Analysis

  • max time kernel
    68s
  • max time network
    84s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11-11-2024 09:20

General

  • Target

    ep_setup.exe

  • Size

    10.6MB

  • MD5

    f164888a6fbc646b093f6af6663f4e63

  • SHA1

    3c0bb9f9a4ad9b1c521ad9fc30ec03668577c97c

  • SHA256

    8c5a3597666f418b5c857e68c9a13b7b6d037ea08a988204b572f053450add67

  • SHA512

    f1b2173962561d3051ec6b5aa2fc0260809e37e829255d95c8a085f990c18b724daff4372f646d505dabe3cc3013364d4316c2340527c75d140dbc6b5ebdeee1

  • SSDEEP

    196608:Yobw/inDWIRviYy06kRUEsyiFo2ItCC2bO+WxNtTYnepC5YbM/rN2kGBlSrnU:dw/2Bvc06kiEviXTCIKNtUnqYYA/A

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Stops running service(s) 4 TTPs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Loads dropped DLL 18 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ep_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\ep_setup.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Windows\system32\taskkill.exe
      "C:\Windows\system32\taskkill.exe" /f /im explorer.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3356
    • C:\Windows\system32\sc.exe
      "C:\Windows\system32\sc.exe" stop ep_dwm_D17F1E1A-5919-4427-8F89-A1A8503CA3EB
      2⤵
      • Launches sc.exe
      PID:4832
    • C:\Windows\system32\sc.exe
      "C:\Windows\system32\sc.exe" start ep_dwm_D17F1E1A-5919-4427-8F89-A1A8503CA3EB
      2⤵
      • Launches sc.exe
      PID:2376
    • C:\Windows\system32\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\ExplorerPatcher\ep_weather_host.dll"
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:4704
    • C:\Windows\system32\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\ExplorerPatcher\ep_weather_host_stub.dll"
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:5092
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Loads dropped DLL
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4148
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Program Files\ExplorerPatcher\ep_gui.dll",ZZGUI
        3⤵
        • Loads dropped DLL
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4288
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" "C:\Program Files\ExplorerPatcher\ExplorerPatcher.amd64.dll"
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:4928
        • C:\Windows\system32\taskkill.exe
          "C:\Windows\system32\taskkill.exe" /f /im explorer.exe
          4⤵
          • Kills process with taskkill
          PID:4884
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Loads dropped DLL
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:2956
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /u "C:\Program Files\ExplorerPatcher\ExplorerPatcher.amd64.dll"
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:2860
  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1916
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:3180
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:4708
  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4492
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Loads dropped DLL
    PID:1568
  • C:\Windows\system32\BackgroundTransferHost.exe
    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
    1⤵
      PID:2508

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\ExplorerPatcher\WebView2Loader.dll

      Filesize

      161KB

      MD5

      c5f0c46e91f354c58ecec864614157d7

      SHA1

      cb6f85c0b716b4fc3810deb3eb9053beb07e803c

      SHA256

      465a7ddfb3a0da4c3965daf2ad6ac7548513f42329b58aebc337311c10ea0a6f

      SHA512

      287756078aa08130907bd8601b957e9e006cef9f5c6765df25cfaa64ddd0fff7d92ffa11f10a00a4028687f3220efda8c64008dbcf205bedae5da296e3896e91

    • C:\Program Files\ExplorerPatcher\ep_gui.dll

      Filesize

      734KB

      MD5

      81cd6d96f81b1e54aa327a4af6bcbe85

      SHA1

      b786c4bde03d1566b1b040eb8970b82f7b80a007

      SHA256

      b23bab1f5dc85c9e10145eeb32214d6cfe02fb5abcf956a37a3c9dd7e09fee67

      SHA512

      a1360b71ba11b529bd21f8c93c6ceec01c4faa9d33ca5e5fa62acb118cebf1e9e1d38ea17d236d1f8bd0d790f6b743329d41598d5a62c794b4786c14975782be

    • C:\Program Files\ExplorerPatcher\ep_weather_host.dll

      Filesize

      238KB

      MD5

      aac2857727cff3cd7b291f9500196f73

      SHA1

      c86eedff45b672df58885f12e7a7aee3398c618b

      SHA256

      78ed3e3676d97c337fef071b522805f4cf742587a40f96af4aa4d74fee0af88a

      SHA512

      a4c54b4221b1745fe1de6d53fcd7a528b4bacda6b2c66e02d55bd5867d118e042a35490e45b64c2d24398a9ac06e356bf10a2822f83663d52c1a28e10f0a52e5

    • C:\Program Files\ExplorerPatcher\ep_weather_host_stub.dll

      Filesize

      109KB

      MD5

      e477912c435db101603781dcc44289e1

      SHA1

      7b2eda1b6055e8874f37fb9b48bcc933bf69c1c3

      SHA256

      0930d2e71353a411d96dc4dfdd473dace98d1b7b9546ac4c185f8984f8b9c18b

      SHA512

      9f8089742099a789387381980ec5b493deec46bd73f39cf8fa9919be4dd772b20c70246e5e90d625011f052d5c3b2000b42c50843956d74fb85ff1b1d18eace9

    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ExplorerPatcher\Properties (ExplorerPatcher).lnk

      Filesize

      1KB

      MD5

      ec05eaf6bc88ee594163912761cbd783

      SHA1

      0a772898eac955b177a57e39bb8a7f88315b34a6

      SHA256

      8e92b48998a08bb47b91fc1eb2b293b72b99bfad439cf3d2f39b3c7fe2e32537

      SHA512

      79a92b80ac9b25119c84a2527060cb2b70115c8b7d59d6d12c07a555c8e4247fee9a41c116dfaab7e779af1e34d3340b07c7ef8a7879f8c6b3aae7d1a9e2e35d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A66A8DB907BADC9D16AD67B2FBFFDD5C

      Filesize

      281B

      MD5

      58678424e65b3d7ec2483bc83780e32c

      SHA1

      9bf244034218333ee6e011c97d5617871a3b67fc

      SHA256

      9d18e97fcd9c6dd943f50f7d0c6f50be8e84dcb86849541a831a3c755284ad29

      SHA512

      5d2b2872632c31bb1c316eddd8662c9df0eb49ea78801e07cb41dc845ae24e50f27f62009958fdd7cd664be11f0407d94763fde5ff0b958f4367cb563be0d26a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25

      Filesize

      1KB

      MD5

      c6011face72ac20b67e89b6920075ca7

      SHA1

      d32dd534d4d3a3fc277a0e9f187ae9ea4fd226fe

      SHA256

      3e803340351a1b7fe52c8b66d9026a615ad9ae04ceeb00a77ab40bddd5ea2591

      SHA512

      be83bde09cdd64420e892b86a718627fd91a5ef95c10744ae4fa98e728416099b92a0397fa1420216982bb71c4dff8aa1c67375844be9ddb2e42ce19beafcc96

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90

      Filesize

      978B

      MD5

      48961960b14a9f07fb78bb78b6d93ccd

      SHA1

      ea608469c50194996e9dc1171b32daf221d56fb5

      SHA256

      2b99b64114bf14df945021dd309c7709ee923c766bbd0bb91149d8f1cdc667ac

      SHA512

      53c27344a4d6dbf3352f36683c08e0eb6d05cf5cc8408e50c416443a5874888247c1a979f59cef9ee6cc1574db5ce9b56c4c28d2d4358b708e65905083b24e57

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419

      Filesize

      471B

      MD5

      73317ac5da1bf9b0e690ed7b38ff19de

      SHA1

      9c37d6540ec7dab4a0000c54cc837d9f789ae8a4

      SHA256

      6751a6aa55273187cd71c33c6cc87e31d54ffa70dd7d81d9b4f81be610d7c370

      SHA512

      b600ebd3b725232134f3831cc4f412f3f9b5fc82b7d3161fa5add746760dbf20ad3924db1c114de42c22db3c4caadee3a7b2b6ecc5b05c105fd09300d1d40f90

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

      Filesize

      471B

      MD5

      1f2d7ef8cddbdc9993dc3cecd01e96bc

      SHA1

      effd0abf0646b67f5407fa732df673e739df49dc

      SHA256

      6cb9f916579a761bbbfb9c04b284221d0559730c32472e175199188ad6334096

      SHA512

      b485ba08413f718ec39ab45f92be1345d95cd29cf63637e2768d52bbe89c6967fdf02efb4da9a1381751f0ae5b272c21f547d982fc1a412edb4e7fda04bc04d0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A66A8DB907BADC9D16AD67B2FBFFDD5C

      Filesize

      480B

      MD5

      28327d809e804740011c66c7135280f8

      SHA1

      d688ce2558dba3e4b20042945b32aa3d29108500

      SHA256

      58f23be77420da7ad22509b9bdfdd6f577b5415097666dfc56b7e24e6ecafb2c

      SHA512

      b609a827e2ef1b2a1969983ad2241885756f5730d09859596c07960f7119d0f560821032af861ced1646958f54b24011c24d88887bcac4f60bcff48effe15e1a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25

      Filesize

      482B

      MD5

      f5cb0ed5717bbcb00a0705cf8dbfb678

      SHA1

      6ba7767e81dfe34dd4e99e939e0a4d0072eaa208

      SHA256

      50ef25b10f86a674790f44aa05c31132c4858142240f7ed1d0c53ddd9879ea7d

      SHA512

      9878afd6732be5416ae0168f3a371eaaeeb55be302657679b5315d00b2c0ce29f312c8ad341f7afd9ce3abac7859ebc892dc93329e21ffd225fb85eda9822389

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90

      Filesize

      480B

      MD5

      169a689267e288a84a5a79238dd95c61

      SHA1

      0e2932abd7b86293653f21a78f8b1ba1663591ba

      SHA256

      3f7d75243c83b6f6a4fe3b87c132a04c80c2113339a1b34efdeeb911957320a2

      SHA512

      16508c5159a34166532d998be2763f3c17c17289dc13d3540e5f89c97ce8b4a726b4694e823c6fa377593734e80eb7ea43aef52250b2031089e459d0077ef9d2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419

      Filesize

      412B

      MD5

      60f8521c82fba7df78461afbf710995c

      SHA1

      571eb12053875bed0c2d6ed85622db6f63485c92

      SHA256

      2cd434a97b48a93eb603dfd26df49268191ac6513db4af0f4f2e85cb6143ccfd

      SHA512

      db4260cc17a7bc0ec8bf60dc5b48737525464b17e3cc8a9551acafcb71590e6ae68a6a845ebdbbac1728e81e6414f37df129457dda3ca2c0876de16a560b27b6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

      Filesize

      412B

      MD5

      afca752900a54952101cbc1aa26eecf2

      SHA1

      fa9e378c38329b572d3544b62d8bf4167a43ac49

      SHA256

      88817c65fe2e08aafe947b50b86cc9223824d6ceacfb04d07e20ca723b30ac61

      SHA512

      e8f756365bbb562b71685f6d5f1f1c0bd1e16a9052a9670169d274eae6c8c651e44deb6288455c9a9bdb4d49cb7f3cc8b449c166e9853a47a2d18314b90b7faf

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\LocalState\start.bin

      Filesize

      3KB

      MD5

      b4fb01998cbd0f05ad640347483ded57

      SHA1

      19d1f7a2319a0a66af62d98ced7d8a012a1995b9

      SHA256

      440ff28e09da922c0d83d17bce5b9b50e8df0c18ac7e3f308b0b59e083eba018

      SHA512

      df05eef7b14d19a8a8c7b55c5af0af57bc6df9c35769bfe2c5cc61f1d9c2d8327b4dbd3291384666d5b4c81f54c30ac12c4a10d1a3719175fa0bf06a6222c98c

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\fda0418a-aea5-41c0-bdb0-2dfea36a2096.down_data

      Filesize

      555KB

      MD5

      5683c0028832cae4ef93ca39c8ac5029

      SHA1

      248755e4e1db552e0b6f8651b04ca6d1b31a86fb

      SHA256

      855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

      SHA512

      aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\6CGRGUCT\www.bing[1].xml

      Filesize

      327B

      MD5

      0869be545f846574e571fa3bfaa8164a

      SHA1

      c048960492a85eecfbd737f782b514da5471fc2a

      SHA256

      efa6db9b2fda3c2300e7214947882ea6299fcf5d743ddc550412f9241e7e5b1d

      SHA512

      f85e568608c5f8aea4d0228f9cdef702923c3a7dfb6932662190c31ce1a28bcbd7e08f3a89ea556bb4ac34a08921b65adf16542e2e1161d80726d14c77ad5a40

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\6CGRGUCT\www.bing[1].xml

      Filesize

      17KB

      MD5

      595374771a8c5e08301a2c34f88c5ff6

      SHA1

      0506c2c44c060655c9bd2ddadd534ff5fdf79e3f

      SHA256

      b82578ae08ef2a69304d472743972c8d86a1b75d8454439ce0bb5615fa67569b

      SHA512

      1e31ca02f0f4cc22e7224d137bcc126181dc8d5087011ae7672389497d6739fe79d2448ab4a8bf7005bb73b99c8341619d550c9b0089476d8a382947b88fe6be

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\6CGRGUCT\www.bing[1].xml

      Filesize

      15KB

      MD5

      5b11d221f600f72aa6e1c92872171131

      SHA1

      64213ec9df93d830be2b6ca692d048fae643eeff

      SHA256

      5ed7b711b84c5d6547e07864631aef54a33589fafcffa4c43504eed0cc1ae0d8

      SHA512

      881bc54cbdf84ab9ccd3fb33d270df2775a5c5786aff6085cdc4509d2c98175150d256479db5bf5308ef3cd3ba940e514895e03f4e7fa9e2f09563342e9cfbe0

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\6CGRGUCT\www.bing[1].xml

      Filesize

      6KB

      MD5

      7639e3dc7633e0836ef925ffbf1a32b0

      SHA1

      c78b050f63450b5697d81566830ae3f5827444d8

      SHA256

      979918df943e1e7fc89c2ebacab6edf749846fe1d8485fff1172f96b26f61335

      SHA512

      69ec774f90a6df6ab7f51f3cff699886323395733623f0325c5d9d160f523f606001bc598efb653f98c24bf0c015f0c29ba01b0fc8559fa3826427b6e5e19b77

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\ServiceWorkerFiles\F41496FF-8481-44C0-957F-7F6E035A47D1\Zrtu2hQ08VU_1.bytecode

      Filesize

      66KB

      MD5

      5d118058f89542040a8aa504a2351e8d

      SHA1

      58ae4c747498e655552ae1265ba99afc68e0c4c0

      SHA256

      db0d8fcfca50d501dc609850f3f541030535034e6421357d3b305598b268a9d7

      SHA512

      c4e7d75d8ebe627a7695cc54338c4c8f896fbe8100336852a3c1b6d64489627d0c0111fb60cd37c44425df2b51d15720a35759b56b721f57bd2c17e4c33df43c

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\ServiceWorkerFiles\F41496FF-8481-44C0-957F-7F6E035A47D1\Zrtu2hQ08VU_1.metadata

      Filesize

      192B

      MD5

      bb5e4049847ee17388c5ae8f426715fb

      SHA1

      df22a9213864c955c412a5d9979f93b62c2c5c05

      SHA256

      60f80b854e9c311122ed93ac7acb3b0e16add8ad99334b2853d94126b2b5af7f

      SHA512

      47275f9a8d89045de6c2168800d14c1a2764b99e2e560de4b1d614a42911d3f0e9fa485815fb36a394f2261ffb9de2db2bb154dabc5a29ef804e9607cf7e88ef

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{296894d5-b66f-4d83-bc5c-826939384e21}\Apps.ft

      Filesize

      26KB

      MD5

      a744eb8fe5de15349ceeecc64953b0c7

      SHA1

      f391e02f3b7d1e061c64eb0f5d66cb905b9c35a3

      SHA256

      3b9e41bd8f0905645d465a462ba0473e201b907171c43df649f218a6abe4ac72

      SHA512

      9cbdf64af459ec7c4b7ad5300aa20a81f59bfc3cf292698f1a9e9b48b3b7482939c264b4cb1b0b5421617d178c3818baabab6c46acf51c18304539df7eb9cb32

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{296894d5-b66f-4d83-bc5c-826939384e21}\Apps.index

      Filesize

      996KB

      MD5

      1255e27352432b816bb0361283dd5d05

      SHA1

      d78e5cb736ea13bcf6aebbb3ff0428a1dc9e3baf

      SHA256

      830c6179791682df189b19774d33345d3ecdc26bd88fd3bee4a14c8c5cf9b026

      SHA512

      a1c605925f0414d21da70259135a2f78b908f823759c4bb7a9f5a26d0911d89f16a2f0333f7b685b70c6fdec19db27c0cfcae163d625d0c7afc542f272888d4f

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133757904973803795.txt

      Filesize

      68KB

      MD5

      c49501de1bbb5093472658120120f742

      SHA1

      253193982c9e3cbd30d9c231b84fae9e3aa7656b

      SHA256

      76e3307ba0fa4f4596e91263f76833acf7e4d84fbad76898cf549d41d831d7eb

      SHA512

      a3f1dd3e4772c69e8681988f21faf6c31a3b182a1fbf0c0b0cd2d5f16566f3b6f2d233cda59b8e5659ee2c8457b3b28c2b83b4ff906c48b7fcda75038b7ec9dd

    • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\BackgroundTransferApi\fda0418a-aea5-41c0-bdb0-2dfea36a2096.47276141-d293-456a-9302-b97e9ca37024.down_meta

      Filesize

      1KB

      MD5

      d3f69df7015c21ecc3cb5cdf5555c3af

      SHA1

      c003b88062b141b79af90440aff347c89952b2ea

      SHA256

      082d6e134cf0ff2f5ab8b88ea5c5e423d37ce8eab7b68d90e7106ba6d130f6f6

      SHA512

      eb11ea34fff7af3e07f15ed199b27dc5903d78b20c9ee789404e43e3bb99bdd594b6f1864e81a402ce406f681ea767280fc61596466a4b1b7ff735d70cc4ad9f

    • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\BackgroundTransferApi\fda0418a-aea5-41c0-bdb0-2dfea36a2096.up_meta_secure

      Filesize

      1KB

      MD5

      ff8141c13e767b981d0d02b4050decec

      SHA1

      657fff069e82ff585869590046ee165dba310224

      SHA256

      f02ecec38fc7b7ee2abd98425b8f2a5d99bececf1a25674fe2b84e0465071f88

      SHA512

      351936b86875b24aa00028cc143e051e3436525ccd75e7329db08cc84c7a2cfc4d281db8ce12f4d1dd69bc727f82ba177bb87cc0541e1edda1f55f9f10554d9f

    • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\INetCache\3SUHTPKQ\Cj4mQnDN_eMyYEqsEbjRrJ2Ttec.br[1].js

      Filesize

      1B

      MD5

      c4ca4238a0b923820dcc509a6f75849b

      SHA1

      356a192b7913b04c54574d18c28d46e6395428ab

      SHA256

      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

      SHA512

      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

    • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\INetCache\3SUHTPKQ\JbElZtKU_zC_oK6Z6KX4QFPKvxQ[1].css

      Filesize

      951KB

      MD5

      e3d496a80059433097808940dadf38eb

      SHA1

      4fb36aa0be3ec193314b729987f8a416bce67ed0

      SHA256

      c878cc6455f03378e113bca620579b7a5000e8018f7e11f05ea840350f1a201a

      SHA512

      38dd999d253dc4591cca4621f0c82dfdb7682c89989e86fa1ee073aa75717fa540bf96876a251c63fcab5523d9034d58fb511f46f26c59b9de8442fb860ceab6

    • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\INetCache\PBI5A6N2\6aa-EF2IAVwnTTOiwAbhwI_VmCw[1].js

      Filesize

      21KB

      MD5

      b2c3cbf8a1d940d6c83d59a67486675c

      SHA1

      efec7fc9f309eea128df3cf7d2d12c3ff157ca74

      SHA256

      08ea9109346e9018ed50567503d2c141f7a84cfde80eb25e97fddcfe270baa67

      SHA512

      0e4802b050dd78ffb7883a40ff2e2e2394b928480da121fd8d25efede5010404137478ab20682c206bc4291a3d6f3906402aa99ebe3d57f80d4333ddda6f2896

    • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\INetCache\PBI5A6N2\RMR1gT-owPhjdj5T7QIDjVzDF_U.br[1].js

      Filesize

      370B

      MD5

      19f2b1664a29442c13006921aa877a9b

      SHA1

      44fe06105eb8b39593421ddde9ce239cf3494d6d

      SHA256

      d71ac9ccdf9cad482742a4c58d3cdececa63ab196dba9bd3656da24db533c1ac

      SHA512

      af7a58e85917817b0963e3652b1671d386b3c844a7b5473efd058688aa4b0e38e11def72741695f9bcaf4beda83ac823052f8729f1c78870cee57daf6857fa47

    • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\INetCache\SC3NQU43\0JAyi_EranBDK8eN2mQk1X4guLs[2].css

      Filesize

      64KB

      MD5

      9c39b3ceebe82a0531b03055d7331336

      SHA1

      b5558d73d99222976d1031396cbb0ef56092b1d8

      SHA256

      43028921e23efc9d9031986df77ad99d6a0f4d7cb3235535c9b1b8d27438c8ef

      SHA512

      69d1c00c82b149e7f677ba29866fdfb7d45bda4cce24a002b3327b33708feffde27e16706fee9199c58f5d7140fcc1c0c3b39a751b68761c91e91ffb95e4a2bf

    • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\INetCache\SC3NQU43\QNBBNqWD9F_Blep-UqQSqnMp-FI[2].css

      Filesize

      6B

      MD5

      77373397a17bd1987dfca2e68d022ecf

      SHA1

      1294758879506eff3a54aac8d2b59df17b831978

      SHA256

      a319af2e953e7afda681b85a62f629a5c37344af47d2fcd23ab45e1d99497f13

      SHA512

      a177f5c25182c62211891786a8f78b2a1caec078c512fc39600809c22b41477c1e8b7a3cf90c88bbbe6869ea5411dd1343cad9a23c6ce1502c439a6d1779ea1b

    • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\INetCache\SC3NQU43\f4st08wpuYBQ5KWRJ3MqAsJB8zg[1].css

      Filesize

      19KB

      MD5

      3d24779c6014bcfefb3d9a80b8f3567b

      SHA1

      acd840a50f88729478e6e708bb0fa461984c916b

      SHA256

      a7ef8faa37710d7e90c9c8950c203c8da82410780f872e4f217ee636250d831f

      SHA512

      60c054e98cb6365a45469dd342f2f86aa7b2e6b83fb52cf1cbbc05317cb97aec56b3747868798cca74e3997219b1db3979ddf16d62d538a664fb66a5e3fb9ed4

    • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\INetCache\SC3NQU43\onra7PQl9o5bYT2lASI1BE4DDEs[1].css

      Filesize

      65KB

      MD5

      d167f317b3da20c8cb7f24e078e0358a

      SHA1

      d44ed3ec2cde263c53a1ba3c94b402410a636c5f

      SHA256

      be2e9b42fc02b16643c01833de7d1c14d8790ecc4355c76529a41fa2f7d3efad

      SHA512

      afc65b0fa648d49a5eb896be60331aa222301894e228fe5684399e9276342f6510773dffa3e7e75b8d6197bc51c732bc7fd7518e593ecd20c4884c47058d46d8

    • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\INetCache\SC3NQU43\yy4SnZtT2-rfsZpLbcm-u8xyafQ[1].css

      Filesize

      5KB

      MD5

      f17df11a7c86f77e92950d111abaf4e1

      SHA1

      f58c685feb5638a974d0f51a09fb7c7ac0978f6e

      SHA256

      72504249abb304d8b5f75a5e9182b478112e02773b8a9a276cd4982d8cf842fe

      SHA512

      d9a3989ca94d609b09ba804ec031c373ab4e67d61c2c6f66dd64bf327ceac07cd06bc35d0a51bcb75ef661c6b9e0bb40ab034e32eb659582004b23ea43bbfec5

    • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\Content\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10D

      Filesize

      312B

      MD5

      7a068a1055f421c7e524369b50ed9395

      SHA1

      2448a4642fa9d1c3d893875a03843b2708ae7158

      SHA256

      ed6d1166fe0f9388c0961159095d24315162bbe8a96d1486203ed79f794aec43

      SHA512

      d05cc8125f239feaec34e644f60bdf35f0f6f4eebfd22237ef8bef44574f77129ac57a65da128b88626869aa5c7cdbbe2f9c901a88dd7b33afbed08da848fade

    • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10D

      Filesize

      400B

      MD5

      a505e29d04f3f05f78fe94fb115e24c0

      SHA1

      13341f2b2f907cfadc439b7b6fdc78e823dd3b53

      SHA256

      1413c4d25201672d71262cc0541cb6658932d4b96cee509e6c70b95ecd7174e0

      SHA512

      d4cfe316eb08044ba3902c6b50e8555abf88374aef5f37ced1ff83945758dfa7dcf2768b1f013fd3808c8d76054a3c38b7487f8d51f83964621dbdf4655264c7

    • C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\6CGRGUCT\www.bing[1].xml

      Filesize

      15KB

      MD5

      db7e26006015dfb909db89fdd670a3fe

      SHA1

      7230d8a1d64090275d258d576562fc0b91efd48b

      SHA256

      edd82e024b669aa5bb74bc982137d2462a5c4c79645c2f4ea5a553e0cdec50e7

      SHA512

      4617530c6cd0882812e2df5defa8a612aa1118ab0198d8e0ad4e285a67fd12c16f3e5927fc800fa49e71f2cff9eaa38dfd8b2377e75f8814498c4ae50c3fe7c8

    • C:\Users\Admin\AppData\Local\Temp\eptB1C0.tmp

      Filesize

      19KB

      MD5

      cd9dbd3f5ec5814a4f1fa6542be9352e

      SHA1

      04e8e94d40cd784a7e75bc52305c879b0f6e367b

      SHA256

      7ecd4088669a573db2c9f5d6d3d0a75f65d6271481cbdc195f12c4a88e01c733

      SHA512

      920b31ac1f11f59bc3191a64734a02801a1e5a0311663037e2f0c0e7918e9fd9e1e79d6fb8affee21b50b400f0f137e183f8e010782dec351d4b437a7103451e

    • C:\Users\Admin\AppData\Roaming\ExplorerPatcher\StartDocked.pdb

      Filesize

      16.4MB

      MD5

      2e3682c2244b6604851b0d6b3eb7b248

      SHA1

      047c762af86b37f582573d3a88b68ab1ab8dbab3

      SHA256

      9ac8bf7c0a79fe47bea4ca8d364aa3e7b3f92b02a27507d704528b89e7e0e776

      SHA512

      834bec41cfb5cac51e3cad91d21327581a1180df98ce5cbe1a04ae8c5a5c793a0ac49b95dfa309162d653fc8d174b4c7f38c7f1f02d3e0907582b8f5d2ec6c87

    • C:\Users\Admin\AppData\Roaming\ExplorerPatcher\twinui.pcshell.pdb

      Filesize

      24.0MB

      MD5

      def29fd81caf648be9b71298bb7513d0

      SHA1

      cd3ac3f22d51dc9d949409fd84848c4b1d8f6bab

      SHA256

      745f3e5f484b42c4650847b82ea36ff132b228d4096f49c493a2a7b1e32d5dce

      SHA512

      937ce45ba86505225e272b9ab8f1628722a8d70e523253758d6bdf8d531e279a256da3c9682aa63826c7ff0d41340bd936e88f066ba6b6c87d73370eda6ab889

    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\dxgi.dll

      Filesize

      699KB

      MD5

      8bfca71add96d3de75173d464792e2b9

      SHA1

      fe6bc3c30c26d6ce1c149b173b5d79c80102d5b9

      SHA256

      5aaa6bab20b7116b32bddba1df216f7476557bb48397e1968a49ede14e6c377d

      SHA512

      b560415727d15ceeb09e5d9e39ea2b4043848bf4239fbf5068aaac86f64b3d05d4e21eb197416db0fb4172c68f782c05aeae18ac70c27f80566040b6ba79159a

    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\wincorlib.dll

      Filesize

      164KB

      MD5

      b80816ee9fcdb1d9076b73fd929fc96b

      SHA1

      ff9a5a12dca164652419f5dee082af4a49b8a03b

      SHA256

      d63b9fc13c99000cf77d02ee6e5e84c825d02a92d87b728cb601681b5eb21671

      SHA512

      21cebca787a0fa0976b44315bf05b6eb4719306653ddbbfce41231244219bcd288cd8045980bacf21481ddabcf464c82795147db755148cc0e23167bbb874fd7

    • C:\Windows\dxgi.dll

      Filesize

      699KB

      MD5

      047b192a9c703fc5a2c2764db869ff5c

      SHA1

      8c1494acc3119fbf8332ae3b6a4f854e5b4d37cb

      SHA256

      1971c57f88849b4069be06d3784e0968755c916fa1564a3f8f05610d3b02cdcc

      SHA512

      c7f80703db23611d56618a8b1b4ffff814a9264135e3846df99120c0ffc16da9d5b37c6465ac25d61d4f6e386d36b3de640c57c460098f06778c658cc19454cc

    • memory/1916-314-0x000001C24A200000-0x000001C24A300000-memory.dmp

      Filesize

      1024KB

    • memory/1916-225-0x000001C246240000-0x000001C246260000-memory.dmp

      Filesize

      128KB

    • memory/1916-224-0x000001C246450000-0x000001C246550000-memory.dmp

      Filesize

      1024KB

    • memory/1916-223-0x000001C2462E0000-0x000001C246300000-memory.dmp

      Filesize

      128KB

    • memory/2956-511-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/2956-510-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/2956-507-0x00007FFFEADC0000-0x00007FFFEB56E000-memory.dmp

      Filesize

      7.7MB

    • memory/2956-509-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/2956-508-0x00007FFFEADC0000-0x00007FFFEB56E000-memory.dmp

      Filesize

      7.7MB

    • memory/2956-512-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/4148-49-0x00007FFFD4B40000-0x00007FFFD510B000-memory.dmp

      Filesize

      5.8MB

    • memory/4148-46-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-394-0x0000000003E80000-0x0000000003F9E000-memory.dmp

      Filesize

      1.1MB

    • memory/4148-24-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/4148-28-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/4148-27-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/4148-26-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/4148-29-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/4148-25-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/4148-23-0x00007FFFEADC0000-0x00007FFFEB56E000-memory.dmp

      Filesize

      7.7MB

    • memory/4148-22-0x00007FFFEADC0000-0x00007FFFEB56E000-memory.dmp

      Filesize

      7.7MB

    • memory/4148-30-0x00007FFFEA930000-0x00007FFFEAADC000-memory.dmp

      Filesize

      1.7MB

    • memory/4148-31-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-487-0x0000000003E80000-0x0000000003F9E000-memory.dmp

      Filesize

      1.1MB

    • memory/4148-33-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-480-0x0000000003E80000-0x0000000003F9E000-memory.dmp

      Filesize

      1.1MB

    • memory/4148-32-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-38-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-36-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-34-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-35-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-37-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-42-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-44-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-45-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-39-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-47-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-50-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-51-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-59-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-54-0x00007FFFD6240000-0x00007FFFD6A73000-memory.dmp

      Filesize

      8.2MB

    • memory/4148-60-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-56-0x00007FFFEADC0000-0x00007FFFEB56E000-memory.dmp

      Filesize

      7.7MB

    • memory/4148-52-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-53-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-74-0x0000000005D50000-0x0000000005D51000-memory.dmp

      Filesize

      4KB

    • memory/4148-48-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-41-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-43-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4148-40-0x00007FF7EADF0000-0x00007FF7EB2B4000-memory.dmp

      Filesize

      4.8MB

    • memory/4288-491-0x00007FFFEADC0000-0x00007FFFEB56E000-memory.dmp

      Filesize

      7.7MB

    • memory/4288-496-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/4288-498-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/4288-493-0x00007FFFEADC0000-0x00007FFFEB56E000-memory.dmp

      Filesize

      7.7MB

    • memory/4288-495-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/4288-494-0x00007FFFEADC0000-0x00007FFFEB56E000-memory.dmp

      Filesize

      7.7MB

    • memory/4288-497-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/4288-499-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/4288-500-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/4288-501-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/4288-502-0x00007FFFD4240000-0x00007FFFD44B1000-memory.dmp

      Filesize

      2.4MB

    • memory/4288-492-0x00007FFFEADC0000-0x00007FFFEB56E000-memory.dmp

      Filesize

      7.7MB