filesize

                                                              522KB

                                                              MD5

                                                              e31f5136d91bad0fcbce053aac798a30

                                                              SHA1

                                                              ee785d2546aec4803bcae08cdebfd5d168c42337

                                                              SHA256

                                                              ee94e2201870536522047e6d7fe7b903a63cd2e13e20c8fffc86d0e95361e671

                                                              SHA512

                                                              a1543eb1d10d25efb44f9eaa0673c82bfac5173055d04c0f3be4792984635a7c774df57a8e289f840627754a4e595b855d299070d469e0f1e637c3f35274abe6

                                                            • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\vcruntime140.dll

                                                              Filesize

                                                              99KB

                                                              MD5

                                                              7a2b8cfcd543f6e4ebca43162b67d610

                                                              SHA1

                                                              c1c45a326249bf0ccd2be2fbd412f1a62fb67024

                                                              SHA256

                                                              7d7ca28235fba5603a7f40514a552ac7efaa67a5d5792bb06273916aa8565c5f

                                                              SHA512

                                                              e38304fb9c5af855c1134f542adf72cde159fab64385533eafa5bb6e374f19b5a29c0cb5516fc5da5c0b5ac47c2f6420792e0ac8ddff11e749832a7b7f3eb5c8

                                                            • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\zlib1.dll

                                                              Filesize

                                                              113KB

                                                              MD5

                                                              75365924730b0b2c1a6ee9028ef07685

                                                              SHA1

                                                              a10687c37deb2ce5422140b541a64ac15534250f

                                                              SHA256

                                                              945e7f5d09938b7769a4e68f4ef01406e5af9f40db952cba05ddb3431dd1911b

                                                              SHA512

                                                              c1e31c18903e657203ae847c9af601b1eb38efa95cb5fa7c1b75f84a2cba9023d08f1315c9bb2d59b53256dfdb3bac89930252138475491b21749471adc129a1

                                                            • C:\Users\Admin\Downloads\Unconfirmed 14866.crdownload

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              ebb550a1805426e3b03a859a332afaa0

                                                              SHA1

                                                              151deb39ceeea73ed7501b90c37a514140235031

                                                              SHA256

                                                              5c8d84be84e68cfdd6785a190d3ce8c94ba310a24527337f5b9bf5e9ccc93318

                                                              SHA512

                                                              889a869c024effc5f3187a4267652f63c19a7a0b5e79ed33561cc1bd8645155bcffd56aafa7179dc4df0cc8ae184d64ced7a0414c62c25283e81f090d5956cfe

                                                            • memory/1672-1473-0x0000000074A50000-0x0000000075200000-memory.dmp

                                                              Filesize

                                                              7.7MB

                                                            • memory/1672-0-0x0000000074A5E000-0x0000000074A5F000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1672-1-0x0000000000790000-0x000000000079A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/1672-2-0x0000000005160000-0x000000000516A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/1672-3-0x0000000074A50000-0x0000000075200000-memory.dmp

                                                              Filesize

                                                              7.7MB

                                                            • memory/1672-5-0x0000000005C50000-0x0000000005C62000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/1996-1471-0x00007FFB52FE3000-0x00007FFB52FE5000-memory.dmp

                                                              Filesize

                                                              8KB

                                                            • memory/1996-1472-0x000001711AC80000-0x000001711AC9A000-memory.dmp

                                                              Filesize

                                                              104KB

                                                            • memory/1996-1479-0x0000017135490000-0x000001713550E000-memory.dmp

                                                              Filesize

                                                              504KB

                                                            • memory/1996-1475-0x0000017135760000-0x0000017135C9C000-memory.dmp

                                                              Filesize

                                                              5.2MB

                                                            • memory/1996-1495-0x00007FFB52FE0000-0x00007FFB53AA1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/1996-1476-0x00007FFB52FE0000-0x00007FFB53AA1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/1996-1486-0x00007FFB52FE3000-0x00007FFB52FE5000-memory.dmp

                                                              Filesize

                                                              8KB

                                                            • memory/1996-1481-0x000001711C8B0000-0x000001711C8BE000-memory.dmp

                                                              Filesize

                                                              56KB

                                                            • memory/1996-1477-0x00000171353D0000-0x000001713548A000-memory.dmp

                                                              Filesize

                                                              744KB

                                                            • memory/4168-1840-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB

                                                            • memory/4168-1504-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB

                                                            • memory/4168-1738-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB

                                                            • memory/4168-1511-0x0000026E66360000-0x0000026E66368000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/4168-1702-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB

                                                            • memory/4168-1496-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB

                                                            • memory/4168-1542-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB

                                                            • memory/4168-1916-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB

                                                            • memory/4168-1543-0x00007FFB54860000-0x00007FFB54884000-memory.dmp

                                                              Filesize

                                                              144KB

                                                            • memory/4168-1503-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB

                                                            • memory/4168-1953-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB

                                                            • memory/4168-1742-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB

                                                            • memory/4168-1968-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB

                                                            • memory/4168-1505-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB

                                                            • memory/4168-1993-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB

                                                            • memory/4168-1995-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB

                                                            • memory/4168-1513-0x0000026E66880000-0x0000026E668B8000-memory.dmp

                                                              Filesize

                                                              224KB

                                                            • memory/4168-1998-0x0000026E670F0000-0x0000026E671A2000-memory.dmp

                                                              Filesize

                                                              712KB

                                                            • memory/4168-1999-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB

                                                            • memory/4168-1514-0x0000026E667F0000-0x0000026E667FE000-memory.dmp

                                                              Filesize

                                                              56KB

                                                            • memory/4168-2019-0x0000000180000000-0x0000000180D80000-memory.dmp

                                                              Filesize

                                                              13.5MB