Analysis

  • max time kernel
    145s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 12:36

General

  • Target

    https://github.com/ALEHACKsp/Valorant-Spoofer

Malware Config

Signatures

  • ElysiumStealer

    ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

  • ElysiumStealer Support DLL 1 IoCs
  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/ALEHACKsp/Valorant-Spoofer
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8a1f46f8,0x7ffa8a1f4708,0x7ffa8a1f4718
      2⤵
        PID:724
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15650068742380647656,15985530056898502715,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:2
        2⤵
          PID:2188
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,15650068742380647656,15985530056898502715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4272
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,15650068742380647656,15985530056898502715,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:8
          2⤵
            PID:1100
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15650068742380647656,15985530056898502715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
            2⤵
              PID:4988
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15650068742380647656,15985530056898502715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
              2⤵
                PID:3120
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15650068742380647656,15985530056898502715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:8
                2⤵
                  PID:824
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15650068742380647656,15985530056898502715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4760
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,15650068742380647656,15985530056898502715,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5436 /prefetch:8
                  2⤵
                    PID:4912
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15650068742380647656,15985530056898502715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:1
                    2⤵
                      PID:3396
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,15650068742380647656,15985530056898502715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3036
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15650068742380647656,15985530056898502715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:1
                      2⤵
                        PID:1708
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15650068742380647656,15985530056898502715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2888 /prefetch:1
                        2⤵
                          PID:2492
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15650068742380647656,15985530056898502715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6460 /prefetch:1
                          2⤵
                            PID:5416
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15650068742380647656,15985530056898502715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6452 /prefetch:1
                            2⤵
                              PID:5424
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15650068742380647656,15985530056898502715,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3140 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5624
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1600
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3472
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:2096
                                • C:\Users\Admin\AppData\Local\Temp\Temp1_Valorant-Spoofer-main.zip\Valorant-Spoofer-main\Fortnite4.exe
                                  "C:\Users\Admin\AppData\Local\Temp\Temp1_Valorant-Spoofer-main.zip\Valorant-Spoofer-main\Fortnite4.exe"
                                  1⤵
                                  • Loads dropped DLL
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1600
                                • C:\Windows\system32\rundll32.exe
                                  "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.Search_cw5n1h2txyewy
                                  1⤵
                                    PID:4196
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4116
                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                    1⤵
                                    • Enumerates system info in registry
                                    • Modifies Internet Explorer settings
                                    • Modifies registry class
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SetWindowsHookEx
                                    PID:5580
                                  • C:\Windows\system32\rundll32.exe
                                    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy
                                    1⤵
                                      PID:5916
                                    • C:\Users\Admin\AppData\Local\Temp\Temp1_Valorant-Spoofer-main.zip\Valorant-Spoofer-main\Volumeid.exe
                                      "C:\Users\Admin\AppData\Local\Temp\Temp1_Valorant-Spoofer-main.zip\Valorant-Spoofer-main\Volumeid.exe"
                                      1⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:6028
                                    • C:\Windows\system32\rundll32.exe
                                      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                      1⤵
                                        PID:5268
                                      • C:\Windows\system32\rundll32.exe
                                        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                        1⤵
                                          PID:4956
                                        • C:\Windows\system32\rundll32.exe
                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                          1⤵
                                            PID:5888
                                          • C:\Windows\system32\rundll32.exe
                                            "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                            1⤵
                                              PID:5856
                                            • C:\Windows\system32\rundll32.exe
                                              "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                              1⤵
                                                PID:4800
                                              • C:\Windows\system32\rundll32.exe
                                                "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                                1⤵
                                                  PID:3096
                                                • C:\Windows\system32\rundll32.exe
                                                  "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                                  1⤵
                                                    PID:5152
                                                  • C:\Windows\system32\rundll32.exe
                                                    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                                    1⤵
                                                      PID:6068
                                                    • C:\Windows\system32\rundll32.exe
                                                      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                                      1⤵
                                                        PID:5196
                                                      • C:\Windows\system32\rundll32.exe
                                                        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                                        1⤵
                                                          PID:5832
                                                        • C:\Windows\system32\rundll32.exe
                                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                                          1⤵
                                                            PID:3568
                                                          • C:\Windows\system32\rundll32.exe
                                                            "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                                            1⤵
                                                              PID:5896

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                                              Filesize

                                                              328B

                                                              MD5

                                                              7a4454d6ce86ad69f22b6abb3c80f799

                                                              SHA1

                                                              f988c2566af672762533cd531b606ac27535402b

                                                              SHA256

                                                              71e5ae9d449f309685896dbb9543470ae272d5ff087d9b433c81958e950dea64

                                                              SHA512

                                                              30f624f442105ea18bc92cc754a145159c96487b5a1ef276b2e71da7a75cdfca8bd672894cf11d4273e2a2a57c637a7dcf4fc4e29d3b7ef26cbb0fbdfaf0448d

                                                            • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\USS.jcp

                                                              Filesize

                                                              8KB

                                                              MD5

                                                              42ace19156106236eafd6989a17c302c

                                                              SHA1

                                                              1769e625af4365fd2a04265f81eebb0563a1ed0e

                                                              SHA256

                                                              306efea1418e44a3bb813cf3dcf72a727e4a17fcc480945f00363381ab8fed7e

                                                              SHA512

                                                              758b3dc5a4cf931d6620a88d6640021f6e60068a259ae8726feb7a7f1e4a44406d895a1369472261dfb0a1b5396004830b99eb51e96123ceb2d3090d92fff97c

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                              Filesize

                                                              152B

                                                              MD5

                                                              eeaa8087eba2f63f31e599f6a7b46ef4

                                                              SHA1

                                                              f639519deee0766a39cfe258d2ac48e3a9d5ac03

                                                              SHA256

                                                              50fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9

                                                              SHA512

                                                              eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                              Filesize

                                                              152B

                                                              MD5

                                                              b9569e123772ae290f9bac07e0d31748

                                                              SHA1

                                                              5806ed9b301d4178a959b26d7b7ccf2c0abc6741

                                                              SHA256

                                                              20ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b

                                                              SHA512

                                                              cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              e6659a577186de8134fcbeba6d962483

                                                              SHA1

                                                              9e8ce585c6e7589cd57b58d67a83c63d80a0e6cd

                                                              SHA256

                                                              750968de889dd2a7a2611104c9da7ca33f1c25de3cf4a33c307a5f5ab9175707

                                                              SHA512

                                                              0dc579c72c24e0ca29417f542103526b601ff0ecedc5babd53082294084dcbd5e67999b43e53b215228d9181e3429d750889a7d51401b54d5f99e90430e63b2c

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                              Filesize

                                                              577B

                                                              MD5

                                                              e4cab4e7709d04b3b123ef087c23a238

                                                              SHA1

                                                              c07a57e682745c0f65871068e8875e289991a8d5

                                                              SHA256

                                                              21dc2a0815cf9f0adfe7d391b7bf2df11fad2459bfcb717276f1cd0c474fbf57

                                                              SHA512

                                                              bc422ba3b0df485e46d2ca54a07454fb8931bcddda554217ffb80ec4c478f7e5c681a0b1687a3aec4c09b49f02bd124d540ef3aaf3d1359bef4837597bd5c85f

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              9dc50976113826a2e20ee7b1fd185ec6

                                                              SHA1

                                                              d8f7b3466f8d41ba6b8decde3c7c9a510f669b27

                                                              SHA256

                                                              e246938b2ed05e9f721e67d40780b5ba326b820f0451265ffa1708cddfba8bb4

                                                              SHA512

                                                              1d9f436c689b11b669e55347df7b9ff652c6862c652dde67e6afb95365fd819e7930e5b1e6dc119647ccf18a4ccb0e66e89f9246de6d4f079e311f0210831b7f

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              b13557f326f81adc09c0002e1d728f15

                                                              SHA1

                                                              6e057b096f961a12ad38ee07ea59dba3d94cd83f

                                                              SHA256

                                                              3a1ffbca5f21f905c013fb05006bc56188d393f8b79a5612c92544b7a0de20c5

                                                              SHA512

                                                              1510c6b7cf7713630d274f6e9da56ea221c776721f4090a5b6e6b9c83e30f488dce962a034f79cbb09f99ebc9cde1cb7d7d35a847f7f4c3ccd59b2157423355f

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              8ac96363a2da1eeb95e15545a4a13061

                                                              SHA1

                                                              00519dbfb87a0757b9f9c3821177aeae156923c1

                                                              SHA256

                                                              4c1e75e7bbc9dfc1c547d6d45d2c0605992cc71bf1ca238b76015c06aac6a784

                                                              SHA512

                                                              92553aeb61de704e180a4512ff05c5e7df8bf2f2f28edd3756aaeef1242a642816d521b7675bc7468ae9f3e749b4915638ba02a6cce1365013a9fafcb885290d

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              03d2f34187a6b97da4fee373cf763c49

                                                              SHA1

                                                              86fa6f20fe8ad30333bef8fb04cba50c81aa95e9

                                                              SHA256

                                                              21657d2e11bdfa581752a8a2de42257028964215a68f448d89dce26b10e54f61

                                                              SHA512

                                                              f8e11f584cff2a3582f5c9f62564a8fc8ffc567bf3ed3bd4cdeb7d254e559d657202bed2a32fd9e8fbf5dbc67a957cfcba55a4321e3d8ef407aad3c3def16671

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5811ae.TMP

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              f6f0b6590e9f23b0557e7a51c2133e51

                                                              SHA1

                                                              bdf93f7a584e937c6d901ac72633f3454498575d

                                                              SHA256

                                                              cd33b8eb4b30db50273901290dffa0aed3a04693567c861e460140c61a123fa1

                                                              SHA512

                                                              e7d9309ae8c31581a334c20e4c67ed86cdeb45a189c57589296aac1331d3c8ffafe4bccf2a6c0ade0294bfc1a0d4cfe269555275f35048c29cf2f661c400ce90

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                              Filesize

                                                              16B

                                                              MD5

                                                              6752a1d65b201c13b62ea44016eb221f

                                                              SHA1

                                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                              SHA256

                                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                              SHA512

                                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              6abb12509bd1b43012f6f48e695673e8

                                                              SHA1

                                                              22bcd63c63364e1f5b6787072d706c4f828f11b2

                                                              SHA256

                                                              812b246ab5ce34a46f6951680df5f1186de7cc03e5385a82ce442e38d1bea293

                                                              SHA512

                                                              fe035b2a32699a37a077b5a96fc85afe761678d53985074757fd5b863699ec05e0b2d187920fd966c8d3c912168375af900ac35c3b814248308eae57a85fac3e

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              0ab2b129a671ce84a8072751cac9489e

                                                              SHA1

                                                              8626d437a7441802b8c3ddf72597891bc28a8541

                                                              SHA256

                                                              74a215a29ae5e57daa9d5339778208b6cfa5942a245e5c6c1a9e276b886c2e2c

                                                              SHA512

                                                              e0f607109fe3354dd54c3fe67ee525346ce9832cdeeba240c582872671d48718b0c60e338865bc8cc793fafc810896fd370f4f0a7a4ed1fb908c247521dd07b6

                                                            • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres

                                                              Filesize

                                                              4KB

                                                              MD5

                                                              a174953bb0670f65a699efcfa232e410

                                                              SHA1

                                                              e11523353f7d9c1527c0b4a892c928c33aa28705

                                                              SHA256

                                                              4dd79526c96ebce2560e9f35b18a49e117f69639fb6466df9c494fbfc8a10cfe

                                                              SHA512

                                                              6e03ce636125bda7e9344ea9805927c642f68a26fcabd025e0fc83a5b8c87098ebd4b38c5eb75b275639aad3f4309c6d261cf2210be7b5950128d147a6aca376

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\7C3QA5K3\microsoft.windows[1].xml

                                                              Filesize

                                                              97B

                                                              MD5

                                                              5fda42d99909f468100bd031ee16c0bb

                                                              SHA1

                                                              6253ba5757b50bcfae8865a86d4a57e15c6908f5

                                                              SHA256

                                                              469ba9855abc5dade0eda2121db5131eb58f14f4a777439f1efed861300599e7

                                                              SHA512

                                                              f2d51635b9ce88da963dda77d5afe0fd2ade1edda6065dc3b0a2657e85a75c4a81c675abf025f5ea64931d4cf5bd5cfb994dca0ea97637e0a58aec6fc3beffa8

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{2F519BF2-C697-59F8-8F6A-1E19509CE66B}

                                                              Filesize

                                                              36KB

                                                              MD5

                                                              8aaad0f4eb7d3c65f81c6e6b496ba889

                                                              SHA1

                                                              231237a501b9433c292991e4ec200b25c1589050

                                                              SHA256

                                                              813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1

                                                              SHA512

                                                              1a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_Explorer

                                                              Filesize

                                                              36KB

                                                              MD5

                                                              ab0262f72142aab53d5402e6d0cb5d24

                                                              SHA1

                                                              eaf95bb31ae1d4c0010f50e789bdc8b8e3116116

                                                              SHA256

                                                              20a108577209b2499cfdba77645477dd0d9771a77d42a53c6315156761efcfbb

                                                              SHA512

                                                              bf9580f3e5d1102cf758503e18a2cf98c799c4a252eedf9344f7c5626da3a1cf141353f01601a3b549234cc3f2978ad31f928068395b56f9f0885c07dbe81da1

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{cb03c01d-c10d-40ca-b902-6808d31996cf}\0.0.filtertrie.intermediate.txt

                                                              Filesize

                                                              28KB

                                                              MD5

                                                              ab6db363a3fc9e4af2864079fd88032d

                                                              SHA1

                                                              aa52099313fd6290cd6e57d37551d63cd96dbe45

                                                              SHA256

                                                              373bb433c2908af2e3de58ede2087642814564560d007e61748cdb48d4e9da3f

                                                              SHA512

                                                              d3d13d17df96705d0de119ad0f8380bfe6b7bc44c618e2fcd0233061a0ab15beae44d38c48a880121b35f90f56c1529e5f4cf1a19acb9e2cbba5d1c402c749c0

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{cb03c01d-c10d-40ca-b902-6808d31996cf}\0.1.filtertrie.intermediate.txt

                                                              Filesize

                                                              5B

                                                              MD5

                                                              34bd1dfb9f72cf4f86e6df6da0a9e49a

                                                              SHA1

                                                              5f96d66f33c81c0b10df2128d3860e3cb7e89563

                                                              SHA256

                                                              8e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c

                                                              SHA512

                                                              e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{cb03c01d-c10d-40ca-b902-6808d31996cf}\0.2.filtertrie.intermediate.txt

                                                              Filesize

                                                              5B

                                                              MD5

                                                              c204e9faaf8565ad333828beff2d786e

                                                              SHA1

                                                              7d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1

                                                              SHA256

                                                              d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f

                                                              SHA512

                                                              e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{cb03c01d-c10d-40ca-b902-6808d31996cf}\Apps.ft

                                                              Filesize

                                                              38KB

                                                              MD5

                                                              84ac0c242b77b8fc326db0a5926b089e

                                                              SHA1

                                                              cc6b367ae8eb38561de01813b7d542067fb2318f

                                                              SHA256

                                                              b1557167a6df424f8b28aabd31d1b7e8a469dd50d2ae4cbbd43afd8f9c62cf92

                                                              SHA512

                                                              8f63084bd5a270b7b05e80454d26127b69bcb98ec93d9fad58d77203934f46b677a3aaf20f29e73dcd7035deb61f4c0aa3b10acbc4c0fc210632c1d74f705d2f

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{cb03c01d-c10d-40ca-b902-6808d31996cf}\Apps.index

                                                              Filesize

                                                              1.0MB

                                                              MD5

                                                              f4514c93191e0efc0f61036e4ebb341a

                                                              SHA1

                                                              c80478e9a734790c18584f67a43518aa4a7dcf58

                                                              SHA256

                                                              43da4fa5f62affe399ceaac2d489b7cde610963a48e72d445bebe6f2c63a3600

                                                              SHA512

                                                              8aecb3491767e040a52f351908004db2c8f2f083397744585c2832212ec8aa288d3492be941a48b04774e16b43672ab167209776cbdef6692fef684fc54666a6

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{c1ba562a-cf2a-46f2-9100-8ff7345a4f46}\apps.csg

                                                              Filesize

                                                              444B

                                                              MD5

                                                              5475132f1c603298967f332dc9ffb864

                                                              SHA1

                                                              4749174f29f34c7d75979c25f31d79774a49ea46

                                                              SHA256

                                                              0b0af873ef116a51fc2a2329dc9102817ce923f32a989c7a6846b4329abd62cd

                                                              SHA512

                                                              54433a284a6b7185c5f2131928b636d6850babebc09acc5ee6a747832f9e37945a60a7192f857a2f6b4dd20433ca38f24b8e438ba1424cc5c73f0aa2d8c946ff

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{c1ba562a-cf2a-46f2-9100-8ff7345a4f46}\apps.schema

                                                              Filesize

                                                              150B

                                                              MD5

                                                              1659677c45c49a78f33551da43494005

                                                              SHA1

                                                              ae588ef3c9ea7839be032ab4323e04bc260d9387

                                                              SHA256

                                                              5af0fc2a0b5ccecdc04e54b3c60f28e3ff5c7d4e1809c6d7c8469f0567c090bb

                                                              SHA512

                                                              740a1b6fd80508f29f0f080a8daddec802aabed467d8c5394468b0cf79d7628c1cb5b93cf69ed785999e8d4e2b0f86776b428d4fa0d1afcdf3cbf305615e5030

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{c1ba562a-cf2a-46f2-9100-8ff7345a4f46}\appsconversions.txt

                                                              Filesize

                                                              1.4MB

                                                              MD5

                                                              2bef0e21ceb249ffb5f123c1e5bd0292

                                                              SHA1

                                                              86877a464a0739114e45242b9d427e368ebcc02c

                                                              SHA256

                                                              8b9fae5ea9dd21c2313022e151788b276d995c8b9115ee46832b804a914e6307

                                                              SHA512

                                                              f5b49f08b44a23f81198b6716195b868e76b2a23a388449356b73f8261107733f05baa027f8cdb8e469086a9869f4a64983c76da0dc978beb4ec1cb257532c6b

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{c1ba562a-cf2a-46f2-9100-8ff7345a4f46}\appsglobals.txt

                                                              Filesize

                                                              343KB

                                                              MD5

                                                              931b27b3ec2c5e9f29439fba87ec0dc9

                                                              SHA1

                                                              dd5e78f004c55bbebcd1d66786efc5ca4575c9b4

                                                              SHA256

                                                              541dfa71a3728424420f082023346365cca013af03629fd243b11d8762e3403e

                                                              SHA512

                                                              4ba517f09d9ad15efd3db5a79747e42db53885d3af7ccc425d52c711a72e15d24648f8a38bc7e001b3b4cc2180996c6cac3949771aa1c278ca3eb7542eae23fd

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{c1ba562a-cf2a-46f2-9100-8ff7345a4f46}\appssynonyms.txt

                                                              Filesize

                                                              237KB

                                                              MD5

                                                              06a69ad411292eca66697dc17898e653

                                                              SHA1

                                                              fbdcfa0e1761ddcc43a0fb280bbcd2743ba8820d

                                                              SHA256

                                                              2aa90f795a65f0e636154def7d84094af2e9a5f71b1b73f168a6ea23e74476d1

                                                              SHA512

                                                              ceb4b102309dffb65804e3a0d54b8627fd88920f555b334c3eac56b13eeb5075222d794c3cdbc3cda8bf1658325fdecf6495334e2c89b5133c9a967ec0d15693

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133684582312124394.txt

                                                              Filesize

                                                              73KB

                                                              MD5

                                                              4c036314f080c753345c8481caf9ae5f

                                                              SHA1

                                                              c90add2903b9de1bfac12a139e2551af8ec71745

                                                              SHA256

                                                              ca7a49706055df15b0d7f15795ca9846c18f76f20ce135c039f99096bf164b71

                                                              SHA512

                                                              2c42b710436c2153a935fdbee7399177deca03c9c877cff99ef2dfa237fc7da5cc0dfbd93129122b268f8eda79f34e41ea5f9c901e5dee35861a2c9dce09bc38

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json

                                                              Filesize

                                                              223KB

                                                              MD5

                                                              d44fcc3e119e7a134ff862b51b253e69

                                                              SHA1

                                                              e3674c4a1704679110bbaacc706466366b410ad5

                                                              SHA256

                                                              176c3f6b4fd10611fadcf0cbb9049e4646b3003eaacaa401ef3808be76909fee

                                                              SHA512

                                                              f23abaf2a4e96c80b9e0130776e1f0b630ef25419504684b73aec746ddafbea099f86c038914be21a55b633ed441cdd1744036eeefd4917f00b2ef10758cf4d7

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

                                                              Filesize

                                                              9KB

                                                              MD5

                                                              72773d2ef6344f82b3ca7be6f40421c1

                                                              SHA1

                                                              518f47d5e3bcb5d24daf91c4fb360f0754f52e40

                                                              SHA256

                                                              407b389c2cea7e4234cda60fc98cdaa4af72cd61b38d6eb830c9421920ef1101

                                                              SHA512

                                                              a1443aa53943a5ee739f634b6738509ac97e5e1f99e858ec1ac705ecdad7ba7e51c61e56e8683f5a02816923e2293e2401c8b22333a426467da0ba727ebff9f6

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

                                                              Filesize

                                                              10KB

                                                              MD5

                                                              e73fdb498b0026e6b4d84d85e365f6c8

                                                              SHA1

                                                              3d4af22daef595c965bd87ec1b287e93a62a2f01

                                                              SHA256

                                                              d9ade73e231e729ba8a493498e24b8e25913edd7b17840889d4031d93693f206

                                                              SHA512

                                                              cf4aeb8679f4b25cf4ddfcc6f915f02f87d3ef5dcd3128f9f68e5e3692bbe3884456f28d85731cb3bee900d1e2b801a90f03ba3933fabc3b02a83fadda46f429

                                                            • C:\Users\Admin\AppData\Local\Temp\Runtime.MSIL.1.0.0.0\NativePRo.dll

                                                              Filesize

                                                              40KB

                                                              MD5

                                                              94173de2e35aa8d621fc1c4f54b2a082

                                                              SHA1

                                                              fbb2266ee47f88462560f0370edb329554cd5869

                                                              SHA256

                                                              7e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f

                                                              SHA512

                                                              cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798

                                                            • C:\Users\Admin\Downloads\Unconfirmed 383085.crdownload

                                                              Filesize

                                                              5.2MB

                                                              MD5

                                                              ec0dab7fed03907adca447869cfe8252

                                                              SHA1

                                                              546f3308503af8d92cd841210fe7fb71a17c661c

                                                              SHA256

                                                              87e343bc7a031476674f7c325bbdd6a702b135ba52cafd375a49eb228f84716e

                                                              SHA512

                                                              1ff97f6ce1172d5deb7b0c8d3fd88fd0196c34c9b28923dd0aca3820f357a8e3071b54e5b2310338938f4ea1893d076a236f76432a22444e22f20b0bf086caaa

                                                            • memory/1600-205-0x0000000005960000-0x00000000059C6000-memory.dmp

                                                              Filesize

                                                              408KB

                                                            • memory/1600-199-0x0000000003330000-0x000000000333C000-memory.dmp

                                                              Filesize

                                                              48KB

                                                            • memory/1600-198-0x0000000000EF0000-0x0000000000F82000-memory.dmp

                                                              Filesize

                                                              584KB

                                                            • memory/4116-303-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-302-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-307-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-308-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-309-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-310-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-311-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-312-0x000002712A1F0000-0x000002712A1F1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-313-0x000002712A1F0000-0x000002712A1F1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-314-0x000002712A500000-0x000002712A501000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-315-0x000002712BA40000-0x000002712BA41000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-316-0x000002712BA40000-0x000002712BA41000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-304-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-251-0x0000027121D40000-0x0000027121D50000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4116-267-0x0000027121E40000-0x0000027121E50000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4116-286-0x000002712A070000-0x000002712A071000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-305-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-306-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-300-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-301-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-298-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-299-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-297-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-296-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-295-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-294-0x000002712A1E0000-0x000002712A1E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-293-0x000002712A1C0000-0x000002712A1C1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-290-0x000002712A1B0000-0x000002712A1B1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-291-0x000002712A1C0000-0x000002712A1C1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-292-0x000002712A1C0000-0x000002712A1C1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4116-288-0x000002712A1B0000-0x000002712A1B1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/5580-359-0x000001F1FCD00000-0x000001F1FCD20000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/5580-338-0x000001F1FC970000-0x000001F1FC990000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/5580-326-0x000001F1FC9B0000-0x000001F1FC9D0000-memory.dmp

                                                              Filesize

                                                              128KB