Analysis

  • max time kernel
    353s
  • max time network
    354s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14/09/2024, 12:54

Errors

Reason
Machine shutdown

General

  • Target

    XCliaent.exe

  • Size

    80KB

  • MD5

    84ef912e583e2085324aff1b1838ea02

  • SHA1

    4cf9e83bb995c40e1b509090c2523954b19b31f4

  • SHA256

    8ba3b9263bbf0baf8b955e53272b90dca4c7525fd42d1368386aa95ec71a434a

  • SHA512

    b0b9fa353f413f1215bb8d49546a5914e80e96aacdc675c085371ea9f6797e332b77655f96abb99fff4105020f12f32a8b8ad36078a0f68de65bdb724995e56b

  • SSDEEP

    1536:90YS2Xy3ynngKG6H08Dd7Kb2uFUMgNG6O6U9aOynP83yFzr2Hi+:90t2C3UhGwv7KbjF5GG60aOcEiFkX

Malware Config

Extracted

Family

xworm

C2

147.185.221.22:46682

127.0.0.1:46682

Attributes
  • Install_directory

    %Temp%

  • install_file

    svchost.exe

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 2 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 64 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 29 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\XCliaent.exe
    "C:\Users\Admin\AppData\Local\Temp\XCliaent.exe"
    1⤵
    • Disables RegEdit via registry modification
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XCliaent.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4256
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XCliaent.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4876
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2728
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2864
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2508
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\How To Decrypt My Files.html
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3280
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e2b73cb8,0x7ff9e2b73cc8,0x7ff9e2b73cd8
        3⤵
          PID:3140
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:2
          3⤵
            PID:1420
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:3
            3⤵
              PID:1472
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:8
              3⤵
                PID:4240
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
                3⤵
                  PID:1180
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
                  3⤵
                    PID:4964
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:1
                    3⤵
                      PID:2104
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:1
                      3⤵
                        PID:1196
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:1
                        3⤵
                          PID:3592
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:1
                          3⤵
                            PID:1468
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:8
                            3⤵
                              PID:5116
                            • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:8
                              3⤵
                                PID:1640
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11493738038646806409,3942366199505092203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2324 /prefetch:1
                                3⤵
                                  PID:652
                              • C:\Windows\System32\sc.exe
                                "C:\Windows\System32\sc.exe" stop wuauserv
                                2⤵
                                • Launches sc.exe
                                PID:3716
                              • C:\Windows\System32\sc.exe
                                "C:\Windows\System32\sc.exe" config wuauserv start=disabled
                                2⤵
                                • Launches sc.exe
                                PID:904
                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                              C:\Users\Admin\AppData\Local\Temp\svchost.exe
                              1⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4512
                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                              C:\Users\Admin\AppData\Local\Temp\svchost.exe
                              1⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2252
                            • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                              "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                              1⤵
                              • Modifies registry class
                              • Suspicious use of SetWindowsHookEx
                              PID:4968
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:2248
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1240
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:2636
                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                    C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1392
                                  • C:\Windows\system32\vssvc.exe
                                    C:\Windows\system32\vssvc.exe
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1180
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\How To Decrypt My Files.html
                                    1⤵
                                      PID:292
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e2b73cb8,0x7ff9e2b73cc8,0x7ff9e2b73cd8
                                        2⤵
                                          PID:3936
                                      • C:\Windows\system32\OpenWith.exe
                                        C:\Windows\system32\OpenWith.exe -Embedding
                                        1⤵
                                        • Modifies registry class
                                        • Suspicious behavior: GetForegroundWindowSpam
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1184
                                      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                        C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                        1⤵
                                        • Executes dropped EXE
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:708
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                        1⤵
                                          PID:3592
                                        • C:\Windows\System32\oobe\UserOOBEBroker.exe
                                          C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
                                          1⤵
                                          • Drops file in Windows directory
                                          PID:4484
                                        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
                                          C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
                                          1⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4912
                                        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                          C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3724
                                        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                          C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4568
                                        • C:\Windows\System32\oobe\UserOOBEBroker.exe
                                          C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
                                          1⤵
                                          • Drops file in Windows directory
                                          PID:3208
                                        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
                                          C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
                                          1⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3200
                                        • C:\Windows\system32\SystemSettingsAdminFlows.exe
                                          "C:\Windows\system32\SystemSettingsAdminFlows.exe" FeaturedResetPC
                                          1⤵
                                          • Loads dropped DLL
                                          • Enumerates connected drives
                                          • Drops file in System32 directory
                                          • Drops file in Windows directory
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3600
                                        • C:\Windows\System32\vdsldr.exe
                                          C:\Windows\System32\vdsldr.exe -Embedding
                                          1⤵
                                            PID:3964
                                          • C:\Windows\System32\vds.exe
                                            C:\Windows\System32\vds.exe
                                            1⤵
                                            • Checks SCSI registry key(s)
                                            PID:4380
                                          • C:\Windows\System32\vdsldr.exe
                                            C:\Windows\System32\vdsldr.exe -Embedding
                                            1⤵
                                              PID:2460
                                            • C:\Windows\system32\vssvc.exe
                                              C:\Windows\system32\vssvc.exe
                                              1⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3948
                                            • C:\Windows\system32\LogonUI.exe
                                              "LogonUI.exe" /flags:0x4 /state0:0xa39f5855 /state1:0x41c64e6d
                                              1⤵
                                              • Modifies data under HKEY_USERS
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2868

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\$SysReset\Logs\ResetConfig.ini

                                              Filesize

                                              186B

                                              MD5

                                              47069918e9e83eb02bff5ce5498c9bbd

                                              SHA1

                                              17ffee2e0ddfec27bba8c1a3550d57c7f92960d5

                                              SHA256

                                              e7688a4bb28fbb7b562886e29da34887d6189a52041de39b538d5c2caf3c932e

                                              SHA512

                                              7a0d2ed36988aa921e0e09779bb8defe38133c8f6add2159cceeee59f5083d391fea2f7bee961b5bba4767e75eea8a2670e7900290c17ce7cc80fae7e037a4c1

                                            • C:\$SysReset\Logs\setupact.log

                                              Filesize

                                              115KB

                                              MD5

                                              dcffb49bd7922a9c4d654fd6253e8196

                                              SHA1

                                              2549d2685947592df2bb0099d94250010d6627c5

                                              SHA256

                                              e1f138ef4b43a0dde6114be4921e116db45f1437244a717bc9f5a3a309a91219

                                              SHA512

                                              405525edb90d452c693595cc770e98e25bc172086a09d6b9aae2f64da7e9e95aa01f46da76d136153ebf6c967a68c30d9082993967c397a409e6963c7799fefe

                                            • C:\$SysReset\Logs\setuperr.log

                                              Filesize

                                              974B

                                              MD5

                                              2d94428bc3bf39c5aba0b0473412dc4e

                                              SHA1

                                              880e4890b3d7fd8b9d46c68f4523458428285c00

                                              SHA256

                                              5b6d126d1251972caf85c4f54d23f230d28e287d796ee86f5c815d7ef38e7bc8

                                              SHA512

                                              c5d9a8450631990c7b3b4a52542084de1da7deb4b57a63544d76e1f8547ead8e81ab6cc8537605c07b48cb473fe96798c74a25d346a249238383d2c8ebab51d6

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                              Filesize

                                              2KB

                                              MD5

                                              627073ee3ca9676911bee35548eff2b8

                                              SHA1

                                              4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                              SHA256

                                              85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                              SHA512

                                              3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log

                                              Filesize

                                              654B

                                              MD5

                                              2cbbb74b7da1f720b48ed31085cbd5b8

                                              SHA1

                                              79caa9a3ea8abe1b9c4326c3633da64a5f724964

                                              SHA256

                                              e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3

                                              SHA512

                                              ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              b0177afa818e013394b36a04cb111278

                                              SHA1

                                              dbc5c47e7a7df24259d67edf5fbbfa1b1fae3fe5

                                              SHA256

                                              ffc2c53bfd37576b435309c750a5b81580a076c83019d34172f6635ff20c2a9d

                                              SHA512

                                              d3b9e3a0a99f191edcf33f3658abd3c88afbb12d7b14d3b421b72b74d551b64d2a13d07db94c90b85606198ee6c9e52072e1017f8c8c6144c03acf509793a9db

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              9af507866fb23dace6259791c377531f

                                              SHA1

                                              5a5914fc48341ac112bfcd71b946fc0b2619f933

                                              SHA256

                                              5fb3ec65ce1e6f47694e56a07c63e3b8af9876d80387a71f1917deae690d069f

                                              SHA512

                                              c58c963ecd2c53f0c427f91dc41d9b2a9b766f2e04d7dae5236cb3c769d1f048e4a342ea75e4a690f3a207baa1d3add672160c1f317abfe703fd1d2216b1baf7

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              63f4d461ddbb1a560e08b75d3688aa39

                                              SHA1

                                              96040dce1183a479a7645b2ee0bf0b8db3aef9e9

                                              SHA256

                                              c726b29b91eef92ad7588fe6d4a506191edb144a45f08f054c3db9e7fb03aa30

                                              SHA512

                                              2c8de04bff18106848a5a529a7c37e8fd6fa12911b709a87aa7f52619ace2fcb6d1ccf8b61c16b8fe36ce40ca6ec8b2dd3cd415e6a86948214952413954cec81

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              fdcf5b637778920139cd6c0b819af631

                                              SHA1

                                              074392e5fbbb56d1a3675fd00c26f69090ba398e

                                              SHA256

                                              7f1a7aced6d21ee8c9e439bd8c9b623ab6b2c518127d25c5716c6410049a97be

                                              SHA512

                                              0b65d15cc6613ebf6b3b592fbdc5552716bbc5bc8f673384d0f731cae3b71124ebdac229a4bd7be95e66e193f46aaebd31080c087e0d7e0db680c419c0d1e338

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              28386833adebce4b3283c78f1b56aed9

                                              SHA1

                                              fbea2d3800694416dd268bcda2fd34718e064d3c

                                              SHA256

                                              2bac69e9bebcef5fae29240f01edaf60e564f70518d03aaacb782970547d5eae

                                              SHA512

                                              ff241f23d181847f4396d04d9bc446897aefd8051d6e7ba8ded5843e10483928e3b3774e65ce5d497fa30eda98382af5862ddd6232991dc2abd80114228d4187

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              46295cac801e5d4857d09837238a6394

                                              SHA1

                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                              SHA256

                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                              SHA512

                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              206702161f94c5cd39fadd03f4014d98

                                              SHA1

                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                              SHA256

                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                              SHA512

                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              4bd8fbf6a92c2485d6563abbb67d4a16

                                              SHA1

                                              e0850ea027f17b82534047cf425304420ef70abd

                                              SHA256

                                              c7c09449c64d9175df911f47710712d8b7fdc82ea05149d12a0ee96ed8833751

                                              SHA512

                                              39d81b7708e4848e4cf33a5272a79e8cd74618adf576095f5e0d01e27dc51107a25dc635045ad80e500c2b97c5db59c1dec4b059fceddc8f06918628a13f16cd

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              c12dc35114132c7b41bcfa906cfbf4e1

                                              SHA1

                                              4c61b5cf48104f9e3bf9bdeab338f2166e3285c0

                                              SHA256

                                              ed917a0448b46062e2746d7c632209f41b3b5ffe110dce208c7000cf13394715

                                              SHA512

                                              56a871c9a91a46dda616ab78ed915a0221e838f9f387d2716f0e9c4f51138f9675f01fe59db5c13d797c94f0d36f82e440698a57a467a04c078924d0a11c1e2f

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              2ff3d77479537b59f1fcb18896f8181b

                                              SHA1

                                              0a809280b4e843f41d19b3c22b31831f03a419a4

                                              SHA256

                                              7cb4ad00a8f6fd76a77c722d5ea6cabb1723b3f3b2ce2aa2fce3619bee965248

                                              SHA512

                                              2baf4b5f25a41e9910915143196e461bd829115ceab709f9e64a1083188d3336eb89a307cfd7da130983648587d52a2004c5c6023c0a9a1b0fdc0a159df34098

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                              Filesize

                                              264KB

                                              MD5

                                              c8bc0ac153df53827fc5225b2df3c7c3

                                              SHA1

                                              28858df3346c87b50cd7d63580179d0fc76b0956

                                              SHA256

                                              61b5370fe01ec8a441534c4ff431b2fcd98a41667f2fcb5c547468bd02268bf3

                                              SHA512

                                              285914357386a4a33aa17183970adac6f4937c341f80d0a16b6bb49711cda2c92ce0d0152935b5a6daddae1b04014d9bc2135530222c6672b892af9e431db0f3

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              944B

                                              MD5

                                              d0a4a3b9a52b8fe3b019f6cd0ef3dad6

                                              SHA1

                                              fed70ce7834c3b97edbd078eccda1e5effa527cd

                                              SHA256

                                              21942e513f223fdad778348fbb20617dd29f986bccd87824c0ae7f15649f3f31

                                              SHA512

                                              1a66f837b4e7fb6346d0500aeacb44902fb8a239bce23416271263eba46fddae58a17075e188ae43eb516c841e02c87e32ebd73256c7cc2c0713d00c35f1761b

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              944B

                                              MD5

                                              781da0576417bf414dc558e5a315e2be

                                              SHA1

                                              215451c1e370be595f1c389f587efeaa93108b4c

                                              SHA256

                                              41a5aef8b0bbeea2766f40a7bba2c78322379f167c610f7055ccb69e7db030fe

                                              SHA512

                                              24e283aa30a2903ebe154dad49b26067a45e46fec57549ad080d3b9ec3f272044efaaed3822d067837f5521262192f466c47195ffe7f75f8c7c5dcf3159ea737

                                            • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                              Filesize

                                              10KB

                                              MD5

                                              30f9f69bd4cb3ca8ed4af465e6bf3b72

                                              SHA1

                                              1f7bf3625d683c1af38485d1eb39152949648749

                                              SHA256

                                              fbb114871abc3901711a5f204cb370f1cc1602ad89fa0c8155288ec72e4eaf36

                                              SHA512

                                              ae96746716d0b47912c191ca52db48ee40aca9591444c1f0ffbc913346be1fff1e9f71c6e66cb4c175fd308e04a504367dd56bf84920f94c65142cd8508258c2

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vhlfrblb.o5a.ps1

                                              Filesize

                                              60B

                                              MD5

                                              d17fe0a3f47be24a6453e9ef58c94641

                                              SHA1

                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                              SHA256

                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                              SHA512

                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe

                                              Filesize

                                              80KB

                                              MD5

                                              84ef912e583e2085324aff1b1838ea02

                                              SHA1

                                              4cf9e83bb995c40e1b509090c2523954b19b31f4

                                              SHA256

                                              8ba3b9263bbf0baf8b955e53272b90dca4c7525fd42d1368386aa95ec71a434a

                                              SHA512

                                              b0b9fa353f413f1215bb8d49546a5914e80e96aacdc675c085371ea9f6797e332b77655f96abb99fff4105020f12f32a8b8ad36078a0f68de65bdb724995e56b

                                            • C:\Users\Admin\Desktop\AddStart.hta

                                              Filesize

                                              247KB

                                              MD5

                                              f18639f02d445b5cc056e9d2ea176e33

                                              SHA1

                                              e4eebf1f7f720b278db0442e548204ec00adc7e9

                                              SHA256

                                              86977b7263eb6f0fa44b82a361665bcdf5a94d92d58cd5c2dea6c4ab24591a76

                                              SHA512

                                              eac68a7c9e2f897708fbc42ec8f131dede51db89898a3a97ce344ad2022a50314b08677a9fe13ca7e5c965bbc1f74428d72705397129209eac1a8d940fb0c140

                                            • C:\Users\Admin\Desktop\BackupCheckpoint.cr2

                                              Filesize

                                              301KB

                                              MD5

                                              a90db60657baae3ea6a744d3bd7583dd

                                              SHA1

                                              4849fecac6640179390d4fc3aecd14e3bc9b1169

                                              SHA256

                                              e73b0ceedc33ed7d3c5a4ee24a4cb2fe427a710749febb84e1e61c147e24d5be

                                              SHA512

                                              08fb08ccee2139c4b615dc05bfb73459c67db8732cc75804112a938a4694126b7fcee44f915d57cadfe95a8f9b4a5f04b7384c59486342b982f304f8a21b9f0b

                                            • C:\Users\Admin\Desktop\CompleteExpand.xlsx

                                              Filesize

                                              10KB

                                              MD5

                                              a0069c575766dcaa939185465ee67385

                                              SHA1

                                              4aca3db469eca00e7149ee530b4ebb4f7f83ebb1

                                              SHA256

                                              d507f03512ef93e552e5b2d03708cd1b025fa460f180cf4e15e31205cc10db8c

                                              SHA512

                                              a7d8de482d7e23e9ee8ed102b515ca5bbbf2f06cc4cf645f717dc1c87b50a52bf5ef381a03d41a5376b471f5cff7bbeb12433a0785d7fd2b85296379fb18344e

                                            • C:\Users\Admin\Desktop\ConfirmApprove.jpg

                                              Filesize

                                              488KB

                                              MD5

                                              b5df1bdc6f983288a3f69e3839b549cb

                                              SHA1

                                              ac08d27211a1c5a3a3373209f288e511cb5d782a

                                              SHA256

                                              56738974652ee1a319fc07136eeddb7d734efe21e85fa4c0828f7971847097ea

                                              SHA512

                                              0355b37b5e3eb8bd93230fe9ce9eaf1bca762d0be3591a25fc1223222aabf922306a10ad9d43ea78c9345d59b1bfe3e9e4ec65ce2d350fd8feb2d782be5ac556

                                            • C:\Users\Admin\Desktop\ConnectUndo.xla

                                              Filesize

                                              462KB

                                              MD5

                                              d98b6194b0857f0a2887314b231316f9

                                              SHA1

                                              a431ad3431ce056ffd21ab6910c19371bd1068ca

                                              SHA256

                                              d056541b95ce4ec4286589c13c003678220c2631c82414d688c9ae9eaca383e9

                                              SHA512

                                              c0b5d7806c1f8fb9ba6b03ab756d22f099d3e074a0eaf98fde2b1de85699120fa7171bc6772fe8400aa0c2da480d1c3b49fd762ace9b531aede0150372534dca

                                            • C:\Users\Admin\Desktop\CopyOptimize.kix

                                              Filesize

                                              207KB

                                              MD5

                                              25fa4df20afe568b4139aef46c487f5f

                                              SHA1

                                              52197790487463f0cb7dcf40aaefa6b93c6ba6d0

                                              SHA256

                                              12bddcdf045eb46578a3fa5f492d81353268dc7c74ea62c3eae00d9bc6a1e058

                                              SHA512

                                              f13ba33f27d812569d0c8c2ee3850ebece6442769df5d9b31c5ce35030dbdf2ccd24d87cef5ea7aec2303f58b05eda407da87e8983e5d074d8c2c72fa26d2104

                                            • C:\Users\Admin\Desktop\DebugEnter.exe

                                              Filesize

                                              274KB

                                              MD5

                                              bbd23585eca8df536f28d7d38fbbdf40

                                              SHA1

                                              09d95aeccea71ec67246d3dc9f5c4dc887500283

                                              SHA256

                                              8023768a9d94c393756751f5086df28ed7355fc9fa71e0f9d00631596e9ccd38

                                              SHA512

                                              901e597825153117e7ea24726fbfc861cbfb039f65d315bebc009e8ae528da2c7dc52367479e89a4ed40aba6a0f2c97ca9c4c5c42e1827afe7ed9a0db05d6bfa

                                            • C:\Users\Admin\Desktop\DenyTrace.3g2

                                              Filesize

                                              341KB

                                              MD5

                                              5e9cec64421f8ec6cfecb079d4be4233

                                              SHA1

                                              13022eab7308891af9c74e95e2b0af8112008d35

                                              SHA256

                                              142215cb8584c8a824b27a23762eaa609fd6f1e459716db86cfb848d02ee5c7f

                                              SHA512

                                              0291a286f1868f2c7c4f51566ea350474604e153b6206297ea428ddda9df916bf62a6af5939b052d2e6790aab518f8bd7ae807d50fe042c70c55d541189f5d77

                                            • C:\Users\Admin\Desktop\DismountWait.tiff

                                              Filesize

                                              529KB

                                              MD5

                                              c68e94aa237cb4cc1aa41e4c21665f03

                                              SHA1

                                              ed50b7b9ebf29dd1be2db03f55fb4e913367d8d7

                                              SHA256

                                              5cec809feced0af0ab6cd1c94b81c09c0ec7b6bd0caed4245d23077f75d09aae

                                              SHA512

                                              3ae3a462a8785c7c9aa9a18fe540a14905f091d5602b7778ef356952741123d27486d7c22af2a6fa7ab8843c8fd16545699225f29a52f8da6d78fc74a83eacde

                                            • C:\Users\Admin\Desktop\EnableRead.docx

                                              Filesize

                                              314KB

                                              MD5

                                              b88f4d868019de75c9f03e85b4b6b9a1

                                              SHA1

                                              42cb0a539de3f76d5db17994ca07b70945f1178c

                                              SHA256

                                              02b539876bdf6cbcede8fd3e4e70337975d104e356bdf5970af818c7371aee1b

                                              SHA512

                                              32d68fb213ebe38a2cb51b6625cafaf6506e632e95a2d51118b70d3e3efa4ff313c131df2777c51f573b46eccb58aa7ce854ef3db02fea7342a41116ebdb452e

                                            • C:\Users\Admin\Desktop\EnterDeny.bin

                                              Filesize

                                              234KB

                                              MD5

                                              c880b36d1ea85a0a8c13a9252c654790

                                              SHA1

                                              a4e717c7c5932cd167cff2d8824d0359cb0c8964

                                              SHA256

                                              b1c8d3aaca4ab81962d5a964b7c9cdb2a6f5ec788304fdb441aba088ce0f86cd

                                              SHA512

                                              3d48875f1753d47fcceb0a32ba3101cc2f04af4cdc0aca754b9ca332b979db3a788d35c1e152d644605d786edd64c375f0f4710ee7f1a76ae16f37ffabe4e85a

                                            • C:\Users\Admin\Desktop\GetSwitch.pps

                                              Filesize

                                              220KB

                                              MD5

                                              3773184c83ec2f0a57eac6614a07a6e1

                                              SHA1

                                              997e3dacad7834b35d5cecb0eb82eb09880f77cc

                                              SHA256

                                              a79a80010957331f8209e656f1655f718df5b4420767a8a2c7af2c4bd5dea9f9

                                              SHA512

                                              8c1a7d60f06710bcac29bde05b3628c7a47fe3efdd6990e7e1d37f324f85b098f68473e2cad066ca4f1763bbb2911d65005417e04a1ee4716a885a4cb001c02f

                                            • C:\Users\Admin\Desktop\LimitConnect.fon

                                              Filesize

                                              368KB

                                              MD5

                                              44fa7f740edc5a258b4c4152dbdb7d91

                                              SHA1

                                              012d15aaf381edbfd632119bfdcc86be5939e33e

                                              SHA256

                                              df1486092247b3d0dbfb743e4b9433486706760ce527efcd4d12a1810805ad72

                                              SHA512

                                              22adaebacca34c85c8ccf87a955cb6225047ef4eb92e726b9104806550d541b87f4d0fcb8f895932cbc255740c4a1af8ad271f379ed6cf109a30eec1a52e9797

                                            • C:\Users\Admin\Desktop\LimitGet.vstm

                                              Filesize

                                              194KB

                                              MD5

                                              e29da7c8538a3e8392ae1a1c8ed512f8

                                              SHA1

                                              a5f7b79b0a8ca23d16d512a7f2d721b4720c6284

                                              SHA256

                                              d3e178f9e866a2c31432fed6a5f1b80f0652686b62ddcae697f14a8a033f834f

                                              SHA512

                                              15d00cba1c9ef0cdad6b110460817ce299307cc42f145970eaecc7f740eb8c9dae669d5a2d1ea947b28523b714af15aa6835f1ffa6452c2ccb0665d0e684e011

                                            • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                              Filesize

                                              2KB

                                              MD5

                                              a4cd0f222a3d61b14539d9c227844baf

                                              SHA1

                                              4896334759933ee0dd10b17c134b86fe1499d499

                                              SHA256

                                              5cbe3f571479da0b2ea73265fc834f59918f4db33170d02fb9bed9ccbb6d1dd5

                                              SHA512

                                              7f3e8c82ff8d5254f951bc86e3a7812848e00379314cca4144ac4b5bb340c4188b1bcead0f5b89492653d7b7d4506c3b50336008d9b67e062446998562a12f22

                                            • C:\Users\Admin\Desktop\NN.zip

                                              Filesize

                                              22B

                                              MD5

                                              76cdb2bad9582d23c1f6f4d868218d6c

                                              SHA1

                                              b04f3ee8f5e43fa3b162981b50bb72fe1acabb33

                                              SHA256

                                              8739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85

                                              SHA512

                                              5e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f

                                            • C:\Users\Admin\Desktop\OpenComplete.MTS

                                              Filesize

                                              408KB

                                              MD5

                                              6ae9a1a3f5b15be0428497ce013ae703

                                              SHA1

                                              4040af4cee80765e738986b5b616aedd30dd9659

                                              SHA256

                                              164c453fedca3b068df823e19e6f1b118482130f4d08eae26af31cb21887bcdb

                                              SHA512

                                              13818a2c970066596a726e72bbcdebe1df833864455207aaa8d3ba66e7270708a187a6f00d1464976471469f80aedaf074729ad360183cad2bbf5e5e41408f5e

                                            • C:\Users\Admin\Desktop\PublishUninstall.ini

                                              Filesize

                                              261KB

                                              MD5

                                              91e31e47b8fa922e661c498b471364d3

                                              SHA1

                                              039cda747377b417bd857652a6d91ce9e9eed5f2

                                              SHA256

                                              c5db1b01e859e064d2edf9f1ee71767252d38f1678bbcbe6aaea8f82e0fdd604

                                              SHA512

                                              41c640fc80ab9cd4e7a83745aecb95076f5192921d9a45a0fb3dce5d89c791121daecca8e4a65c8a25b4b35fbde466eff756467ded60a2d3587490624bfd83ba

                                            • C:\Users\Admin\Desktop\PushResolve.scf

                                              Filesize

                                              395KB

                                              MD5

                                              235b03c81ac97346e8d7a87f4291520b

                                              SHA1

                                              a7b1593678144addfe427940279d0b25f1ecda96

                                              SHA256

                                              d0869c060749422d0871653da05bbc7bcc545a412985c5fda89c4dd775517bef

                                              SHA512

                                              668f9b391b9c0b2872f84bae22b454abe6b86fef4b8ccc80e1bc90336f04ddd9f11491baae4158778d75b165d374ca3b08484823115273f696916c4ccaeb3b31

                                            • C:\Users\Admin\Desktop\RedoPop.wdp

                                              Filesize

                                              381KB

                                              MD5

                                              34f5a20d0987e403222534118a700fd3

                                              SHA1

                                              cf6c89a66d3f0168c83664487074584f3ba569d6

                                              SHA256

                                              2962976ac4cba72a9e0ab46b8b8bbbcc3b234ce7c4b081173f788d90affef0f1

                                              SHA512

                                              da24c4cd3b88ff19f674072ba8deeb4c9e51de3ce04cc60f104d4fbd8f967aa815a670e817e9c043feab7712ac08637c1f9cd1b799f6d274f6d5cb5e512779c4

                                            • C:\Users\Admin\Desktop\RenameStart.scf

                                              Filesize

                                              448KB

                                              MD5

                                              7d403119ef397829e0a35277f1b3cdf0

                                              SHA1

                                              a513dca5f4022417485b314186f4cf61b2d67e5a

                                              SHA256

                                              eabcfe2995236889a1266b2b5bfb2567f8f153ee122d93f8665404f8f1373459

                                              SHA512

                                              69fb361c4a322d31727fff1dff3f65c31aee7a4cde1e4071c934d319724f65da00759c0b4932b312eb57cdc75596909470cce4c5c4a4d536f37a0635a06bc54f

                                            • C:\Users\Admin\Desktop\RepairDisconnect.xltx

                                              Filesize

                                              475KB

                                              MD5

                                              152ad2920c53588059a2de14430a0a5d

                                              SHA1

                                              50003b3878d49751e14e3f6ce66c5a325b325494

                                              SHA256

                                              2dea899eaedc83084c27e46a099136e1ca351be58ab34395a90839db33458e15

                                              SHA512

                                              0d9c000b1332771282a5565ead2ecb4e049a20e3f6454e3f1b93e98e00cd64bcf4014c9ea493448b20bdf4092a811c10fc850f5dbe608d0110714a70c909fea4

                                            • C:\Users\Admin\Desktop\ResolveUnprotect.php

                                              Filesize

                                              502KB

                                              MD5

                                              26afc1191a683b8d2a9ee486094f877c

                                              SHA1

                                              ee193fc0ba1d9da964eee3bd9af9a5e9fdd3d494

                                              SHA256

                                              06129d29c448a18088b43ea7e4d50c1e1ee9673649c0e32abd87aca4465c3fe4

                                              SHA512

                                              9b0e35646b42bd4cc1c41e5dd69f6e42297b1bf5234ad0e8732d20f35d0d93f6d4e4c0b04e6f721e578917dcd0bb204683647ef3313ddad6f19d1e92ac1db66c

                                            • C:\Users\Admin\Desktop\RestartConnect.html

                                              Filesize

                                              555KB

                                              MD5

                                              541fc70e730fb3dafca9f7d893165cff

                                              SHA1

                                              7afdeabd5e2316ab7263911c5ee76064cfbd0d88

                                              SHA256

                                              ebd39a89dd989828802734a9333a180ebb4b5781e4ae2c9b13c47a3537de2e4a

                                              SHA512

                                              1dc2d8e662baa9dd1ee44fd107c74fe9c5c248246f191054ea1d10e5ad1c9c3c411a9c3b35d36dfc2b89a97148e2d284d0503c71d9e5fab7b8f96368d029696b

                                            • C:\Users\Admin\Desktop\RestoreProtect.ps1

                                              Filesize

                                              287KB

                                              MD5

                                              4e731f917aa584fa587671fbb17797c1

                                              SHA1

                                              e8c257018c95cccf1ef22b55243f1cd4a0c4d628

                                              SHA256

                                              89052c353e2a8c0e5e4821f34d52a49396e51343787fba29b091d8aaaf2cd0bf

                                              SHA512

                                              d5e983457282b8e89b717f6ce71efa756e0cbb738a2384fa2340311cf14b506ac2a2d285bf0a6ee982e49c476cd0434cd6fc3cb019bcc4ec733cc77986640a60

                                            • C:\Users\Admin\Desktop\SaveWrite.mp4

                                              Filesize

                                              763KB

                                              MD5

                                              5816436489515cf455d4b740f39cb248

                                              SHA1

                                              0129a02e2412fbdb4fdb24a3283cbdc50e94f413

                                              SHA256

                                              ff2a3b751c41d053c019408e206bde5c1e10b4a1b532c8ce79e10b2375e60816

                                              SHA512

                                              e7ebfc3b0a44d1d4a89b2784a60d6885598b4c86e378393e70135f6f142eaf1824f0f2969417ad3538b1058c95bd8f57b98c18631a7f1f86fa16abf259aa6dfa

                                            • C:\Users\Admin\Desktop\ShowStep.wm

                                              Filesize

                                              354KB

                                              MD5

                                              7740676c5c015a3da8c0b72f91a0764b

                                              SHA1

                                              83530337fa7dd99d00aa2681409e569d558ed3bd

                                              SHA256

                                              319e7500492b6383b1da80876d05e83ccb026264ac58e49bf6810d289d6e6e8a

                                              SHA512

                                              d3ac677987233bd9598b76f2e2e9a1d39a6ea5a274dfaeb2a7b0cbc5da328cb1be5d5a0c342e24a48d1d1c2bf2d26bf913fb2120428b149a316d8e5139c7b727

                                            • C:\Users\Admin\Desktop\SkipPing.vssx

                                              Filesize

                                              515KB

                                              MD5

                                              6fadae9eb07fc02091b378d7e68ac84b

                                              SHA1

                                              2077e4420d4187ab46a44f485f925bb7721625d4

                                              SHA256

                                              ee13eda24e5a62b8551d15cb99fdabae9dc8256ed017baf79aa535c7a01e5317

                                              SHA512

                                              fbc5fc01a2d86e7d277488c514031390fa0862652d1413899177dc52d76139184150d9df70b1824c3357da7f9be7736b4866c967e3a9074e21db6751728500b6

                                            • C:\Users\Admin\Desktop\StepGet.xlsx

                                              Filesize

                                              14KB

                                              MD5

                                              5b345096a9273a4d095881a0e5871482

                                              SHA1

                                              e2146ca2c60c548248319a1fbf13635213d242cf

                                              SHA256

                                              e9af552f8dd69da50f33111db9609f5185ae99069c9523729bd3f8a5df2437a0

                                              SHA512

                                              a4f8e3c358cb1eb6957a4ae8065c37c9fb8d89720a12105d3710e535c2aeed8aea7499ca0d48da86d5a489ee8701b4edc6363d68f7f0914ca72f8d0efc441d30

                                            • C:\Users\Admin\Desktop\StopFormat.7z

                                              Filesize

                                              328KB

                                              MD5

                                              992a3ee1bbf8e7ad2ac40b894ceebea8

                                              SHA1

                                              657084d58b67251ffcadae97bb8a8281d38bd12a

                                              SHA256

                                              dd909a7d9880ac33ac976930259def011a0cb9e72db929e28ca348637b4784aa

                                              SHA512

                                              8477ba0ff4684a260dc9c8c75577548b36e6f84568efdbe2c238baff889218d779b75e588cb8ef50c54d17c0df22801cd5b218fddad6dab52549f05d68b23db2

                                            • C:\Users\Admin\Desktop\SubmitUninstall.xltx

                                              Filesize

                                              542KB

                                              MD5

                                              ccaf1ca0e7ed9bb8219165b54c79c723

                                              SHA1

                                              24b75ca6b955a7345e9a49bf9648afb6f99a593e

                                              SHA256

                                              fbb94ac7ad8e3af0a2d92169a6c364b1ad7e6425ec75dcce7ccb5995f982922f

                                              SHA512

                                              9c42bce120195a23f20a3eafd2b173c686691970cc863ff922fefbbcf05c3741fd440644273c0a8c6e292b0d5301f6d8716f6dbe7653d2d8afb26bd2eaa579fb

                                            • C:\Users\Admin\Desktop\SwitchAssert.txt

                                              Filesize

                                              435KB

                                              MD5

                                              d3db75f06ab5172ac91c0bb36cf6b3a2

                                              SHA1

                                              971055618cd060c4fd5f8cf6fb4a59fa9e7386b2

                                              SHA256

                                              61cf6097ae88aea2000034ea646e1d0bbe8c59ed1e6a7ba7b11f49d7f935324d

                                              SHA512

                                              77d052e4c2d9440a838f4dc8dfa0d3293e8d02a90b83ff8f7ea77605f33573cc38992482b4ad34b10543e5e10f95342c029531c070c1d5f44a7f8202d2640dc9

                                            • C:\Users\Admin\Desktop\UninstallMove.docx

                                              Filesize

                                              18KB

                                              MD5

                                              9a404e99029f880e452d4395b5df470b

                                              SHA1

                                              661d921cedc7d84010ec9e362e62364632726efc

                                              SHA256

                                              38060c7fd1abf6bfdadb5688d71647a330f51c1bee7be34143c1b79d664b2395

                                              SHA512

                                              918d7cd143d034a2964a597c88a936d172e88d844d8f819849f388a629cc410e620fad705bb712a3a64ec25fe00cf68d1ed99404fa5bc8c72e9d1bdf962fa8de

                                            • C:\Users\Admin\Desktop\UnlockStep.docx

                                              Filesize

                                              15KB

                                              MD5

                                              ad5e8b222e79050a6df5efdbc3902ff4

                                              SHA1

                                              8afb8667ae61548e93b6aefb581c65295b605a0c

                                              SHA256

                                              f88ecb983154420d94a54c96b13037bcd35a553eff58c7e6745bdb3de4babdc9

                                              SHA512

                                              eb877f2688bbaa0ee47c654f4677f4fcb07ba8133dfbd9e5abaddd9277759169001b4535acc47a7bf2562422fd2c12d91ffa92655a351f7a20b207deae5dbc6b

                                            • C:\Users\Admin\Desktop\UnpublishRemove.ppt

                                              Filesize

                                              421KB

                                              MD5

                                              925c8ddd1c9d346412de2d52f6856ec7

                                              SHA1

                                              e4a54bc574b48c0013b4246d18c4a50ddf62dffb

                                              SHA256

                                              af52956467fe8327c09e1c74aa8458e0763c6c1082ce774c60dde31ee0330884

                                              SHA512

                                              3428f6acb8fd5afd826ef2fdcad5ac9b902df5fcc44f7c0711e7b611abc2a2af269f8d7213abc2b3d48d25336880b3045d81b53b3d867b489e360e2050769327

                                            • C:\Users\Admin\Desktop\cum.zip

                                              Filesize

                                              11.1MB

                                              MD5

                                              ed3036173fb244e6f48eb2c0420c0ec1

                                              SHA1

                                              79293eb2c47ae02615cba5a868869eddc9bcfcfc

                                              SHA256

                                              223d039282faae8092d2cfe5e7667ea4a3e8d2fd1e3611f36be433281634a170

                                              SHA512

                                              918b56062f7ff1e0877e85aca8b0d175d3355fe98da7424562255324acdcd264929ec83feb10b0c05c3319c3a9fb10a9512d527c8c6e6a9a8b5500af38ba3b5a

                                            • C:\Users\Admin\NTUSER.DAT{2fa72cf3-34ca-11ed-acae-cbf1edc82a99}.TMContainer00000000000000000001.regtrans-ms.ENC

                                              Filesize

                                              16B

                                              MD5

                                              540f1d8449c802400da389a88e1ebfcf

                                              SHA1

                                              db17189f0040b73702b1086f54178956cf0396cc

                                              SHA256

                                              cfb398eb87665241943d0b6b1def71c858f55b96832a81542465c2ed5ba4f0d1

                                              SHA512

                                              2261bc55457cb57d69491589f0a86797be54ac0cc3e7edca8cc42ca58b3e02908b50d14ebb4aeac645eef362f467b116292579cb38b1d30f03f2f85e761ce95f

                                            • C:\Users\Public\Desktop\Acrobat Reader DC.lnk

                                              Filesize

                                              2KB

                                              MD5

                                              74d3d574bbf76b32274c20f5a4efeada

                                              SHA1

                                              4f1233f93ead2c5c74516106b3fc6acb8f366318

                                              SHA256

                                              546d1d4251af138cc9d8579ed80aa352f7270e75fbe2a00bb713ff9e212c334b

                                              SHA512

                                              5e6f400a77242777b36a235d68e023d33ffded2dd9f988d1204c169849d995a0aa46e2bc267429f0fd5e234d4e9bba1d9a79104c55889adc953509ed73f9cf8b

                                            • C:\Users\Public\Desktop\Firefox.lnk

                                              Filesize

                                              1000B

                                              MD5

                                              3ce641e3b0dcb645856091154792bba9

                                              SHA1

                                              265ca7deccb64b150a9cc7305772900c4cc7d610

                                              SHA256

                                              5b456bc5ed47dc00b5ce358507b1adac6903612913a1cb0241baa72ba69dff25

                                              SHA512

                                              9c3737c553481491fb2a97af96a11dc07a10549f426aa392fa39e98cecaec1aaef71fb46a92c56df5dd9691593f1c6b027a9a48037741cf74309c5f2e425116f

                                            • C:\Users\Public\Desktop\VLC media player.lnk

                                              Filesize

                                              923B

                                              MD5

                                              d96583ff37f257a3de30e5749f3ba0b8

                                              SHA1

                                              c9ccca544871302f3d5457915f666d96d468bdff

                                              SHA256

                                              fe74377974241a855e9c548eb8d0dd375aa2face23cef0d0647fa65205eff4ac

                                              SHA512

                                              2b341c6a2aeaac181b3d7c01cba1e034c2ef2a04b284173773f8343b513f25c251790d1ec6aa01eb91f9a403359092bc53f15d45b778d05640470d31c1578d96

                                            • C:\Windows\Logs\PBR\ResetSession.xml

                                              Filesize

                                              7KB

                                              MD5

                                              de11c3dbf318faf34dada8b1adf49188

                                              SHA1

                                              645387470c2a02219a0250329be287031739c8cc

                                              SHA256

                                              163c49b7df3a27ed82ff7dc8603ff5e25759ed0f7d0a9d5a4c42a734e8551430

                                              SHA512

                                              b8b5f2becf5a4bf35689be5fe884f0bbb7552272638905f178e3cc4af9eacca7d572ae9eae4037b40d307e953f5f284daa50ee89abbbc7e29e9ad4232e51852f

                                            • C:\Windows\Logs\PBR\SessionID.xml

                                              Filesize

                                              106B

                                              MD5

                                              b20a0a7888f049908ce398a8f776fa95

                                              SHA1

                                              b58acd77085ee976c0adf024e107cc1f5044d8e4

                                              SHA256

                                              3a4a5c1f10f6dbba24c58479cc4825e4e66bbd2354211a426cc84a0e2149d5d5

                                              SHA512

                                              dc20ac28b8d204c64897ad7435547e8fb165361ce982b3597e51461b40db9c26297eb0a640e42ed2eb40b19908ea78024bbc1b5a08338e105eaaefa1738a0867

                                            • C:\Windows\Logs\PBR\Timestamp.xml

                                              Filesize

                                              42B

                                              MD5

                                              dbb06a32a4106cdfe0902b4d83cb079a

                                              SHA1

                                              57759d6ae104cd503c284604d6c1b0930c7a50ff

                                              SHA256

                                              a9b07d89e4f29552f295a12a17328dbdc1c6346304bb5677858a5291d8bc4e45

                                              SHA512

                                              acc9613527514347a10b00043a4c82919b19dd535f6cc18a883af7185eb4ed6ddd763a439200573f1dbe71664c558560295a236230682c6eb646a96d8b7e9d9e

                                            • C:\Windows\Logs\PBR\WinRE\bootstat.dat

                                              Filesize

                                              66KB

                                              MD5

                                              668d82b83f8c52c0e5368a44b7eaa5a4

                                              SHA1

                                              069ec5b3f9ae609baafe6e59651dd361a9c6b33f

                                              SHA256

                                              106beb7dabcde632548e4e752c3c6222936ba8ddc2cf7e4864296070bd0553e1

                                              SHA512

                                              e475a3b75a9fbd00c80da10debf287cbfa06a7d583cbc886e42db81f9e0b32f2dc6c3676181d430699bfb2ffe0c71f5e40bd80836d5c2794840d7d1ab0d9b98d

                                            • C:\Windows\Panther\UnattendGC\diagwrn.xml

                                              Filesize

                                              14KB

                                              MD5

                                              c18d45d4633b1326c29458ddf99c05a1

                                              SHA1

                                              6c5e4d47d65629a1d98accffb830169962b42841

                                              SHA256

                                              0b5754bf14cf041e27b93f7ac89ec1035c5ed9b4c2f01482585a4b887f19c6d7

                                              SHA512

                                              c08b3bb99f7542e2829406c243887fceb94e4d5a0d5a56fb5f2a0e69e1e63957e3914ab4dad23d067e1025701e15a6ebe62b002c0c9714e37ed3919d16f495f3

                                            • C:\Windows\System32\Recovery\ReAgent.xml

                                              Filesize

                                              1KB

                                              MD5

                                              0c67566cfc337e11455b57c7aad0f99d

                                              SHA1

                                              93fb3650da854007ba8daa0cc08a3d941b98abf6

                                              SHA256

                                              7ece821882abbc5fef68c6e538b03daa0a0653a408decaf2958b54ade27c9319

                                              SHA512

                                              fad37bc7cb143582b9100b1fef47ea0b39086486e89f01c6b1ac17630aca9262acbbab072cabbc9b383133a66e96c70ea98f000d65ce4dfd69b637b8e4b5a938

                                            • C:\Windows\Temp\ASPNETSetup_00000.log

                                              Filesize

                                              957B

                                              MD5

                                              e45bfd106bdad85331ab81383e74158d

                                              SHA1

                                              01d0de55d1001d2f205307beb243e46638c913ed

                                              SHA256

                                              cb05383659f8106594d7edc30481d286f95693370671a956e2e820074cfec699

                                              SHA512

                                              f98bb9648276cf8e1e9236b6bc8e74815623d8287115955fce173fe868c4418685402eb8770a2cd6b9961ee5f22b9d5368c7b44df54edf08a60877396c4b9a65

                                            • C:\Windows\Temp\ASPNETSetup_00001.log

                                              Filesize

                                              959B

                                              MD5

                                              05d4811a680820dabdc2a1ab9625ce07

                                              SHA1

                                              7fcac70c17f965efc0d85f6a3d6acf6c63d24823

                                              SHA256

                                              b2412be19ee1235b2d9294b591450e3f2f48df390ec66e3d4b1a86994040accf

                                              SHA512

                                              c1e3ddeb623f71807f66aeb83c06c7a16e767a92e27b426b9a953763a36d4bb4c581b5f357f064e6b5a7469b9af35f7f39b653022ae203caad5d9609ed7934f8

                                            • C:\Windows\Temp\FTOHEKWV-20240802-1533.log

                                              Filesize

                                              424KB

                                              MD5

                                              dadc489578ed824aaf6287ce34cbbc31

                                              SHA1

                                              e3ed6e21178e021919fc8d8e29888feeb33c4990

                                              SHA256

                                              e8ae1725b26f46854d0fe0cf8699909960eacae605c19d66308664f1d8ab9ab7

                                              SHA512

                                              6964c49a1c168006c85223bc475145ecdbc768dafb24fdac25e100c905c508e99d92a7fed7fab0d5e618af97a56ab0a73a7c5774d560a340393ee23ab8a3a18a

                                            • C:\Windows\Temp\FTOHEKWV-20240802-1533a.log

                                              Filesize

                                              49KB

                                              MD5

                                              6283c8335606d2f67f242e3216d0d7c8

                                              SHA1

                                              e59996a72ddd32ee97108c98323b6755e9e58a43

                                              SHA256

                                              19522e05687b73626f6cc74eba546df3e82d2ba0a6071f4c05bbbd9692331938

                                              SHA512

                                              7024960505794a8c8ce21a8fd97100397d030ead85adf21a8e5fd0acc7cf93df3c447ab3e48b053acc17521f49d38842bc2c20ffec401f3c9863ebb50636a403

                                            • C:\Windows\Temp\FTOHEKWV-20240802-1533b.log

                                              Filesize

                                              28KB

                                              MD5

                                              31a9f5936f645d7f2703e0bce543f28b

                                              SHA1

                                              10a4539f107bab094c43fb41c7d95a56cb490757

                                              SHA256

                                              b82ba82ec912d1cbd8a5280b8baa0002c5ffbec27dbf83096aeebe2d260fd24c

                                              SHA512

                                              4c8db3fcccb4dfce61ac600dd725eb4c72b650b460fa4e5aafddb8dff6cf1dd1b9cf080bd75374427250293ed939348fb6402b22972d18fbccec609984f15f0c

                                            • C:\Windows\Temp\FTOHEKWV-20240802-1533c.log

                                              Filesize

                                              30KB

                                              MD5

                                              a7a79adab888ba09b6f958595aa34ece

                                              SHA1

                                              ea9ad77140d24fb3b4019c5d5ca901905b0a9ae7

                                              SHA256

                                              3054246df6ed163f65f97895b5fc806539788a7e798d71ed02fc3497165017bf

                                              SHA512

                                              4f05a288b5f7bdd16a6ac9e5766104a391e0fda5dfbf0607c332c0a8695d7f3384d773c64bd2fa1136a02131ad13cb2722907d47a9d031cbb20a2f840e07a6a8

                                            • C:\Windows\Temp\FTOHEKWV-20240802-1533d.log

                                              Filesize

                                              28KB

                                              MD5

                                              0c4bcb55082f59fd18e8a04d898a590e

                                              SHA1

                                              7cd749149f57911eecc9ca413a48ee2632c1625f

                                              SHA256

                                              65551e4ee242d9fe94a2f115154cf7d7ee6a21d07fb1d09150e2704740d6d751

                                              SHA512

                                              ac83ccc83b32bf4c874e807c1946b22215256a3e602efafc9455f7375752a0245ead0d41cdf6c696e38fecb66b74bed898133ccaeb4c19ac751facb060a45ba3

                                            • C:\Windows\Temp\FTOHEKWV-20240802-1533e.log

                                              Filesize

                                              39KB

                                              MD5

                                              f15cc0840f972a886480cecad2f12ccb

                                              SHA1

                                              4bb0744de02792a1883816850dc0e008b1783953

                                              SHA256

                                              8e7c930202e91dc4dfd5bcae1defc564c0245e78538bfd5565e1ae5b2758c4ae

                                              SHA512

                                              1d193d927317a5a64ff45f05d79d424548ffda3acd2d529c516779dcf7f5f6ede3a619ac82df89b2a1f2ca32468f425453a4105797cd66d1464820c1ed831711

                                            • C:\Windows\Temp\FTOHEKWV-20240802-1540.log

                                              Filesize

                                              89KB

                                              MD5

                                              a63c992d0d9f15a8455384c17783e5b8

                                              SHA1

                                              d7d286d91403e2a40b3a9f7c3efc223975246296

                                              SHA256

                                              8ed6765ab21fdf88bb02a56eec481819b70bfd630d20c3b77c308fc5104cd370

                                              SHA512

                                              d3c2dfee2c19d055a25c951020fe7418b02eeb13555304842fcc22371fbb8705f8b78523d06e4826638bfbaf42dc1d92fbf2e9ac1227fbe9f04acfd8406f2edc

                                            • C:\Windows\Temp\FTOHEKWV-20240802-1605.log

                                              Filesize

                                              109KB

                                              MD5

                                              776ac5cf01139338be3a17941c312b4f

                                              SHA1

                                              68d67c99394987d6c759e35a969349de0581516e

                                              SHA256

                                              90e6dd8e9c5a8642feadea6dc20807a84388c5295ae6daac075da0ed31480d90

                                              SHA512

                                              0e99eaf7a8db97fac3a132c0a0fb879388d05651c8dbb54d4e29ba83ff619494785425d5c45a7ef3ebba66fdb8c1ecfc13a56997dab5ffe37c05e2833546e0b5

                                            • memory/1164-53-0x00007FF9E8E00000-0x00007FF9E98C2000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/1164-337-0x000000001B690000-0x000000001B740000-memory.dmp

                                              Filesize

                                              704KB

                                            • memory/1164-813-0x00007FF9E8E00000-0x00007FF9E98C2000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/1164-0-0x00007FF9E8E03000-0x00007FF9E8E05000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/1164-1-0x0000000000150000-0x000000000016A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/1164-2-0x00007FF9E8E00000-0x00007FF9E98C2000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/1164-334-0x000000001B230000-0x000000001B23E000-memory.dmp

                                              Filesize

                                              56KB

                                            • memory/1164-506-0x000000001BA60000-0x000000001BA6C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/1164-507-0x000000001D3C0000-0x000000001D4DE000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/1164-52-0x00007FF9E8E03000-0x00007FF9E8E05000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/1164-176-0x0000000002530000-0x000000000253C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/1164-338-0x000000001DC10000-0x000000001E138000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/4256-13-0x00007FF9E8E00000-0x00007FF9E98C2000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4256-10-0x00000228FF730000-0x00000228FF752000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/4256-12-0x00007FF9E8E00000-0x00007FF9E98C2000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4256-19-0x00007FF9E8E00000-0x00007FF9E98C2000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4256-14-0x00007FF9E8E00000-0x00007FF9E98C2000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4256-15-0x00007FF9E8E00000-0x00007FF9E98C2000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4256-18-0x00007FF9E8E00000-0x00007FF9E98C2000-memory.dmp

                                              Filesize

                                              10.8MB