Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/08/2024, 20:07

General

  • Target

    https://cdn.discordapp.com/attachments/1270762180274290711/1270764348108832799/Boostrapper.exe?ex=66b4e306&is=66b39186&hm=1a2eb0d32cb09d36fcda5516b485c0ea3483e6fed3887747a2ca9ba8cc58fcc9&

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 64 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1270762180274290711/1270764348108832799/Boostrapper.exe?ex=66b4e306&is=66b39186&hm=1a2eb0d32cb09d36fcda5516b485c0ea3483e6fed3887747a2ca9ba8cc58fcc9&
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb12246f8,0x7ffdb1224708,0x7ffdb1224718
      2⤵
        PID:3404
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:2
        2⤵
          PID:3176
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4216
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:8
          2⤵
            PID:5012
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
            2⤵
              PID:1840
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
              2⤵
                PID:220
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:8
                2⤵
                  PID:2948
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1560
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:1
                  2⤵
                    PID:1624
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:1
                    2⤵
                      PID:1832
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5676 /prefetch:8
                      2⤵
                        PID:3636
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:1
                        2⤵
                          PID:1628
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:1
                          2⤵
                            PID:4664
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:1
                            2⤵
                              PID:3412
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6176 /prefetch:8
                              2⤵
                                PID:3076
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1736
                              • C:\Users\Admin\Downloads\Boostrapper.exe
                                "C:\Users\Admin\Downloads\Boostrapper.exe"
                                2⤵
                                • Executes dropped EXE
                                PID:4708
                                • C:\Users\Admin\Downloads\Boostrapper.exe
                                  "C:\Users\Admin\Downloads\Boostrapper.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1040
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "ver"
                                    4⤵
                                      PID:6048
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                      4⤵
                                        PID:5528
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic csproduct get uuid
                                          5⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3200
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                        4⤵
                                          PID:4840
                                          • C:\Windows\System32\Wbem\WMIC.exe
                                            wmic path win32_VideoController get name
                                            5⤵
                                            • Detects videocard installed
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:7372
                                    • C:\Users\Admin\Downloads\Boostrapper.exe
                                      "C:\Users\Admin\Downloads\Boostrapper.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      PID:2900
                                      • C:\Users\Admin\Downloads\Boostrapper.exe
                                        "C:\Users\Admin\Downloads\Boostrapper.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5768
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c "ver"
                                          4⤵
                                            PID:6040
                                      • C:\Users\Admin\Downloads\Boostrapper.exe
                                        "C:\Users\Admin\Downloads\Boostrapper.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        PID:988
                                        • C:\Users\Admin\Downloads\Boostrapper.exe
                                          "C:\Users\Admin\Downloads\Boostrapper.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5516
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c "ver"
                                            4⤵
                                              PID:6004
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,989673419583351861,16712300743506155767,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:2
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5216
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:2124
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:4060
                                          • C:\Windows\System32\rundll32.exe
                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                            1⤵
                                              PID:6108
                                            • C:\Users\Admin\Downloads\Boostrapper.exe
                                              "C:\Users\Admin\Downloads\Boostrapper.exe"
                                              1⤵
                                              • Executes dropped EXE
                                              PID:1216
                                              • C:\Users\Admin\Downloads\Boostrapper.exe
                                                "C:\Users\Admin\Downloads\Boostrapper.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                PID:3444
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                  3⤵
                                                    PID:3580
                                              • C:\Windows\system32\taskmgr.exe
                                                "C:\Windows\system32\taskmgr.exe" /7
                                                1⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:5184
                                              • C:\Windows\system32\taskmgr.exe
                                                "C:\Windows\system32\taskmgr.exe" /7
                                                1⤵
                                                • Checks SCSI registry key(s)
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:7416

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                9b008261dda31857d68792b46af6dd6d

                                                SHA1

                                                e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3

                                                SHA256

                                                9ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da

                                                SHA512

                                                78853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                0446fcdd21b016db1f468971fb82a488

                                                SHA1

                                                726b91562bb75f80981f381e3c69d7d832c87c9d

                                                SHA256

                                                62c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222

                                                SHA512

                                                1df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                Filesize

                                                186B

                                                MD5

                                                094ab275342c45551894b7940ae9ad0d

                                                SHA1

                                                2e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e

                                                SHA256

                                                ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3

                                                SHA512

                                                19d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                36c8fd6f9d814bdae93f73075f5f2dbd

                                                SHA1

                                                7bda91fdb6c7859baf5d5d6c3c75d56407714df7

                                                SHA256

                                                08a4e0b5d357130f1a49c9d1524061575bf28c37cdd219b48b08969ac083b410

                                                SHA512

                                                debbfe2c53f7d395651ef8c427d0eaaa832bfeed2e94c9310bd4df9a9d8025db755d933c9ecb706073256cbd77cbdd3e576868e53ba7a4246236955cb0ef9baa

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                324dd0ec1f6e7fda7f6101886154d8ab

                                                SHA1

                                                c657d5dfe4b29c82b60fbe2a15b9d5d7c6bba4ae

                                                SHA256

                                                81ae964b6c7d66e96ad8cea99e1c49a3fb10c24e5c36b5b2d510da92b94290d6

                                                SHA512

                                                3e5ef15fd8dbb2ce2610ae8e80433b614ead1d34b1f75394a79febfb24046afa766492e359d9821ecc8361fd5e930c756328a79ed3c8429f87d85c7a42e89e5e

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                46295cac801e5d4857d09837238a6394

                                                SHA1

                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                SHA256

                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                SHA512

                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                206702161f94c5cd39fadd03f4014d98

                                                SHA1

                                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                SHA256

                                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                SHA512

                                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                a1ff59ebba558be2e011d060f4bb2331

                                                SHA1

                                                c30fccc5343e1c9999d6e38667a33ef5c00cebb3

                                                SHA256

                                                b14e2e487cca13ce69aef62a766fd66b901b1ead3331a52f9cffbc5568b044a6

                                                SHA512

                                                ee89290c714bcd4ffe823d5b677b433e00502d7a0cbece47f92001f99e6ae3510b8eb4e188df26a9560560fce810a9d7b1922488e3d63056d9a20f671a3d1502

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                12KB

                                                MD5

                                                48d157c28824332faeb8354f0b06ab58

                                                SHA1

                                                a9ff2f2eb22853e478f667b121debd7a8f4b4c31

                                                SHA256

                                                7af931dbb772dd2bb895e317c8c43149c6c26934c563a3c4d3c1bc1ab3c47ed1

                                                SHA512

                                                fc5fb74e18a5dd090d0a2899cf2db902209cb3d025e6cd975852730b68140d760eda8e059cb5b6d547392325c1c2a6702c3e0b7bce5380792d32e765a36960da

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI29002\pycountry\locales\sr@latin\LC_MESSAGES\iso3166-2.mo

                                                Filesize

                                                118KB

                                                MD5

                                                540ca9b22149c3688036b7d0e0979a02

                                                SHA1

                                                aa908ea7c8e8583ea7b712a90e290ad085a69fd2

                                                SHA256

                                                8e85ae3da5e61a4b629ae3d2ac47898c361664ca1c4c01cd0617afe07c723a4d

                                                SHA512

                                                dbf239521d6da964a0b5dc98f4ec8e3d6312b24d02313874f64144137901d80e3b225d332f953c8ecf518fbeefcf8ad1a5e3b7c015828894f2721b719f585e79

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\VCRUNTIME140.dll

                                                Filesize

                                                96KB

                                                MD5

                                                f12681a472b9dd04a812e16096514974

                                                SHA1

                                                6fd102eb3e0b0e6eef08118d71f28702d1a9067c

                                                SHA256

                                                d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

                                                SHA512

                                                7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\VCRUNTIME140_1.dll

                                                Filesize

                                                37KB

                                                MD5

                                                75e78e4bf561031d39f86143753400ff

                                                SHA1

                                                324c2a99e39f8992459495182677e91656a05206

                                                SHA256

                                                1758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e

                                                SHA512

                                                ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\_asyncio.pyd

                                                Filesize

                                                34KB

                                                MD5

                                                936e44a303a5957709434a0c6bf4532e

                                                SHA1

                                                e35f0b78f61797d9277741a1ee577b5fe7af3d62

                                                SHA256

                                                11f1062fafb4fbca92e3b2cef97ab66ec011142f5b0312e74815decd93be458b

                                                SHA512

                                                cebe905b718825c1841e9c0e83dfdac95d0ff50b116ab3b91b05ca21f86f1482f5b1e13988c969244c644d17bd378792ac4967caa721f0b0e858cd92859af154

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\_bz2.pyd

                                                Filesize

                                                46KB

                                                MD5

                                                af3d45698d379c97a90cca9625bc5926

                                                SHA1

                                                0783866af330c1029253859574c369901969208e

                                                SHA256

                                                47af0730824f96865b5e20f8bba34b0d5f3a330087411adba71269312bf7ccec

                                                SHA512

                                                117e95d2ba0432f5ece882ad67a3fbf2e2cd251b4327a0d66b3fffd444e2d1813ddb568321bde1636b4180d19607db6103df145153e4ff84e9be601fd2dd5691

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\_cffi_backend.cp311-win_amd64.pyd

                                                Filesize

                                                70KB

                                                MD5

                                                85ea029283f963773fd11fc6db68e58d

                                                SHA1

                                                1e155b263df08417265d0be063ec8ff5c2b7e26c

                                                SHA256

                                                a92281031d1373d3c71c36689b6499c144f0667c7fc56b14bb8abd107942a0c2

                                                SHA512

                                                04e8420f0372ba5972a4508ef2f4fec18d8403b3267d41f0d8b56e3bf5a45559f87b883c455255147f55160f9a6cb26ac902e599818bdfa8d4a02959b0a72c67

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\_ctypes.pyd

                                                Filesize

                                                57KB

                                                MD5

                                                2346cf6a1ad336f3ee23c4ec3ff7871c

                                                SHA1

                                                e36b759c0b78d2def431aa11bcbb7d7cf02f1eea

                                                SHA256

                                                490a11d03dd3aeb05a410eb0d285e3da788e73b643ea9914fffd5a2c102dc1df

                                                SHA512

                                                7a92de4937b23952e2a31bb09a58b2ad81c06da23704e4b4f964eb42948adad1a1e57920c021283da1b7154e7ac19e46031ffee6b69a73acbc85d95ef45bf8ff

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\_decimal.pyd

                                                Filesize

                                                104KB

                                                MD5

                                                9b801838394e97e30c99dcf5f9fcc8fa

                                                SHA1

                                                33fb049b2f98bcb2f2cb9508be2408a6698243be

                                                SHA256

                                                15668e03f9c55f07184ec9c048a8569f7d7ebd9ea6dbef145f1f3b581f8623f3

                                                SHA512

                                                5f074c82f344ca43a07a59132fab59e3504e314a2f7673bfec906782b947daf8fe45a1b956f72502eae72f01369a3bb1fbb73b10dc605d43b889a6700bd98a28

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\_hashlib.pyd

                                                Filesize

                                                33KB

                                                MD5

                                                7fd141630dfa2500f5bf4c61e2c2d034

                                                SHA1

                                                0f8d1dfae2cbce1ad714c93216f01bf7001aabda

                                                SHA256

                                                689f0ac1d44481688cd4ae90b6f801176a52ff4bb4170c62575ea58f44452e15

                                                SHA512

                                                c6b7b1aefb7280f38d63f4ab84a349ebb696ca7300b7a451e7a994baff7e0a83fb4488c43ed3160b94dec74e0d27417d68913056b3006c8c6da11e39681f512e

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\_lzma.pyd

                                                Filesize

                                                84KB

                                                MD5

                                                ab6a735ad62592c7c8ea0b06cb57317a

                                                SHA1

                                                e27a0506800b5bbc2b350e39899d260164af2cd1

                                                SHA256

                                                0ebdf15c1c6d59e49716dfb4601f0abe6383449c70db1a349c6ad486742144a8

                                                SHA512

                                                9a285593cd8cc29844688723d8907e55a9f8a3109f9538cc4140912cc973f495de32779a4cd4a48dc62d680fdf81a5797e4e9c33f236a803082dfc3c00d02060

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\_multiprocessing.pyd

                                                Filesize

                                                25KB

                                                MD5

                                                241a977372d63b46b6ae4f7227579cc3

                                                SHA1

                                                21c8fa02217ec69c5cc9a1cc9edaa5de6f8d9f91

                                                SHA256

                                                04e56f1c6919f2987f205e9e3afa16d945eeaffa415c746104ccb7763c067f9c

                                                SHA512

                                                7aeaa94a5cd46d604370e430c72724b683e149af7e032c85708e33bfb94fb6a9ccc52c70bc701dfb94b4ae55d4e8acd8e394efb6cd81466fd9fa1a6addaa4ecc

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\_overlapped.pyd

                                                Filesize

                                                30KB

                                                MD5

                                                ef52dc3e7d12795745e23487026a5b5e

                                                SHA1

                                                6c9f488a9eaabdc6db11ed2c32231d518a8b8f42

                                                SHA256

                                                b1b56328df4b19cf04586303f693979536253078fc7017b4ac4ae6d730296b1f

                                                SHA512

                                                8b3c311bf4a54eaa21fa1db058037b274bd3b9e838e844537269f8e0102ad47ca7181e73bbb4f5269100cfe82499bb0787bc04943b02e36ea0ab26bfa8e65326

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\_queue.pyd

                                                Filesize

                                                24KB

                                                MD5

                                                71955beaf83aca364ed64285021781ca

                                                SHA1

                                                cac93d08f9085079fb32e6fc6d8e4fc8cd9115e6

                                                SHA256

                                                3df280391d7275e73aef70af228bb21c03434147ae9fe31e8c620ea151e08b30

                                                SHA512

                                                9b055a0273ace0f9b673e015a20c8867689090608fffaf85c54636f061cf595de1e6c9bfc2d8ea75fa4dd247b4af0493022f24d6a931b53e7f60009a85b45601

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\_socket.pyd

                                                Filesize

                                                41KB

                                                MD5

                                                53dc1aa457a1e3b4f6c8baed19a6ca0a

                                                SHA1

                                                290a572e981cc5ce896dc52a53f112d9eaaefc39

                                                SHA256

                                                26200892f616f859e82c167701ab866b8291eabbe808dd18c434cc80ebeedf19

                                                SHA512

                                                460de92115288e0e95fd03837df775e5f34425784c18ab7e9ad0885511166371647a6f06d95ffa6c3437de69895d46cd4cddcda2841ccdb5ef268b1a857837e6

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\_sqlite3.pyd

                                                Filesize

                                                54KB

                                                MD5

                                                1c5e0718dce15682d32185f1e1f8df7d

                                                SHA1

                                                f59662db717663ed1589328c5749bb8b44a0d053

                                                SHA256

                                                56f74ec6490b916c513b618635edaa22cb2374a92e5f79549c1e2b7c5c37f31d

                                                SHA512

                                                702f8348d2fe08ec10e0120129e64c12368c971ea52852cd0c7d26fd159f5b34bc808b9b318168aaa81366ed4944909e305d4e9727f0374d921eddb54ea22cf3

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\_ssl.pyd

                                                Filesize

                                                60KB

                                                MD5

                                                df5a6f6c547300a7c87005eb0fafcfa0

                                                SHA1

                                                c792342e964a1c8a776e5203f3eee7908e6cad09

                                                SHA256

                                                dea09b9750c26813130ca32db0b4455796e12a3d61bb52066d5a53302bcce0ce

                                                SHA512

                                                018a79871faa2cf6a1644e96f10750ddccccd56436720faf760808b1997940f9bcd2866a4533b903058ab608629ff8ed46fadb788e4a6714b19775d557dd69b0

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\_uuid.pyd

                                                Filesize

                                                21KB

                                                MD5

                                                cf378e1866edaa02db65a838f0e0ad8e

                                                SHA1

                                                cc66b98b3289a126fa4cf960d89cbbecff0f5aa8

                                                SHA256

                                                caabfac7123e70906fafe3a34d11c0c87c62695b2716a5f95b032bb54982744e

                                                SHA512

                                                cdb6fb5861fee4eeee49dd79ba164ef8538235b0b41e505dd59f1b5a79256390a4bb920ade9ff58abdc41c738ec6f316d387df4f588b673d8f324e5c1c32a9c5

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\base_library.zip

                                                Filesize

                                                1.4MB

                                                MD5

                                                481da210e644d6b317cafb5ddf09e1a5

                                                SHA1

                                                00fe8e1656e065d5cf897986c12ffb683f3a2422

                                                SHA256

                                                3242ea7a6c4c712f10108a619bf5213878146547838f7e2c1e80d2778eb0aaa0

                                                SHA512

                                                74d177794f0d7e67f64a4f0c9da4c3fd25a4d90eb909e942e42e5651cc1930b8a99eef6d40107aa8756e75ffbcc93284b916862e24262df897aaac97c5072210

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\libcrypto-1_1.dll

                                                Filesize

                                                1.1MB

                                                MD5

                                                571796599d616a0d12aa34be09242c22

                                                SHA1

                                                0e0004ab828966f0c8a67b2f10311bb89b6b74ac

                                                SHA256

                                                6242d2e13aef871c4b8cfd75fc0f8530e8dccfeaba8f1b66280e9345f52b833b

                                                SHA512

                                                7362a6c887600fafc1a45413823f006589bb95a76ac052b6c7022356a7a9a6e8cd3e76f59cecf152e189323791d9626a6fdb7a98bf3a5250d517b746c3e84e84

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\libffi-8.dll

                                                Filesize

                                                24KB

                                                MD5

                                                24ea21ebcc3bef497d2bd208e7986f88

                                                SHA1

                                                d936f79431517b9687ee54d837e9e4be7afc082d

                                                SHA256

                                                18c097ef19f3e502a025c1d63cfec73a4fa30c5482286f4000d40d4784a0070a

                                                SHA512

                                                1bdbeddd812ecc2cdfbbf3498b0a8ef551cc18ce73fc30eb40b415fab0cdd20b80057a25a33ca2f9247b08978838df3587a3caf6e1a8e108c5a9a4f67dd75a94

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\libssl-1_1.dll

                                                Filesize

                                                203KB

                                                MD5

                                                aabafc5d0e409123ae5e4523d9b3dee2

                                                SHA1

                                                4d0a1834ed4e4ceecb04206e203d916eb22e981b

                                                SHA256

                                                84e4c37fb28b6cf79e2386163fe6bb094a50c1e8825a4bcdb4cb216f4236d831

                                                SHA512

                                                163f29ad05e830367af3f2107e460a587f4710b8d9d909a01e04cd8cfee115d8f453515e089a727a6466ce0e2248a56f14815588f7df6d42fe1580e1b25369cd

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\luna.aes

                                                Filesize

                                                6.4MB

                                                MD5

                                                dc3a2efb7de092d32e3ea0efc14d179f

                                                SHA1

                                                17fa589246ec7f5397166a493984838ad40da13a

                                                SHA256

                                                3755e5804fae575df7b95008e1f3c8e08326e4f284fb88dea91a03c6f056854f

                                                SHA512

                                                3720362c397bc3afe78de39fb1627c14777e7be5bd6a3b440738d4c54bd73fe60d5d62dfc3168e43244e39881f8903cdc6bf833ad5a11312a331958f307a0470

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\pyexpat.pyd

                                                Filesize

                                                86KB

                                                MD5

                                                c498ed10d7245560412f9df527508b5c

                                                SHA1

                                                b84b57a54a1a9c5631f4d0b8ac31694786cc822b

                                                SHA256

                                                297ec9e654500400ba5731101b65d29c14d0305ae9f6c05b9763f57ab150b07d

                                                SHA512

                                                ab8bcf6e4a395944316e19aa7aa598e8bfeaa038f4ae086fcede6d01747b670896d640dbf4992630fcbd737d2be3ab627b7be8ad36437629671387f4aaf85957

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\python3.dll

                                                Filesize

                                                64KB

                                                MD5

                                                34e49bb1dfddf6037f0001d9aefe7d61

                                                SHA1

                                                a25a39dca11cdc195c9ecd49e95657a3e4fe3215

                                                SHA256

                                                4055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281

                                                SHA512

                                                edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\python311.dll

                                                Filesize

                                                1.6MB

                                                MD5

                                                4fcf14c7837f8b127156b8a558db0bb2

                                                SHA1

                                                8de2711d00bef7b5f2dcf8a2c6871fa1db67cf1f

                                                SHA256

                                                a67df621a383f4ce5a408e0debe3ebc49ffc766d6a1d6d9a7942120b8ec054dc

                                                SHA512

                                                7a6195495b48f66c35b273a2c9d7ff59e96a4180ea8503f31c8b131167c6cdddd8d6fe77388a34096964a73c85eab504281a14ae3d05350cfee5c51d2491cec8

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\pywin32_system32\pythoncom311.dll

                                                Filesize

                                                193KB

                                                MD5

                                                471d17f08b66f1489516d271ebf831e3

                                                SHA1

                                                0296e3848de8e99c55bab82c7b181112fb30e840

                                                SHA256

                                                39f4e62d0366897e20eb849cdc78f4ea988605ba86a95c9c741f2797086a6788

                                                SHA512

                                                857a92588f3363ce9e139fe92222ece6d7d926fdcb2c5c1febfb6328389f3e5f8b82063aface5b61015de031e6bfda556067f49f9cc8103664749d8581da1587

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\pywin32_system32\pywintypes311.dll

                                                Filesize

                                                62KB

                                                MD5

                                                04ce7664658c9c18527594708550d59e

                                                SHA1

                                                1db7e6722aaea33d92fba441fca294600d904103

                                                SHA256

                                                e3be247830c23a1751e1bab98d02ba5da3721d2a85469eda3764fc583ca2a6ff

                                                SHA512

                                                e9744b2eee5fa848d5ac83622a6b1c1a1009d7ad8a944bda7a118dd75d8d24218fa2e4ef67718caabda0dd67efdd5be1497705afef8edec830f1b2402d0f0a8b

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\select.pyd

                                                Filesize

                                                24KB

                                                MD5

                                                0dc8f694b3e6a3682b3ff098bd2468f6

                                                SHA1

                                                737252620116c6ac5c527f99d3914e608a0e5a74

                                                SHA256

                                                818120c08358b6b4d1234b7456c7b5c777af8473e26314a6a6c0f37237d53208

                                                SHA512

                                                d0e704d52b0c5e24c07447a60d71ccec490ec15ecb6b4532b2e93ac07036bda7f27051f80dac1ef3705b0186f35f9d6dfc05415412e483b68fd79f1098411123

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\sqlite3.dll

                                                Filesize

                                                608KB

                                                MD5

                                                605b722497acc50ffb33ebdb6afaf1f0

                                                SHA1

                                                e24c55472c827d4b519e5b6f0a3cfc49e10d1fa9

                                                SHA256

                                                a61016520a3f228285e32e40d878fe449450136c55aa9d4d7b54006a8dc7f339

                                                SHA512

                                                9611afc66cd1236cea1fce94e8ecf8e4d2168db3b51d8d9a799b574e8523ca0aea48da6b6c15fc863dd737b9c394ac6e56d2f3fa45e29792b630da389cb21dc1

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\unicodedata.pyd

                                                Filesize

                                                293KB

                                                MD5

                                                2b1809546e4bc9d67ea69d24f75edce0

                                                SHA1

                                                9d076445dfa2f58964a6a1fd1844f6fe82645952

                                                SHA256

                                                89cbb2814a75a5bd53acbfb1fe090ca8395c4a7f559acd4fe0187758c172623a

                                                SHA512

                                                5ae015add4697e8290eb881fa770bca2fa22ba8376b86b26f7880d4f92ad362e741042926a4c47cc3413c83f445e372ffda915bcf8567673d807bd2dac28fbbd

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI47082\win32\win32api.pyd

                                                Filesize

                                                48KB

                                                MD5

                                                d2668458d3a33de3fbe931eb029a3628

                                                SHA1

                                                258351db3b6ce6ae80a428c2b5dc0a3f7cfa112a

                                                SHA256

                                                2c37610d165a3c3c0350b08a5d803928267aa69878f753d2e2b048de4f3a7413

                                                SHA512

                                                440b760300043938c1a3130baf667426d1dabdb6dab24581054c9d5ef213997183b0a317b4f846f277eabb07f7bd4d2cc42d90158511c904b7a78672869c641d

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI9882\cryptography-43.0.0.dist-info\INSTALLER

                                                Filesize

                                                4B

                                                MD5

                                                365c9bfeb7d89244f2ce01c1de44cb85

                                                SHA1

                                                d7a03141d5d6b1e88b6b59ef08b6681df212c599

                                                SHA256

                                                ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508

                                                SHA512

                                                d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI9882\pycountry\locales\uk\LC_MESSAGES\iso3166-2.mo

                                                Filesize

                                                249KB

                                                MD5

                                                36e5a83cac8c524e645371ae3ff66081

                                                SHA1

                                                53e80002df6f0823d39d0d253a7e285fd973f4e0

                                                SHA256

                                                c7704825c54b17f990c2815909d32a2c51b23ca381225213e262ecfb6f1555c3

                                                SHA512

                                                6abcc63a1fcc8869417f3f6c32584edcd52a884c3a35f6c70e0068fc274b005c51ff6a648cc406d7be3be891e01b8bfab2d015c55b0b59f122da024df045d2ce

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI9882\pycountry\locales\uk\LC_MESSAGES\iso639-3.mo

                                                Filesize

                                                499KB

                                                MD5

                                                3f600a8f684c194e0e44ed4cf6b3f404

                                                SHA1

                                                5b8946409ee6b6ca2fb83280175c4d28a35de526

                                                SHA256

                                                c24aa12f81e6b5135c725e5df8e746a116c48d9b1641f820e95c946614963d7e

                                                SHA512

                                                eb62d51782c9237028198c8edbbff3d1a3ea1474ea94d748aca17efe7ba0ba9959c9db197d140c00615c36697b52dde44f60f0ebaa6bd42185faa9d71e68d4ab

                                              • memory/1040-3293-0x00007FFD9BDE0000-0x00007FFD9BDEA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/1040-3288-0x00007FFD9B3D0000-0x00007FFD9B457000-memory.dmp

                                                Filesize

                                                540KB

                                              • memory/1040-1516-0x00007FFDB1530000-0x00007FFDB155D000-memory.dmp

                                                Filesize

                                                180KB

                                              • memory/1040-1514-0x00007FFDB7B50000-0x00007FFDB7B5F000-memory.dmp

                                                Filesize

                                                60KB

                                              • memory/1040-2441-0x00007FFD9EC80000-0x00007FFD9EFF5000-memory.dmp

                                                Filesize

                                                3.5MB

                                              • memory/1040-1225-0x00007FFD9F1B0000-0x00007FFD9F798000-memory.dmp

                                                Filesize

                                                5.9MB

                                              • memory/1040-1513-0x00007FFDB2010000-0x00007FFDB2034000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/1040-2010-0x00007FFDB08A0000-0x00007FFDB08CB000-memory.dmp

                                                Filesize

                                                172KB

                                              • memory/1040-1727-0x00007FFDB0FB0000-0x00007FFDB0FE5000-memory.dmp

                                                Filesize

                                                212KB

                                              • memory/1040-1832-0x00007FFDA29E0000-0x00007FFDA2A9C000-memory.dmp

                                                Filesize

                                                752KB

                                              • memory/1040-1728-0x00007FFDB1720000-0x00007FFDB1739000-memory.dmp

                                                Filesize

                                                100KB

                                              • memory/1040-2317-0x00007FFDADD00000-0x00007FFDADD2E000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/1040-2362-0x00007FFD9EBC0000-0x00007FFD9EC78000-memory.dmp

                                                Filesize

                                                736KB

                                              • memory/1040-2352-0x00007FFD9EC80000-0x00007FFD9EFF5000-memory.dmp

                                                Filesize

                                                3.5MB

                                              • memory/1040-2409-0x00007FFDAEF60000-0x00007FFDAEF75000-memory.dmp

                                                Filesize

                                                84KB

                                              • memory/1040-2411-0x00007FFD9F1B0000-0x00007FFD9F798000-memory.dmp

                                                Filesize

                                                5.9MB

                                              • memory/1040-2410-0x00007FFDADCE0000-0x00007FFDADCF2000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/1040-2413-0x00007FFD9DA20000-0x00007FFD9DB3C000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/1040-3289-0x00007FFD9BE00000-0x00007FFD9BE14000-memory.dmp

                                                Filesize

                                                80KB

                                              • memory/1040-1771-0x00007FFDB57B0000-0x00007FFDB57BD000-memory.dmp

                                                Filesize

                                                52KB

                                              • memory/1040-3295-0x00007FFD9B230000-0x00007FFD9B253000-memory.dmp

                                                Filesize

                                                140KB

                                              • memory/1040-3294-0x00007FFD9BD00000-0x00007FFD9BD18000-memory.dmp

                                                Filesize

                                                96KB

                                              • memory/1040-1786-0x00007FFDB0C70000-0x00007FFDB0C9E000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/1040-3290-0x00007FFD9BDF0000-0x00007FFD9BDFB000-memory.dmp

                                                Filesize

                                                44KB

                                              • memory/1040-3291-0x00007FFD9B3A0000-0x00007FFD9B3C6000-memory.dmp

                                                Filesize

                                                152KB

                                              • memory/1040-1515-0x00007FFDB20F0000-0x00007FFDB2109000-memory.dmp

                                                Filesize

                                                100KB

                                              • memory/1040-3212-0x00007FFD9F1B0000-0x00007FFD9F798000-memory.dmp

                                                Filesize

                                                5.9MB

                                              • memory/1040-2442-0x00007FFD9EBC0000-0x00007FFD9EC78000-memory.dmp

                                                Filesize

                                                736KB

                                              • memory/1040-2428-0x00007FFDB1720000-0x00007FFDB1739000-memory.dmp

                                                Filesize

                                                100KB

                                              • memory/1040-2440-0x00007FFDADD00000-0x00007FFDADD2E000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/1040-2435-0x00007FFDB0C70000-0x00007FFDB0C9E000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/1040-1729-0x00007FFDB5B60000-0x00007FFDB5B6D000-memory.dmp

                                                Filesize

                                                52KB

                                              • memory/1040-2436-0x00007FFDA29E0000-0x00007FFDA2A9C000-memory.dmp

                                                Filesize

                                                752KB

                                              • memory/3444-3287-0x00007FFD9B9D0000-0x00007FFD9BAEC000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/3444-3268-0x00007FFD9C300000-0x00007FFD9C324000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/3444-3269-0x00007FFD9C2F0000-0x00007FFD9C2FF000-memory.dmp

                                                Filesize

                                                60KB

                                              • memory/3444-3270-0x00007FFD9C2D0000-0x00007FFD9C2E9000-memory.dmp

                                                Filesize

                                                100KB

                                              • memory/3444-3271-0x00007FFD9C2A0000-0x00007FFD9C2CD000-memory.dmp

                                                Filesize

                                                180KB

                                              • memory/3444-3275-0x00007FFD9C260000-0x00007FFD9C295000-memory.dmp

                                                Filesize

                                                212KB

                                              • memory/3444-3281-0x00007FFD9C0E0000-0x00007FFD9C10B000-memory.dmp

                                                Filesize

                                                172KB

                                              • memory/3444-3276-0x00007FFD9C240000-0x00007FFD9C259000-memory.dmp

                                                Filesize

                                                100KB

                                              • memory/3444-3284-0x00007FFD9B460000-0x00007FFD9B7D5000-memory.dmp

                                                Filesize

                                                3.5MB

                                              • memory/3444-3277-0x00007FFD9C230000-0x00007FFD9C23D000-memory.dmp

                                                Filesize

                                                52KB

                                              • memory/3444-3283-0x00007FFD9BAF0000-0x00007FFD9BBA8000-memory.dmp

                                                Filesize

                                                736KB

                                              • memory/3444-3278-0x00007FFD9C220000-0x00007FFD9C22D000-memory.dmp

                                                Filesize

                                                52KB

                                              • memory/3444-3279-0x00007FFD9C1F0000-0x00007FFD9C21E000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/3444-3282-0x00007FFD9BE60000-0x00007FFD9BE8E000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/3444-3286-0x00007FFD9BE20000-0x00007FFD9BE32000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/3444-3280-0x00007FFD9C120000-0x00007FFD9C1DC000-memory.dmp

                                                Filesize

                                                752KB

                                              • memory/3444-3249-0x00007FFD9C330000-0x00007FFD9C918000-memory.dmp

                                                Filesize

                                                5.9MB

                                              • memory/3444-3285-0x00007FFD9BE40000-0x00007FFD9BE55000-memory.dmp

                                                Filesize

                                                84KB

                                              • memory/3444-3292-0x00007FFD9C330000-0x00007FFD9C918000-memory.dmp

                                                Filesize

                                                5.9MB

                                              • memory/5516-2422-0x00007FFDB0550000-0x00007FFDB055D000-memory.dmp

                                                Filesize

                                                52KB

                                              • memory/5516-2408-0x00007FFD9E520000-0x00007FFD9EB08000-memory.dmp

                                                Filesize

                                                5.9MB

                                              • memory/5516-2451-0x00007FFD9CDF0000-0x00007FFD9D165000-memory.dmp

                                                Filesize

                                                3.5MB

                                              • memory/5516-2450-0x00007FFD9D170000-0x00007FFD9D19E000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/5516-2455-0x00007FFD9CCF0000-0x00007FFD9CD02000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/5516-2465-0x00007FFDADBC0000-0x00007FFDADBD9000-memory.dmp

                                                Filesize

                                                100KB

                                              • memory/5516-2454-0x00007FFD9CD10000-0x00007FFD9CD25000-memory.dmp

                                                Filesize

                                                84KB

                                              • memory/5516-2417-0x00007FFDA33A0000-0x00007FFDA33CD000-memory.dmp

                                                Filesize

                                                180KB

                                              • memory/5516-2424-0x00007FFDA27F0000-0x00007FFDA281E000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/5516-2443-0x00007FFD9E520000-0x00007FFD9EB08000-memory.dmp

                                                Filesize

                                                5.9MB

                                              • memory/5516-2425-0x00007FFD9D960000-0x00007FFD9DA1C000-memory.dmp

                                                Filesize

                                                752KB

                                              • memory/5516-2466-0x00007FFDA27F0000-0x00007FFDA281E000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/5516-2467-0x00007FFD9CBD0000-0x00007FFD9CCEC000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/5516-2423-0x00007FFDAFFF0000-0x00007FFDAFFFD000-memory.dmp

                                                Filesize

                                                52KB

                                              • memory/5516-3244-0x00007FFD9CDF0000-0x00007FFD9D165000-memory.dmp

                                                Filesize

                                                3.5MB

                                              • memory/5516-3245-0x00007FFD9CD30000-0x00007FFD9CDE8000-memory.dmp

                                                Filesize

                                                736KB

                                              • memory/5516-3231-0x00007FFD9E520000-0x00007FFD9EB08000-memory.dmp

                                                Filesize

                                                5.9MB

                                              • memory/5516-3243-0x00007FFD9D170000-0x00007FFD9D19E000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/5516-3230-0x00007FFD9D960000-0x00007FFD9DA1C000-memory.dmp

                                                Filesize

                                                752KB

                                              • memory/5516-2421-0x00007FFDADBC0000-0x00007FFDADBD9000-memory.dmp

                                                Filesize

                                                100KB

                                              • memory/5516-2420-0x00007FFDA2900000-0x00007FFDA2935000-memory.dmp

                                                Filesize

                                                212KB

                                              • memory/5516-2416-0x00007FFDADCA0000-0x00007FFDADCB9000-memory.dmp

                                                Filesize

                                                100KB

                                              • memory/5516-2415-0x00007FFDB15E0000-0x00007FFDB15EF000-memory.dmp

                                                Filesize

                                                60KB

                                              • memory/5516-2414-0x00007FFDADC30000-0x00007FFDADC54000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/5516-2452-0x00007FFD9CD30000-0x00007FFD9CDE8000-memory.dmp

                                                Filesize

                                                736KB

                                              • memory/5516-2437-0x00007FFD9D800000-0x00007FFD9D82B000-memory.dmp

                                                Filesize

                                                172KB

                                              • memory/5768-2438-0x00007FFD9D7D0000-0x00007FFD9D7FB000-memory.dmp

                                                Filesize

                                                172KB

                                              • memory/5768-2439-0x00007FFD9D780000-0x00007FFD9D7AE000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/5768-2445-0x00007FFD9D340000-0x00007FFD9D3F8000-memory.dmp

                                                Filesize

                                                736KB

                                              • memory/5768-3273-0x00007FFD9D8F0000-0x00007FFD9D91E000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/5768-3272-0x00007FFDA27D0000-0x00007FFDA27E9000-memory.dmp

                                                Filesize

                                                100KB

                                              • memory/5768-2444-0x00007FFD9D400000-0x00007FFD9D775000-memory.dmp

                                                Filesize

                                                3.5MB

                                              • memory/5768-3250-0x00007FFD9DB40000-0x00007FFD9E128000-memory.dmp

                                                Filesize

                                                5.9MB

                                              • memory/5768-2418-0x00007FFDA2C10000-0x00007FFDA2C34000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/5768-3274-0x00007FFD9D830000-0x00007FFD9D8EC000-memory.dmp

                                                Filesize

                                                752KB

                                              • memory/5768-3266-0x00007FFD9D2C0000-0x00007FFD9D2D2000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/5768-3265-0x00007FFD9D2E0000-0x00007FFD9D2F5000-memory.dmp

                                                Filesize

                                                84KB

                                              • memory/5768-3264-0x00007FFD9D340000-0x00007FFD9D3F8000-memory.dmp

                                                Filesize

                                                736KB

                                              • memory/5768-3263-0x00007FFD9D400000-0x00007FFD9D775000-memory.dmp

                                                Filesize

                                                3.5MB

                                              • memory/5768-3262-0x00007FFD9D780000-0x00007FFD9D7AE000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/5768-2447-0x00007FFD9D2C0000-0x00007FFD9D2D2000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/5768-2446-0x00007FFD9D2E0000-0x00007FFD9D2F5000-memory.dmp

                                                Filesize

                                                84KB

                                              • memory/5768-2449-0x00007FFD9D1A0000-0x00007FFD9D2BC000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/5768-2426-0x00007FFDA2BF0000-0x00007FFDA2C09000-memory.dmp

                                                Filesize

                                                100KB

                                              • memory/5768-2429-0x00007FFD9D920000-0x00007FFD9D955000-memory.dmp

                                                Filesize

                                                212KB

                                              • memory/5768-2430-0x00007FFDA27D0000-0x00007FFDA27E9000-memory.dmp

                                                Filesize

                                                100KB

                                              • memory/5768-2431-0x00007FFDA3230000-0x00007FFDA323D000-memory.dmp

                                                Filesize

                                                52KB

                                              • memory/5768-2432-0x00007FFD9FD40000-0x00007FFD9FD4D000-memory.dmp

                                                Filesize

                                                52KB

                                              • memory/5768-2434-0x00007FFD9D830000-0x00007FFD9D8EC000-memory.dmp

                                                Filesize

                                                752KB

                                              • memory/5768-2433-0x00007FFD9D8F0000-0x00007FFD9D91E000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/5768-2427-0x00007FFD9FD50000-0x00007FFD9FD7D000-memory.dmp

                                                Filesize

                                                180KB

                                              • memory/5768-2448-0x00007FFD9DB40000-0x00007FFD9E128000-memory.dmp

                                                Filesize

                                                5.9MB

                                              • memory/5768-2419-0x00007FFDB0890000-0x00007FFDB089F000-memory.dmp

                                                Filesize

                                                60KB

                                              • memory/5768-2453-0x00007FFDA2C10000-0x00007FFDA2C34000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/5768-2412-0x00007FFD9DB40000-0x00007FFD9E128000-memory.dmp

                                                Filesize

                                                5.9MB