Analysis

  • max time kernel
    1800s
  • max time network
    1809s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27-07-2024 15:15

General

  • Target

    sdcheck/SeedsChecker.exe

  • Size

    10.5MB

  • MD5

    5f7e0d25b165b9afcc3e6ca2bb135a47

  • SHA1

    72cbc2583a2dd5078a0edb83b153f38fb5ddb085

  • SHA256

    b94bb64c9f1e39f900c095b2034d3302a2a1cfeca08096ac71ecd24b5a25c61d

  • SHA512

    fd87ba28b3cd39b7938eba27d95588cacb51dd3e46c5f79282f3a2693e78387c1032b58b1186eae052a4d33680863c609588888dff46a3fb2542860eda4329fc

  • SSDEEP

    196608:BVE0qzgg7MlG6g4kpQbjHqsQLTJeriQAu8VAbC7EzpIjtoTSam0nuYaf:BV5qz7J6gKbjq1d4iFuE+CQzpI2+l0nu

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

Default

C2

80.79.7.197:6606

80.79.7.197:7707

80.79.7.197:8808

80.79.7.197:8888

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    Runtime.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Async RAT payload 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Detected Nirsoft tools 1 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • XMRig Miner payload 20 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe
    "C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5952
    • C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe
      "C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Runtime" /tr '"C:\Users\Admin\AppData\Roaming\Runtime.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5988
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "Runtime" /tr '"C:\Users\Admin\AppData\Roaming\Runtime.exe"'
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:5136
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpF1E2.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1348
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:5760
        • C:\Users\Admin\AppData\Roaming\Runtime.exe
          "C:\Users\Admin\AppData\Roaming\Runtime.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:5984
          • C:\Users\Admin\AppData\Local\Temp\xjjlks.exe
            "C:\Users\Admin\AppData\Local\Temp\xjjlks.exe"
            5⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            PID:4644
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3088
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3916
              • C:\Windows\system32\wusa.exe
                wusa /uninstall /kb:890830 /quiet /norestart
                7⤵
                  PID:1072
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop UsoSvc
                6⤵
                • Launches sc.exe
                PID:5968
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop WaaSMedicSvc
                6⤵
                • Launches sc.exe
                PID:1080
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop wuauserv
                6⤵
                • Launches sc.exe
                PID:5356
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop bits
                6⤵
                • Launches sc.exe
                PID:5364
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop dosvc
                6⤵
                • Launches sc.exe
                PID:5940
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:4044
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:1560
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:1380
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:4804
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
                6⤵
                • Launches sc.exe
                PID:804
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
                6⤵
                • Launches sc.exe
                PID:2932
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop eventlog
                6⤵
                • Launches sc.exe
                PID:3732
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
                6⤵
                • Launches sc.exe
                PID:5908
      • C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe
        "C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\SeedsChecker.exe
          "C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1688
    • C:\ProgramData\Google\Chrome\updater.exe
      C:\ProgramData\Google\Chrome\updater.exe
      1⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4412
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5728
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5680
        • C:\Windows\system32\wusa.exe
          wusa /uninstall /kb:890830 /quiet /norestart
          3⤵
            PID:2364
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop UsoSvc
          2⤵
          • Launches sc.exe
          PID:4416
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop WaaSMedicSvc
          2⤵
          • Launches sc.exe
          PID:3436
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop wuauserv
          2⤵
          • Launches sc.exe
          PID:4352
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop bits
          2⤵
          • Launches sc.exe
          PID:1956
        • C:\Windows\system32\sc.exe
          C:\Windows\system32\sc.exe stop dosvc
          2⤵
          • Launches sc.exe
          PID:5768
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
          2⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:6044
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
          2⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:3368
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
          2⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:6064
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
          2⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:6036
        • C:\Windows\system32\conhost.exe
          C:\Windows\system32\conhost.exe
          2⤵
            PID:6040
          • C:\Windows\explorer.exe
            explorer.exe
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3040

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_socket.pyd

          Filesize

          77KB

          MD5

          d6bae4b430f349ab42553dc738699f0e

          SHA1

          7e5efc958e189c117eccef39ec16ebf00e7645a9

          SHA256

          587c4f3092b5f3e34f6b1e927ecc7127b3fe2f7fa84e8a3d0c41828583bd5cef

          SHA512

          a8f8fed5ea88e8177e291b708e44b763d105907e9f8c9e046c4eebb8684a1778383d1fba6a5fa863ca37c42fd58ed977e9bb3a6b12c5b8d9ab6ef44de75e3d1e

        • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_tkinter.pyd

          Filesize

          63KB

          MD5

          7244bcee3ec369a9c503d16e5dfd2715

          SHA1

          d3b126e07df3a6d902b12def8151957be9ca1b03

          SHA256

          6b40fe9ecc1b1749c174069f421143c63e87486294af39bbe83fbd6be797c0a1

          SHA512

          6e49dc62f4dfe61eecb25e98f8eb3685afa53c7d5b05ac48139721778a8224f85bc74bee6f29974c6fc2cebd20f0f6628b73ebf168bf8cff80b21d24a83ff92d

        • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\customtkinter\assets\themes\blue.json

          Filesize

          4KB

          MD5

          73f7bc39123ecaf46c6f682fc20509ac

          SHA1

          6ad3708cc6b59c138de6bb6e33d2072e2c0d2465

          SHA256

          89d76b8220a03a4ed4affac37d6aaeffa11f8aadb08138af42d6d0a451f2ddd8

          SHA512

          3bf016b98aad2b821b5767a7be3cf045bf13f543b30eab141543df47d4fd1c3653ac02cc825b00401594871ba5778fb63d0853f0fec061fd86e9a583c7d060c3

        • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\tk86t.dll

          Filesize

          1.4MB

          MD5

          fdc8a5d96f9576bd70aa1cadc2f21748

          SHA1

          bae145525a18ce7e5bc69c5f43c6044de7b6e004

          SHA256

          1a6d0871be2fa7153de22be008a20a5257b721657e6d4b24da8b1f940345d0d5

          SHA512

          816ada61c1fd941d10e6bb4350baa77f520e2476058249b269802be826bab294a9c18edc5d590f5ed6f8dafed502ab7ffb29db2f44292cb5bedf2f5fa609f49c

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_y0ckwg31.042.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\SeedsChecker.exe

          Filesize

          7.6MB

          MD5

          f46c6782a9eec72a6eabc539216470d6

          SHA1

          945b6d3101eed852c6071da599f5b21e5ff58f85

          SHA256

          603abcd38abeda40aa679c7ed68537a214fd7a6aeda50f06ba6954ca42e888d5

          SHA512

          8ffae1ec373cf806fcb81c12782436e2bee49cd74b6841bc00dc93bc9a005e844d801da314333b3ef0b2aeee83a6fe0688b93376f1b6142cb46f15aa8fb816ed

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\VCRUNTIME140.dll

          Filesize

          87KB

          MD5

          0e675d4a7a5b7ccd69013386793f68eb

          SHA1

          6e5821ddd8fea6681bda4448816f39984a33596b

          SHA256

          bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1

          SHA512

          cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\_bz2.pyd

          Filesize

          82KB

          MD5

          3dc8af67e6ee06af9eec52fe985a7633

          SHA1

          1451b8c598348a0c0e50afc0ec91513c46fe3af6

          SHA256

          c55821f5fdb0064c796b2c0b03b51971f073140bc210cbe6ed90387db2bed929

          SHA512

          da16bfbc66c8abc078278d4d3ce1595a54c9ef43ae8837ceb35ae2f4757b930fe55e258827036eba8218315c10af5928e30cb22c60ff69159c8fe76327280087

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\_ctypes.pyd

          Filesize

          120KB

          MD5

          f1e33a8f6f91c2ed93dc5049dd50d7b8

          SHA1

          23c583dc98aa3f6b8b108db5d90e65d3dd72e9b4

          SHA256

          9459d246df7a3c638776305cf3683946ba8db26a7de90df8b60e1be0b27e53c4

          SHA512

          229896da389d78cbdf2168753ed7fcc72d8e0e62c6607a3766d6d47842c0abd519ac4f5d46607b15e7ba785280f9d27b482954e931645337a152b8a54467c6a5

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\_lzma.pyd

          Filesize

          246KB

          MD5

          37057c92f50391d0751f2c1d7ad25b02

          SHA1

          a43c6835b11621663fa251da421be58d143d2afb

          SHA256

          9442dc46829485670a6ac0c02ef83c54b401f1570d1d5d1d85c19c1587487764

          SHA512

          953dc856ad00c3aec6aeab3afa2deb24211b5b791c184598a2573b444761db2d4d770b8b807ebba00ee18725ff83157ec5fa2e3591a7756eb718eba282491c7c

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\libffi-7.dll

          Filesize

          32KB

          MD5

          4424baf6ed5340df85482fa82b857b03

          SHA1

          181b641bf21c810a486f855864cd4b8967c24c44

          SHA256

          8c1f7f64579d01fedfde07e0906b1f8e607c34d5e6424c87abe431a2322eba79

          SHA512

          8adb94893ada555de2e82f006ab4d571fad8a1b16ac19ca4d2efc1065677f25d2de5c981473fabd0398f6328c1be1ebd4d36668ea67f8a5d25060f1980ee7e33

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\python38.dll

          Filesize

          4.0MB

          MD5

          d2a8a5e7380d5f4716016777818a32c5

          SHA1

          fb12f31d1d0758fe3e056875461186056121ed0c

          SHA256

          59ab345c565304f638effa7c0236f26041fd06e35041a75988e13995cd28ace9

          SHA512

          ad1269d1367f587809e3fbe44af703c464a88fa3b2ae0bf2ad6544b8ed938e4265aab7e308d999e6c8297c0c85c608e3160796325286db3188a3edf040a02ab7

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\select.pyd

          Filesize

          26KB

          MD5

          6ae54d103866aad6f58e119d27552131

          SHA1

          bc53a92a7667fd922ce29e98dfcf5f08f798a3d2

          SHA256

          63b81af5d3576473c17ac929bea0add5bf8d7ea95c946caf66cbb9ad3f233a88

          SHA512

          ff23f3196a10892ea22b28ae929330c8b08ab64909937609b7af7bfb1623cd2f02a041fd9fab24e4bc1754276bdafd02d832c2f642c8ecdcb233f639bdf66dd0

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tcl86t.dll

          Filesize

          1.6MB

          MD5

          c0b23815701dbae2a359cb8adb9ae730

          SHA1

          5be6736b645ed12e97b9462b77e5a43482673d90

          SHA256

          f650d6bc321bcda3fc3ac3dec3ac4e473fb0b7b68b6c948581bcfc54653e6768

          SHA512

          ed60384e95be8ea5930994db8527168f78573f8a277f8d21c089f0018cd3b9906da764ed6fcc1bd4efad009557645e206fbb4e5baef9ab4b2e3c8bb5c3b5d725

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tcl8\8.5\msgcat-1.6.1.tm

          Filesize

          33KB

          MD5

          db52847c625ea3290f81238595a915cd

          SHA1

          45a4ed9b74965e399430290bcdcd64aca5d29159

          SHA256

          4fdf70fdcedef97aa8bd82a02669b066b5dfe7630c92494a130fc7c627b52b55

          SHA512

          5a8fb4ada7b2efbf1cadd10dbe4dc7ea7acd101cb8fd0b80dad42be3ed8804fc8695c53e6aeec088c2d4c3ee01af97d148b836289da6e4f9ee14432b923c7e40

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tcl\auto.tcl

          Filesize

          20KB

          MD5

          5e9b3e874f8fbeaadef3a004a1b291b5

          SHA1

          b356286005efb4a3a46a1fdd53e4fcdc406569d0

          SHA256

          f385515658832feb75ee4dce5bd53f7f67f2629077b7d049b86a730a49bd0840

          SHA512

          482c555a0da2e635fa6838a40377eef547746b2907f53d77e9ffce8063c1a24322d8faa3421fc8d12fdcaff831b517a65dafb1cea6f5ea010bdc18a441b38790

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tcl\encoding\cp1252.enc

          Filesize

          1KB

          MD5

          5900f51fd8b5ff75e65594eb7dd50533

          SHA1

          2e21300e0bc8a847d0423671b08d3c65761ee172

          SHA256

          14df3ae30e81e7620be6bbb7a9e42083af1ae04d94cf1203565f8a3c0542ace0

          SHA512

          ea0455ff4cd5c0d4afb5e79b671565c2aede2857d534e1371f0c10c299c74cb4ad113d56025f58b8ae9e88e2862f0864a4836fed236f5730360b2223fde479dc

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tcl\http1.0\pkgIndex.tcl

          Filesize

          735B

          MD5

          10ec7cd64ca949099c818646b6fae31c

          SHA1

          6001a58a0701dff225e2510a4aaee6489a537657

          SHA256

          420c4b3088c9dacd21bc348011cac61d7cb283b9bee78ae72eed764ab094651c

          SHA512

          34a0acb689e430ed2903d8a903d531a3d734cb37733ef13c5d243cb9f59c020a3856aad98726e10ad7f4d67619a3af1018f6c3e53a6e073e39bd31d088efd4af

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tcl\init.tcl

          Filesize

          23KB

          MD5

          b900811a252be90c693e5e7ae365869d

          SHA1

          345752c46f7e8e67dadef7f6fd514bed4b708fc5

          SHA256

          bc492b19308bc011cfcd321f1e6e65e6239d4eeb620cc02f7e9bf89002511d4a

          SHA512

          36b8cdba61b9222f65b055c0c513801f3278a3851912215658bcf0ce10f80197c1f12a5ca3054d8604da005ce08da8dcd303b8544706b642140a49c4377dd6ce

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tcl\opt0.4\pkgIndex.tcl

          Filesize

          607B

          MD5

          92ff1e42cfc5fecce95068fc38d995b3

          SHA1

          b2e71842f14d5422a9093115d52f19bcca1bf881

          SHA256

          eb9925a8f0fcc7c2a1113968ab0537180e10c9187b139c8371adf821c7b56718

          SHA512

          608d436395d055c5449a53208f3869b8793df267b8476ad31bcdd9659a222797814832720c495d938e34bf7d253ffc3f01a73cc0399c0dfb9c85d2789c7f11c0

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tcl\package.tcl

          Filesize

          22KB

          MD5

          55e2db5dcf8d49f8cd5b7d64fea640c7

          SHA1

          8fdc28822b0cc08fa3569a14a8c96edca03bfbbd

          SHA256

          47b6af117199b1511f6103ec966a58e2fd41f0aba775c44692b2069f6ed10bad

          SHA512

          824c210106de7eae57a480e3f6e3a5c8fb8ac4bbf0a0a386d576d3eb2a3ac849bdfe638428184056da9e81767e2b63eff8e18068a1cf5149c9f8a018f817d3e5

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tcl\tclIndex

          Filesize

          5KB

          MD5

          e127196e9174b429cc09c040158f6aab

          SHA1

          ff850f5d1bd8efc1a8cb765fe8221330f0c6c699

          SHA256

          abf7d9d1e86de931096c21820bfa4fd70db1f55005d2db4aa674d86200867806

          SHA512

          c4b98ebc65e25df41e6b9a93e16e608cf309fa0ae712578ee4974d84f7f33bcf2a6ed7626e88a343350e13da0c5c1a88e24a87fcbd44f7da5983bb3ef036a162

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tcl\tm.tcl

          Filesize

          11KB

          MD5

          f9ed2096eea0f998c6701db8309f95a6

          SHA1

          bcdb4f7e3db3e2d78d25ed4e9231297465b45db8

          SHA256

          6437bd7040206d3f2db734fa482b6e79c68bcc950fba80c544c7f390ba158f9b

          SHA512

          e4fb8f28dc72ea913f79cedf5776788a0310608236d6607adc441e7f3036d589fd2b31c446c187ef5827fd37dcaa26d9e94d802513e3bf3300e94dd939695b30

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\button.tcl

          Filesize

          20KB

          MD5

          309ab5b70f664648774453bccbe5d3ce

          SHA1

          51bf685dedd21de3786fe97bc674ab85f34bd061

          SHA256

          0d95949cfacf0df135a851f7330acc9480b965dac7361151ac67a6c667c6276d

          SHA512

          d5139752bd7175747a5c912761916efb63b3c193dd133ad25d020a28883a1dea6b04310b751f5fcbe579f392a8f5f18ae556116283b3e137b4ea11a2c536ec6b

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\entry.tcl

          Filesize

          16KB

          MD5

          be28d16510ee78ecc048b2446ee9a11a

          SHA1

          4829d6e8ab8a283209fb4738134b03b7bd768bad

          SHA256

          8f57a23c5190b50fad00bdee9430a615ebebfc47843e702374ae21beb2ad8b06

          SHA512

          f56af7020531249bc26d88b977baffc612b6566146730a681a798ff40be9ebc04d7f80729bafe0b9d4fac5b0582b76f9530f3fe376d42a738c9bc4b3b442df1f

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\icons.tcl

          Filesize

          10KB

          MD5

          2652aad862e8fe06a4eedfb521e42b75

          SHA1

          ed22459ad3d192ab05a01a25af07247b89dc6440

          SHA256

          a78388d68600331d06bb14a4289bc1a46295f48cec31ceff5ae783846ea4d161

          SHA512

          6ecfbb8d136444a5c0dbbce2d8a4206f1558bdd95f111d3587b095904769ac10782a9ea125d85033ad6532edf3190e86e255ac0c0c81dc314e02d95cca86b596

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\listbox.tcl

          Filesize

          14KB

          MD5

          c33963d3a512f2e728f722e584c21552

          SHA1

          75499cfa62f2da316915fada2580122dc3318bad

          SHA256

          39721233855e97bfa508959b6dd91e1924456e381d36fdfc845e589d82b1b0cc

          SHA512

          ea01d8cb36d446ace31c5d7e50dfae575576fd69fd5d413941eebba7ccc1075f6774af3c69469cd7baf6e1068aa5e5b4c560f550edd2a8679124e48c55c8e8d7

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\menu.tcl

          Filesize

          37KB

          MD5

          181ed74919f081eeb34269500e228470

          SHA1

          953eb429f6d98562468327858ed0967bdc21b5ad

          SHA256

          564ac0040176cc5744e3860abc36b5ffbc648da20b26a710dc3414eae487299b

          SHA512

          220e496b464575115baf1dede838e70d5ddd6d199b5b8acc1763e66d66801021b2d7cd0e1e1846868782116ad8a1f127682073d6eacd7e73f91bced89f620109

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\panedwindow.tcl

          Filesize

          5KB

          MD5

          2da0a23cc9d6fd970fe00915ea39d8a2

          SHA1

          dfe3dc663c19e9a50526a513043d2393869d8f90

          SHA256

          4adf738b17691489c71c4b9d9a64b12961ada8667b81856f7adbc61dffeadf29

          SHA512

          b458f3d391df9522d4e7eae8640af308b4209ce0d64fd490bfc0177fde970192295c1ea7229ce36d14fc3e582c7649460b8b7b0214e0ff5629b2b430a99307d4

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\pkgIndex.tcl

          Filesize

          363B

          MD5

          a6448af2c8fafc9a4f42eaca6bf6ab2e

          SHA1

          0b295b46b6df906e89f40a907022068bc6219302

          SHA256

          cd44ee7f76c37c0c522bd0cfca41c38cdeddc74392b2191a3af1a63d9d18888e

          SHA512

          5b1a8ca5b09b7281de55460d21d5195c4ee086bebdc35fa561001181490669ffc67d261f99eaa900467fe97e980eb733c5ffbf9d8c541ede18992bf4a435c749

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\scale.tcl

          Filesize

          7KB

          MD5

          1ce32cdaeb04c75bfceea5fb94b8a9f0

          SHA1

          cc7614c9eade999963ee78b422157b7b0739894c

          SHA256

          58c662dd3d2c653786b05aa2c88831f4e971b9105e4869d866fb6186e83ed365

          SHA512

          1ee5a187615ae32f17936931b30fea9551f9e3022c1f45a2bca81624404f4e68022fcf0b03fbd61820ec6958983a8f2fbfc3ad2ec158433f8e8de9b8fcf48476

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\scrlbar.tcl

          Filesize

          12KB

          MD5

          4cbffc4e6b3f56a5890e3f7c31c6c378

          SHA1

          75db5205b311f55d1ca1d863b8688a628bf6012a

          SHA256

          6ba3e2d62bd4856d7d7ae87709fcaa23d81efc38c375c6c5d91639555a84c35d

          SHA512

          65df7ae09e06c200a8456748dc89095bb8417253e01ec4fdafb28a84483147ddc77aaf6b49be9e18a326a94972086a99044bee3ce5cf8026337dfc6972c92c04

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\spinbox.tcl

          Filesize

          15KB

          MD5

          9971530f110ac2fb7d7ec91789ea2364

          SHA1

          ab553213c092ef077524ed56fc37da29404c79a7

          SHA256

          5d6e939b44f630a29c4fcb1e2503690c453118607ff301bef3c07fa980d5075a

          SHA512

          81b4cec39b03fbeca59781aa54960f0a10a09733634f401d5553e1aaa3ebf12a110c9d555946fcdd70a9cc897514663840745241ad741dc440bb081a12dcf411

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\text.tcl

          Filesize

          32KB

          MD5

          03cc27e28e0cfce1b003c3e936797ab0

          SHA1

          c7fe5ae7f35c86ec3724f6a111eaaf2c1a18abe9

          SHA256

          bccc1039f0eb331c4bb6bd5848051bb745f242016952723478c93b009f63d254

          SHA512

          5091b10ee8446e6853ef7060ec13ab8cada0d6448f9081febd07546c061f69fc273bbf23ba7af05d8359e618dd68a5c27f0453480fe3f26e744db19bfcd115c7

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\tk.tcl

          Filesize

          22KB

          MD5

          3250ec5b2efe5bbe4d3ec271f94e5359

          SHA1

          6a0fe910041c8df4f3cdc19871813792e8cc4e4c

          SHA256

          e1067a0668debb2d8e8ec3b7bc1aec3723627649832b20333f9369f28e4dfdbf

          SHA512

          f8e403f3d59d44333bce2aa7917e6d8115bec0fe5ae9a1306f215018b05056467643b7aa228154ddced176072bc903dfb556cb2638f5c55c1285c376079e8fe3

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\ttk\button.tcl

          Filesize

          2KB

          MD5

          ea7cf40852afd55ffda9db29a0e11322

          SHA1

          b7b42fac93e250b54eb76d95048ac3132b10e6d8

          SHA256

          391b6e333d16497c4b538a7bdb5b16ef11359b6e3b508d470c6e3703488e3b4d

          SHA512

          123d78d6ac34af4833d05814220757dccf2a9af4761fe67a8fe5f67a0d258b3c8d86ed346176ffb936ab3717cfd75b4fab7373f7853d44fa356be6e3a75e51b9

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\ttk\combobox.tcl

          Filesize

          12KB

          MD5

          fbcaa6a08d9830114248f91e10d4c918

          SHA1

          fa63c94824bebd3531086816650d3f3fa73fe434

          SHA256

          9d80aa9701e82862467684d3dff1a9ec5bbc2bbba4f4f070518bbde7e38499bb

          SHA512

          b377c31cc9137851679cba0560efe4265792d1576bd781dd42c22014a7a8f3d10d9d48a1154bb88a2987197594c8b728b71fa689ce1b32928f8513796a6a0aa3

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\ttk\cursors.tcl

          Filesize

          3KB

          MD5

          74596004dfdbf2ecf6af9c851156415d

          SHA1

          933318c992b705bf9f8511621b4458ecb8772788

          SHA256

          7bdffa1c2692c5d1cf67b518f9acb32fa4b4d9936ed076f4db835943bc1a00d6

          SHA512

          0d600b21db67bf9dadbdd49559573078efb41e473e94124ac4d2551bc10ec764846dc1f7674daa79f8d2a8aeb4ca27a5e11c2f30ede47e3ecee77d60d7842262

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\ttk\entry.tcl

          Filesize

          16KB

          MD5

          f9b29ab14304f18e32821a29233be816

          SHA1

          6d0253274d777e081fa36cc38e51c2abb9259d0e

          SHA256

          62d1df52c510a83103badab4f3a77abb1aa3a0e1e21f68ece0cecca2ca2f1341

          SHA512

          698db665e29b29864f9fe65934cca83a5092d81d5130ffd1eac68c51327ae9ebc007a60a60e1af37063017e448ce84a4024d4a412990a1078287b605df344c70

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\ttk\fonts.tcl

          Filesize

          5KB

          MD5

          7017b5c1d53f341f703322a40c76c925

          SHA1

          57540c56c92cc86f94b47830a00c29f826def28e

          SHA256

          0eb518251fbe9cf0c9451cc1fef6bb6aee16d62da00b0050c83566da053f68d0

          SHA512

          fd18976a8fbb7e59b12944c2628dbd66d463b2f7342661c8f67160df37a393fa3c0ce7fdda31073674b7a46e0a0a7d0a7b29ebe0d9488afd9ef8b3a39410b5a8

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\ttk\menubutton.tcl

          Filesize

          4KB

          MD5

          db24841643cebd38d5ffd1d42b42e7f4

          SHA1

          e394af7faf83fad863c7b13d855fcf3705c4f1c7

          SHA256

          81b0b7818843e293c55ff541bd95168db51fe760941d32c7cde9a521bb42e956

          SHA512

          380272d003d5f90c13571952d0c73f5fce2a22330f98f29707f3d5bfc29c99d9bf11a947cf2ca64cf7b8df5e4afe56ffa00f9455bb30d15611fc5c86130346be

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\ttk\notebook.tcl

          Filesize

          5KB

          MD5

          82c9dfc512e143dda78f91436937d4dd

          SHA1

          26abc23c1e0c201a217e3cea7a164171418973b0

          SHA256

          d1e5267cde3d7be408b4c94220f7e1833c9d452bb9ba3e194e12a5eb2f9adb80

          SHA512

          a9d3c04ad67e0dc3f1c12f9e21ef28a61fa84dbf710313d4ca656bdf35dfbbfba9c268c018004c1f5614db3a1128025d795bc14b4fffaa5603a5313199798d04

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\ttk\panedwindow.tcl

          Filesize

          1KB

          MD5

          a12915fa5caf93e23518e9011200f5a4

          SHA1

          a61f665a408c10419fb81001578d99b43d048720

          SHA256

          ce0053d637b580170938cf552b29ae890559b98eb28038c2f0a23a265ddeb273

          SHA512

          669e1d66f1223cca6ceb120914d5d876bd3cf401ee4a46f35825361076f19c7341695596a7dbb00d6cff4624666fb4e7a2d8e7108c3c56a12bda7b04e99e6f9a

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\ttk\progress.tcl

          Filesize

          1KB

          MD5

          b0074341a4bda36bcdff3ebcae39eb73

          SHA1

          d070a01cc5a787249bc6dad184b249c4dd37396a

          SHA256

          a9c34f595e547ce94ee65e27c415195d2b210653a9ffcfb39559c5e0fa9c06f8

          SHA512

          af23563602886a648a42b03cc5485d84fcc094ab90b08df5261434631b6c31ce38d83a3a60cc7820890c797f6c778d5b5eff47671ce3ee4710ab14c6110dcc35

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\ttk\scale.tcl

          Filesize

          2KB

          MD5

          b41a9df31924dea36d69cb62891e8472

          SHA1

          4c2877fbb210fdbbde52ea8b5617f68ad2df7b93

          SHA256

          25d0fe2b415292872ef7acdb2dfa12d04c080b7f9b1c61f28c81aa2236180479

          SHA512

          a50db6da3d40d07610629de45f06a438c6f2846324c3891c54c99074cfb7beed329f27918c8a85badb22c6b64740a2053b891f8e5d129d9b0a1ff103e7137d83

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\ttk\scrollbar.tcl

          Filesize

          3KB

          MD5

          93181dbe76ef9c39849a09242d6df8c0

          SHA1

          de3b47afc3e5371bf1cd0541790a9b78a97570ab

          SHA256

          5932043286a30a3cffb2b6ce68ccdb9172a718f32926e25d3a962ae63cad515c

          SHA512

          5c85284e063a5de17f6ce432b3ef899d046a78725bd1f930229576bed1116c03a3ee0611b988e9903f47da8f694483e5a76464450c48eb14622f6784004b8f7e

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\ttk\spinbox.tcl

          Filesize

          4KB

          MD5

          86bca3ab915c2774425b70420e499140

          SHA1

          fd4798d79eeba9cffabcb2548068591db531a716

          SHA256

          51f8a6c772648541684b48622ffe41b77871a185a8acd11e9dec9ec41d65d9cd

          SHA512

          659fb7e1631ed898e3c11670a04b953eb05cecb42a3c5efbdd1bd97a7f99061920fd5db3915476f224bb2c72358623e1b474b0fc3fbb7fd3734487b87a388fd7

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\ttk\ttk.tcl

          Filesize

          4KB

          MD5

          e38b399865c45e49419c01ff2addce75

          SHA1

          f8a79cbc97a32622922d4a3a5694bccb3f19decb

          SHA256

          61baa0268770f127394a006340d99ce831a1c7ad773181c0c13122f7d2c5b7f6

          SHA512

          285f520b648f5ec70dd79190c3b456f4d6da2053210985f9e2c84139d8d51908296e4962b336894ee30536f09fae84b912bc2abf44a7011620f66cc5d9f71a8c

        • C:\Users\Admin\AppData\Local\Temp\onefile_2276_133665710566559412\tk\ttk\utils.tcl

          Filesize

          8KB

          MD5

          65193fe52d77b8726b75fbf909ee860a

          SHA1

          991dedd4666462dd9776fdf6c21f24d6cf794c85

          SHA256

          c7cc9a15cfa999cf3763772729cc59f629e7e060af67b7d783c50530b9b756e1

          SHA512

          e43989f5f368d2e19c9a3521fb82c6c1dd9eeb91df936a980ffc7674c8b236cb84e113908b8c9899b85430e8fc30315bdec891071822d701c91c5978096341b7

        • C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe

          Filesize

          216KB

          MD5

          6ff8156ec6df07062b3a9f9594604a2b

          SHA1

          608adce74f2461d853aa5dc7590dec9daa948019

          SHA256

          1fddeef51fb61303fcd232c0d7bd9bb45cf9d7b6a4377d8ccb479ae562ae79be

          SHA512

          f40aae3ead07bcdcc7ddd0e4800026b0f9a6f50b6f1f1338ada10d63c05eb6ec0d33cfa507227c0ff46ba63193014d73e6eadc03edd31490ee982546ad64aada

        • C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe

          Filesize

          10.5MB

          MD5

          2ebfecade19e4b41e1968a8b5e49f163

          SHA1

          2e419a0dd67f1532ce71091f3623f992ce94c21c

          SHA256

          6851f7b4b2fc51091056aeca5616be222cf212196bef0af705ee73ff068d94e2

          SHA512

          0e105a0b503abb526817aa982d2b709b1cfdc044aa01fd93613a8cc3ed96b4c772474099bbd66be00af2873760adbecf940fe65228f5aa085443492bb509fa1f

        • C:\Users\Admin\AppData\Local\Temp\xjjlks.exe

          Filesize

          2.7MB

          MD5

          5ec623cbf323aec2d7f5072659f8e159

          SHA1

          3c18b445940c46d59524b8bc0fd939814ad84b82

          SHA256

          f94389fea54cccfd21859ccdd66156c1a41bfecc264f1b178caa47e7d96a2331

          SHA512

          4c0867225201ca48499a1ff266c2d0d0b18e3dbf0b3f65b61cc5aea4f68a6dd3997b85373e0e3739854dade712b4b693686abb4faebf7e10e4116a6670936429

        • memory/1704-1172-0x00007FFDB18E0000-0x00007FFDB23A2000-memory.dmp

          Filesize

          10.8MB

        • memory/1704-647-0x00007FFDB18E0000-0x00007FFDB23A2000-memory.dmp

          Filesize

          10.8MB

        • memory/1704-21-0x00007FFDB18E0000-0x00007FFDB23A2000-memory.dmp

          Filesize

          10.8MB

        • memory/1704-18-0x00000000013B0000-0x00000000013C6000-memory.dmp

          Filesize

          88KB

        • memory/1704-15-0x0000000000B60000-0x0000000000B9A000-memory.dmp

          Filesize

          232KB

        • memory/3040-1250-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1258-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1267-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1266-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1265-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1264-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1263-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1262-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1261-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1260-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1249-0x0000000001460000-0x0000000001480000-memory.dmp

          Filesize

          128KB

        • memory/3040-1248-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1259-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1244-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1257-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1256-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1255-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1253-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1254-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1251-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1252-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1245-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1243-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1242-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1246-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3040-1247-0x0000000140000000-0x0000000140848000-memory.dmp

          Filesize

          8.3MB

        • memory/3088-1202-0x000001E461AC0000-0x000001E461C0F000-memory.dmp

          Filesize

          1.3MB

        • memory/3088-1196-0x000001E449440000-0x000001E449462000-memory.dmp

          Filesize

          136KB

        • memory/5728-1223-0x00000225ED5F0000-0x00000225ED5FA000-memory.dmp

          Filesize

          40KB

        • memory/5728-1228-0x00000225ED920000-0x00000225ED926000-memory.dmp

          Filesize

          24KB

        • memory/5728-1221-0x00000225ED800000-0x00000225ED81C000-memory.dmp

          Filesize

          112KB

        • memory/5728-1222-0x00000225ED820000-0x00000225ED8D3000-memory.dmp

          Filesize

          716KB

        • memory/5728-1224-0x00000225ED900000-0x00000225ED91C000-memory.dmp

          Filesize

          112KB

        • memory/5728-1225-0x00000225ED8E0000-0x00000225ED8EA000-memory.dmp

          Filesize

          40KB

        • memory/5728-1226-0x00000225ED940000-0x00000225ED95A000-memory.dmp

          Filesize

          104KB

        • memory/5728-1227-0x00000225ED8F0000-0x00000225ED8F8000-memory.dmp

          Filesize

          32KB

        • memory/5728-1232-0x00000225ED340000-0x00000225ED48F000-memory.dmp

          Filesize

          1.3MB

        • memory/5728-1229-0x00000225ED930000-0x00000225ED93A000-memory.dmp

          Filesize

          40KB

        • memory/5952-40-0x00007FFDB18E0000-0x00007FFDB23A2000-memory.dmp

          Filesize

          10.8MB

        • memory/5952-0-0x00007FFDB18E3000-0x00007FFDB18E5000-memory.dmp

          Filesize

          8KB

        • memory/5952-1-0x0000000000090000-0x0000000000B22000-memory.dmp

          Filesize

          10.6MB

        • memory/5952-6-0x00007FFDB18E0000-0x00007FFDB23A2000-memory.dmp

          Filesize

          10.8MB

        • memory/5984-1181-0x00000000014D0000-0x00000000014F4000-memory.dmp

          Filesize

          144KB

        • memory/5984-1180-0x0000000001400000-0x000000000140A000-memory.dmp

          Filesize

          40KB

        • memory/5984-1179-0x00000000014B0000-0x00000000014CE000-memory.dmp

          Filesize

          120KB

        • memory/5984-1178-0x000000001BF30000-0x000000001BFB0000-memory.dmp

          Filesize

          512KB

        • memory/5984-1177-0x000000001CE60000-0x000000001CED6000-memory.dmp

          Filesize

          472KB

        • memory/5984-1176-0x000000001BE40000-0x000000001BF20000-memory.dmp

          Filesize

          896KB

        • memory/6040-1237-0x0000000140000000-0x000000014000E000-memory.dmp

          Filesize

          56KB

        • memory/6040-1236-0x0000000140000000-0x000000014000E000-memory.dmp

          Filesize

          56KB

        • memory/6040-1234-0x0000000140000000-0x000000014000E000-memory.dmp

          Filesize

          56KB

        • memory/6040-1238-0x0000000140000000-0x000000014000E000-memory.dmp

          Filesize

          56KB

        • memory/6040-1235-0x0000000140000000-0x000000014000E000-memory.dmp

          Filesize

          56KB

        • memory/6040-1241-0x0000000140000000-0x000000014000E000-memory.dmp

          Filesize

          56KB