Analysis

  • max time kernel
    201s
  • max time network
    202s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 16:47

General

  • Target

    https://cdn.discordapp.com/attachments/1295016370525831169/1315380566719467550/SPOILER_RippleSpoofer.exe?ex=6757dbdd&is=67568a5d&hm=c9ccddf74d12b69e491bbd7aa2b2797f43917c9226da694da73d78eabd05e3ad&

Malware Config

Signatures

  • Exela Stealer

    Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

  • Exelastealer family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 33 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Service Discovery 1 TTPs 2 IoCs

    Attempt to gather information on host's network.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • UPX packed file 58 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 43 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • System Network Connections Discovery 1 TTPs 1 IoCs

    Attempt to get a listing of network connections.

  • Collects information from the system 1 TTPs 1 IoCs

    Uses WMIC.exe to find detailed system information.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Interacts with shadow copies 3 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 38 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://cdn.discordapp.com/attachments/1295016370525831169/1315380566719467550/SPOILER_RippleSpoofer.exe?ex=6757dbdd&is=67568a5d&hm=c9ccddf74d12b69e491bbd7aa2b2797f43917c9226da694da73d78eabd05e3ad&
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed61946f8,0x7ffed6194708,0x7ffed6194718
      2⤵
        PID:5012
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:2
        2⤵
          PID:3028
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3472
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:8
          2⤵
            PID:3948
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
            2⤵
              PID:872
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
              2⤵
                PID:1556
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:8
                2⤵
                  PID:1992
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3508
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:1
                  2⤵
                    PID:3264
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:1
                    2⤵
                      PID:4568
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:1
                      2⤵
                        PID:3324
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:1
                        2⤵
                          PID:4580
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3404 /prefetch:8
                          2⤵
                            PID:4784
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:1
                            2⤵
                              PID:2876
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5068 /prefetch:8
                              2⤵
                                PID:4932
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1320
                              • C:\Users\Admin\Downloads\SPOILER_RippleSpoofer.exe
                                "C:\Users\Admin\Downloads\SPOILER_RippleSpoofer.exe"
                                2⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Checks whether UAC is enabled
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Enumerates system info in registry
                                • Modifies registry class
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1976
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TempAppFiles\cleaner.bat" "
                                  3⤵
                                    PID:5548
                                    • C:\Windows\system32\chcp.com
                                      chcp 65001
                                      4⤵
                                        PID:5604
                                      • C:\Windows\system32\mode.com
                                        mode con: cols=70 lines=18
                                        4⤵
                                          PID:5620
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im epicgameslauncher.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5656
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im EpicWebHelper.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5696
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im FortniteClient-Win64-Shipping_EAC.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5724
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im FortniteClient-Win64-Shipping_BE.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5752
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im FortniteLauncher.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5780
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im FortniteClient-Win64-Shipping.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5808
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im EpicGamesLauncher.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5844
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im EasyAntiCheat.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5880
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im BEService.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5912
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im BEServices.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5948
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im BattleEye.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5992
                                        • C:\Windows\system32\vssadmin.exe
                                          vssadmin delete shadows /all /Quiet
                                          4⤵
                                          • Interacts with shadow copies
                                          PID:6020
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im RiotClientServices.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5136
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im RiotClient.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5188
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im Riot.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3496
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im vgc.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3224
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im vgk.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4288
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im vgtray.exe
                                          4⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5296
                                        • C:\Windows\system32\sc.exe
                                          sc stop cpuz150
                                          4⤵
                                          • Launches sc.exe
                                          PID:2112
                                        • C:\Windows\system32\sc.exe
                                          sc stop vgt
                                          4⤵
                                          • Launches sc.exe
                                          PID:212
                                        • C:\Windows\system32\sc.exe
                                          sc stop vgrl
                                          4⤵
                                          • Launches sc.exe
                                          PID:3896
                                        • C:\Windows\system32\sc.exe
                                          sc stop vgk
                                          4⤵
                                          • Launches sc.exe
                                          PID:1364
                                        • C:\Windows\system32\sc.exe
                                          sc stop vgc
                                          4⤵
                                          • Launches sc.exe
                                          PID:4484
                                        • C:\Windows\system32\sc.exe
                                          sc stop cpuz150
                                          4⤵
                                          • Launches sc.exe
                                          PID:5348
                                        • C:\Windows\system32\sc.exe
                                          sc stop vgt
                                          4⤵
                                          • Launches sc.exe
                                          PID:5340
                                        • C:\Windows\system32\sc.exe
                                          sc stop vgrl
                                          4⤵
                                          • Launches sc.exe
                                          PID:5364
                                        • C:\Windows\system32\sc.exe
                                          sc stop vgk
                                          4⤵
                                          • Launches sc.exe
                                          PID:1752
                                        • C:\Windows\system32\sc.exe
                                          sc stop vgc
                                          4⤵
                                          • Launches sc.exe
                                          PID:1508
                                        • C:\Windows\system32\sc.exe
                                          sc delete vgrl
                                          4⤵
                                          • Launches sc.exe
                                          PID:1056
                                        • C:\Windows\system32\sc.exe
                                          sc delete vgk
                                          4⤵
                                          • Launches sc.exe
                                          PID:4100
                                        • C:\Windows\system32\sc.exe
                                          sc delete vgc
                                          4⤵
                                          • Launches sc.exe
                                          PID:744
                                        • C:\Windows\system32\sc.exe
                                          sc delete vg
                                          4⤵
                                          • Launches sc.exe
                                          PID:3676
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TempAppFiles\cleaner.bat" "
                                        3⤵
                                          PID:3052
                                          • C:\Windows\system32\chcp.com
                                            chcp 65001
                                            4⤵
                                              PID:5496
                                            • C:\Windows\system32\mode.com
                                              mode con: cols=70 lines=18
                                              4⤵
                                                PID:1952
                                              • C:\Windows\system32\vssadmin.exe
                                                vssadmin delete shadows /all /Quiet
                                                4⤵
                                                • Interacts with shadow copies
                                                PID:4632
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /f /im RiotClientServices.exe
                                                4⤵
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5544
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /f /im RiotClient.exe
                                                4⤵
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5628
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /f /im Riot.exe
                                                4⤵
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1228
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /f /im vgc.exe
                                                4⤵
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5680
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /f /im vgk.exe
                                                4⤵
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5720
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /f /im vgtray.exe
                                                4⤵
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5748
                                              • C:\Windows\system32\sc.exe
                                                sc stop cpuz150
                                                4⤵
                                                • Launches sc.exe
                                                PID:5776
                                              • C:\Windows\system32\sc.exe
                                                sc stop vgt
                                                4⤵
                                                • Launches sc.exe
                                                PID:5792
                                              • C:\Windows\system32\sc.exe
                                                sc stop vgrl
                                                4⤵
                                                • Launches sc.exe
                                                PID:5804
                                              • C:\Windows\system32\sc.exe
                                                sc stop vgk
                                                4⤵
                                                • Launches sc.exe
                                                PID:2072
                                              • C:\Windows\system32\sc.exe
                                                sc stop vgc
                                                4⤵
                                                • Launches sc.exe
                                                PID:5828
                                              • C:\Windows\system32\sc.exe
                                                sc stop cpuz150
                                                4⤵
                                                • Launches sc.exe
                                                PID:5832
                                              • C:\Windows\system32\sc.exe
                                                sc stop vgt
                                                4⤵
                                                • Launches sc.exe
                                                PID:5808
                                              • C:\Windows\system32\sc.exe
                                                sc stop vgrl
                                                4⤵
                                                • Launches sc.exe
                                                PID:5860
                                              • C:\Windows\system32\sc.exe
                                                sc stop vgk
                                                4⤵
                                                • Launches sc.exe
                                                PID:5864
                                              • C:\Windows\system32\sc.exe
                                                sc stop vgc
                                                4⤵
                                                • Launches sc.exe
                                                PID:5844
                                              • C:\Windows\system32\sc.exe
                                                sc delete vgrl
                                                4⤵
                                                • Launches sc.exe
                                                PID:5884
                                              • C:\Windows\system32\sc.exe
                                                sc delete vgk
                                                4⤵
                                                • Launches sc.exe
                                                PID:5888
                                              • C:\Windows\system32\sc.exe
                                                sc delete vgc
                                                4⤵
                                                • Launches sc.exe
                                                PID:5936
                                              • C:\Windows\system32\sc.exe
                                                sc delete vg
                                                4⤵
                                                • Launches sc.exe
                                                PID:5920
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TempAppFiles\cleaner.bat" "
                                              3⤵
                                                PID:5964
                                                • C:\Windows\system32\chcp.com
                                                  chcp 65001
                                                  4⤵
                                                    PID:6116
                                                  • C:\Windows\system32\mode.com
                                                    mode con: cols=70 lines=18
                                                    4⤵
                                                      PID:288
                                                    • C:\Windows\system32\vssadmin.exe
                                                      vssadmin delete shadows /all /Quiet
                                                      4⤵
                                                      • Interacts with shadow copies
                                                      PID:6036
                                                    • C:\Windows\system32\taskkill.exe
                                                      taskkill /f /im RiotClientServices.exe
                                                      4⤵
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5176
                                                    • C:\Windows\system32\taskkill.exe
                                                      taskkill /f /im RiotClient.exe
                                                      4⤵
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5224
                                                    • C:\Windows\system32\taskkill.exe
                                                      taskkill /f /im Riot.exe
                                                      4⤵
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5052
                                                    • C:\Windows\system32\taskkill.exe
                                                      taskkill /f /im vgc.exe
                                                      4⤵
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4788
                                                    • C:\Windows\system32\taskkill.exe
                                                      taskkill /f /im vgk.exe
                                                      4⤵
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3308
                                                    • C:\Windows\system32\taskkill.exe
                                                      taskkill /f /im vgtray.exe
                                                      4⤵
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3396
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop cpuz150
                                                      4⤵
                                                      • Launches sc.exe
                                                      PID:1864
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop vgt
                                                      4⤵
                                                      • Launches sc.exe
                                                      PID:212
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop vgrl
                                                      4⤵
                                                      • Launches sc.exe
                                                      PID:1068
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop vgk
                                                      4⤵
                                                      • Launches sc.exe
                                                      PID:3328
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop vgc
                                                      4⤵
                                                      • Launches sc.exe
                                                      PID:5384
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop cpuz150
                                                      4⤵
                                                      • Launches sc.exe
                                                      PID:5348
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop vgt
                                                      4⤵
                                                      • Launches sc.exe
                                                      PID:5372
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop vgrl
                                                      4⤵
                                                      • Launches sc.exe
                                                      PID:5332
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop vgk
                                                      4⤵
                                                      • Launches sc.exe
                                                      PID:5364
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop vgc
                                                      4⤵
                                                      • Launches sc.exe
                                                      PID:3464
                                                    • C:\Windows\system32\sc.exe
                                                      sc delete vgrl
                                                      4⤵
                                                      • Launches sc.exe
                                                      PID:2008
                                                    • C:\Windows\system32\sc.exe
                                                      sc delete vgk
                                                      4⤵
                                                      • Launches sc.exe
                                                      PID:4904
                                                    • C:\Windows\system32\sc.exe
                                                      sc delete vgc
                                                      4⤵
                                                      • Launches sc.exe
                                                      PID:1756
                                                    • C:\Windows\system32\sc.exe
                                                      sc delete vg
                                                      4⤵
                                                      • Launches sc.exe
                                                      PID:4448
                                                  • C:\Users\Admin\AppData\Local\Temp\TempAppFiles\fv.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\TempAppFiles\fv.exe"
                                                    3⤵
                                                    • Executes dropped EXE
                                                    PID:2180
                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                    "taskkill" /F /IM explorer.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5248
                                                  • C:\Users\Admin\AppData\Local\Temp\TempAppFiles\mac.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\TempAppFiles\mac.exe"
                                                    3⤵
                                                    • Executes dropped EXE
                                                    PID:872
                                                    • C:\Users\Admin\AppData\Local\Temp\TempAppFiles\mac.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\TempAppFiles\mac.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      PID:5736
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c "ver"
                                                        5⤵
                                                          PID:2632
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                          5⤵
                                                            PID:6036
                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                              wmic csproduct get uuid
                                                              6⤵
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:5052
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c "tasklist"
                                                            5⤵
                                                              PID:5160
                                                              • C:\Windows\system32\tasklist.exe
                                                                tasklist
                                                                6⤵
                                                                • Enumerates processes with tasklist
                                                                PID:4656
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe""
                                                              5⤵
                                                              • Hide Artifacts: Hidden Files and Directories
                                                              PID:3032
                                                              • C:\Windows\system32\attrib.exe
                                                                attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe"
                                                                6⤵
                                                                • Views/modifies file attributes
                                                                PID:3328
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "tasklist"
                                                              5⤵
                                                                PID:5356
                                                                • C:\Windows\system32\tasklist.exe
                                                                  tasklist
                                                                  6⤵
                                                                  • Enumerates processes with tasklist
                                                                  PID:5332
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4000"
                                                                5⤵
                                                                  PID:1112
                                                                  • C:\Windows\system32\taskkill.exe
                                                                    taskkill /F /PID 4000
                                                                    6⤵
                                                                    • Kills process with taskkill
                                                                    PID:2676
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5012"
                                                                  5⤵
                                                                    PID:5996
                                                                    • C:\Windows\system32\taskkill.exe
                                                                      taskkill /F /PID 5012
                                                                      6⤵
                                                                      • Kills process with taskkill
                                                                      PID:5092
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c "taskkill /F /PID 3028"
                                                                    5⤵
                                                                      PID:4804
                                                                      • C:\Windows\system32\taskkill.exe
                                                                        taskkill /F /PID 3028
                                                                        6⤵
                                                                        • Kills process with taskkill
                                                                        PID:6060
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "taskkill /F /PID 3472"
                                                                      5⤵
                                                                        PID:5196
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          taskkill /F /PID 3472
                                                                          6⤵
                                                                          • Kills process with taskkill
                                                                          PID:3528
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c "taskkill /F /PID 3948"
                                                                        5⤵
                                                                          PID:5964
                                                                          • C:\Windows\system32\taskkill.exe
                                                                            taskkill /F /PID 3948
                                                                            6⤵
                                                                            • Kills process with taskkill
                                                                            PID:3292
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1556"
                                                                          5⤵
                                                                            PID:4572
                                                                            • C:\Windows\system32\taskkill.exe
                                                                              taskkill /F /PID 1556
                                                                              6⤵
                                                                              • Kills process with taskkill
                                                                              PID:3476
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4580"
                                                                            5⤵
                                                                              PID:1260
                                                                              • C:\Windows\system32\taskkill.exe
                                                                                taskkill /F /PID 4580
                                                                                6⤵
                                                                                • Kills process with taskkill
                                                                                PID:5032
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c "taskkill /F /PID 2876"
                                                                              5⤵
                                                                                PID:4544
                                                                                • C:\Windows\system32\taskkill.exe
                                                                                  taskkill /F /PID 2876
                                                                                  6⤵
                                                                                  • Kills process with taskkill
                                                                                  PID:5156
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
                                                                                5⤵
                                                                                  PID:4292
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    cmd.exe /c chcp
                                                                                    6⤵
                                                                                      PID:4216
                                                                                      • C:\Windows\system32\chcp.com
                                                                                        chcp
                                                                                        7⤵
                                                                                          PID:4864
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
                                                                                      5⤵
                                                                                        PID:3820
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          cmd.exe /c chcp
                                                                                          6⤵
                                                                                            PID:2236
                                                                                            • C:\Windows\system32\chcp.com
                                                                                              chcp
                                                                                              7⤵
                                                                                                PID:5124
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                            5⤵
                                                                                              PID:4204
                                                                                              • C:\Windows\system32\tasklist.exe
                                                                                                tasklist /FO LIST
                                                                                                6⤵
                                                                                                • Enumerates processes with tasklist
                                                                                                PID:4008
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"
                                                                                              5⤵
                                                                                              • Clipboard Data
                                                                                              PID:1916
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell.exe Get-Clipboard
                                                                                                6⤵
                                                                                                • Clipboard Data
                                                                                                PID:3604
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"
                                                                                              5⤵
                                                                                              • Network Service Discovery
                                                                                              PID:5572
                                                                                              • C:\Windows\system32\systeminfo.exe
                                                                                                systeminfo
                                                                                                6⤵
                                                                                                • Gathers system information
                                                                                                PID:5528
                                                                                              • C:\Windows\system32\HOSTNAME.EXE
                                                                                                hostname
                                                                                                6⤵
                                                                                                  PID:5836
                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                  wmic logicaldisk get caption,description,providername
                                                                                                  6⤵
                                                                                                  • Collects information from the system
                                                                                                  PID:5808
                                                                                                • C:\Windows\system32\net.exe
                                                                                                  net user
                                                                                                  6⤵
                                                                                                    PID:5848
                                                                                                    • C:\Windows\system32\net1.exe
                                                                                                      C:\Windows\system32\net1 user
                                                                                                      7⤵
                                                                                                        PID:5884
                                                                                                    • C:\Windows\system32\query.exe
                                                                                                      query user
                                                                                                      6⤵
                                                                                                        PID:5752
                                                                                                        • C:\Windows\system32\quser.exe
                                                                                                          "C:\Windows\system32\quser.exe"
                                                                                                          7⤵
                                                                                                            PID:5936
                                                                                                        • C:\Windows\system32\net.exe
                                                                                                          net localgroup
                                                                                                          6⤵
                                                                                                            PID:5440
                                                                                                            • C:\Windows\system32\net1.exe
                                                                                                              C:\Windows\system32\net1 localgroup
                                                                                                              7⤵
                                                                                                                PID:2632
                                                                                                            • C:\Windows\system32\net.exe
                                                                                                              net localgroup administrators
                                                                                                              6⤵
                                                                                                                PID:272
                                                                                                                • C:\Windows\system32\net1.exe
                                                                                                                  C:\Windows\system32\net1 localgroup administrators
                                                                                                                  7⤵
                                                                                                                    PID:5984
                                                                                                                • C:\Windows\system32\net.exe
                                                                                                                  net user guest
                                                                                                                  6⤵
                                                                                                                    PID:5468
                                                                                                                    • C:\Windows\system32\net1.exe
                                                                                                                      C:\Windows\system32\net1 user guest
                                                                                                                      7⤵
                                                                                                                        PID:1616
                                                                                                                    • C:\Windows\system32\net.exe
                                                                                                                      net user administrator
                                                                                                                      6⤵
                                                                                                                        PID:1412
                                                                                                                        • C:\Windows\system32\net1.exe
                                                                                                                          C:\Windows\system32\net1 user administrator
                                                                                                                          7⤵
                                                                                                                            PID:4816
                                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                          wmic startup get caption,command
                                                                                                                          6⤵
                                                                                                                            PID:5732
                                                                                                                          • C:\Windows\system32\tasklist.exe
                                                                                                                            tasklist /svc
                                                                                                                            6⤵
                                                                                                                            • Enumerates processes with tasklist
                                                                                                                            PID:4640
                                                                                                                          • C:\Windows\system32\ipconfig.exe
                                                                                                                            ipconfig /all
                                                                                                                            6⤵
                                                                                                                            • Gathers network information
                                                                                                                            PID:4288
                                                                                                                          • C:\Windows\system32\ROUTE.EXE
                                                                                                                            route print
                                                                                                                            6⤵
                                                                                                                              PID:6036
                                                                                                                            • C:\Windows\system32\ARP.EXE
                                                                                                                              arp -a
                                                                                                                              6⤵
                                                                                                                              • Network Service Discovery
                                                                                                                              PID:5172
                                                                                                                            • C:\Windows\system32\NETSTAT.EXE
                                                                                                                              netstat -ano
                                                                                                                              6⤵
                                                                                                                              • System Network Connections Discovery
                                                                                                                              • Gathers network information
                                                                                                                              PID:880
                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                              sc query type= service state= all
                                                                                                                              6⤵
                                                                                                                              • Launches sc.exe
                                                                                                                              PID:3308
                                                                                                                            • C:\Windows\system32\netsh.exe
                                                                                                                              netsh firewall show state
                                                                                                                              6⤵
                                                                                                                              • Modifies Windows Firewall
                                                                                                                              • Event Triggered Execution: Netsh Helper DLL
                                                                                                                              PID:5204
                                                                                                                            • C:\Windows\system32\netsh.exe
                                                                                                                              netsh firewall show config
                                                                                                                              6⤵
                                                                                                                              • Modifies Windows Firewall
                                                                                                                              • Event Triggered Execution: Netsh Helper DLL
                                                                                                                              PID:3004
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
                                                                                                                            5⤵
                                                                                                                            • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                                            PID:5396
                                                                                                                            • C:\Windows\system32\netsh.exe
                                                                                                                              netsh wlan show profiles
                                                                                                                              6⤵
                                                                                                                              • Event Triggered Execution: Netsh Helper DLL
                                                                                                                              • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                                              PID:5564
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                            5⤵
                                                                                                                              PID:2112
                                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                wmic csproduct get uuid
                                                                                                                                6⤵
                                                                                                                                  PID:1508
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                5⤵
                                                                                                                                  PID:5348
                                                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                    wmic csproduct get uuid
                                                                                                                                    6⤵
                                                                                                                                      PID:2136
                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12891782771017672600,13067988337138842862,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6380 /prefetch:2
                                                                                                                              2⤵
                                                                                                                                PID:3252
                                                                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                              1⤵
                                                                                                                                PID:2844
                                                                                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                1⤵
                                                                                                                                  PID:748
                                                                                                                                • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                  C:\Windows\system32\AUDIODG.EXE 0x468 0x404
                                                                                                                                  1⤵
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:5232
                                                                                                                                • C:\Windows\system32\vssvc.exe
                                                                                                                                  C:\Windows\system32\vssvc.exe
                                                                                                                                  1⤵
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:6048

                                                                                                                                Network

                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                Replay Monitor

                                                                                                                                Loading Replay Monitor...

                                                                                                                                Downloads

                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                  Filesize

                                                                                                                                  152B

                                                                                                                                  MD5

                                                                                                                                  fab8d8d865e33fe195732aa7dcb91c30

                                                                                                                                  SHA1

                                                                                                                                  2637e832f38acc70af3e511f5eba80fbd7461f2c

                                                                                                                                  SHA256

                                                                                                                                  1b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea

                                                                                                                                  SHA512

                                                                                                                                  39a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43

                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                  Filesize

                                                                                                                                  152B

                                                                                                                                  MD5

                                                                                                                                  36988ca14952e1848e81a959880ea217

                                                                                                                                  SHA1

                                                                                                                                  a0482ef725657760502c2d1a5abe0bb37aebaadb

                                                                                                                                  SHA256

                                                                                                                                  d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6

                                                                                                                                  SHA512

                                                                                                                                  d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173

                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                  Filesize

                                                                                                                                  186B

                                                                                                                                  MD5

                                                                                                                                  094ab275342c45551894b7940ae9ad0d

                                                                                                                                  SHA1

                                                                                                                                  2e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e

                                                                                                                                  SHA256

                                                                                                                                  ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3

                                                                                                                                  SHA512

                                                                                                                                  19d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d

                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                  Filesize

                                                                                                                                  5KB

                                                                                                                                  MD5

                                                                                                                                  85c59db46f836aacfd5710eeb1cc313e

                                                                                                                                  SHA1

                                                                                                                                  16fb3daa56c142a611a08b500b3d5bc464eb41ef

                                                                                                                                  SHA256

                                                                                                                                  a5603b082d5cd9d6f5e1e842031a7f5d7f4d91ab1b2d964af078b4cfed1231e7

                                                                                                                                  SHA512

                                                                                                                                  9ab0315492719a0d48b3ba11b43b74a6e32960e9bfb08e8d87af51d059d7f8faf64e34d466cd09d1171189d2586fa2952c0270a95a2fd1c791de4b0887b22950

                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                  Filesize

                                                                                                                                  6KB

                                                                                                                                  MD5

                                                                                                                                  807225195b13ee3d6d7609e1313e2efc

                                                                                                                                  SHA1

                                                                                                                                  9a049704e1a319368cbdc6fada04788f0da90d6d

                                                                                                                                  SHA256

                                                                                                                                  e8df0743173c716f3f81a7964df62d36b4c68fe771b226da24186d64bf46e36c

                                                                                                                                  SHA512

                                                                                                                                  dd7eaf231b9cbb434f8387094fc6666b5f4f61cd0340125b624922a7c13374c4aaf5e7830c0ae7c454909e022a1ed37b6272798016a302f09a24bf780545f6e8

                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                  Filesize

                                                                                                                                  16B

                                                                                                                                  MD5

                                                                                                                                  46295cac801e5d4857d09837238a6394

                                                                                                                                  SHA1

                                                                                                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                  SHA256

                                                                                                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                  SHA512

                                                                                                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                  Filesize

                                                                                                                                  16B

                                                                                                                                  MD5

                                                                                                                                  206702161f94c5cd39fadd03f4014d98

                                                                                                                                  SHA1

                                                                                                                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                  SHA256

                                                                                                                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                  SHA512

                                                                                                                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                  Filesize

                                                                                                                                  10KB

                                                                                                                                  MD5

                                                                                                                                  98b646ffaa6d3f50ef8b5157e7745fd0

                                                                                                                                  SHA1

                                                                                                                                  8d899184fa7aabbbfa092ea68f4fed6a2e93a726

                                                                                                                                  SHA256

                                                                                                                                  a674fa263b90106dc99b9aa9ba874a966ca3fffa8ce6e8f45a141130f0807931

                                                                                                                                  SHA512

                                                                                                                                  fb7d03ff1a12552e4e90b6ee44a82c0c3bf61899cef9b7ddc8a60d65697ae3745a73af4d0a4a2aa5b8930e9a11de3b061321c067510dfff19337ef0dd6112cc7

                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                  Filesize

                                                                                                                                  11KB

                                                                                                                                  MD5

                                                                                                                                  395b8ccf36df5c526b5218abcfcbe6a7

                                                                                                                                  SHA1

                                                                                                                                  e982809e9028be0de236f9e164eb871ded050871

                                                                                                                                  SHA256

                                                                                                                                  c6b4590d9730f594f4461202b623dd4907efeae5e39b7bb064e7aeeb0004118f

                                                                                                                                  SHA512

                                                                                                                                  49318759b6ff9eb107da5414fc14fa7a766a134284c2c9e70e9619718f5be8da719102cf32d9084ee7b658d946a7dbf99e7c35746a1e73013a3d9d656c20454f

                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                  Filesize

                                                                                                                                  10KB

                                                                                                                                  MD5

                                                                                                                                  e184da79fa0786725ce594550d77e724

                                                                                                                                  SHA1

                                                                                                                                  b8dad352bcfba969ea52518266906798371ae998

                                                                                                                                  SHA256

                                                                                                                                  d3077a288bdbe6c187b3f8a953352736f7a87d764fa85b29eb5e684945b02906

                                                                                                                                  SHA512

                                                                                                                                  bc98582623353cef560aca4eca47e63ad3f4e95732aa8bca84fc1bebb698f4659c3fb1b260df6a60a00ca1e8e178adf67a1ca6d9ecaa321f85110398f13dd76a

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\TempAppFiles\cleaner.bat

                                                                                                                                  Filesize

                                                                                                                                  8.0MB

                                                                                                                                  MD5

                                                                                                                                  5264f00456cbe53023be7b5e80963fa7

                                                                                                                                  SHA1

                                                                                                                                  bfba30d1b1cd84f9d15a6a8b18d22d9e318df512

                                                                                                                                  SHA256

                                                                                                                                  feda308f941e53aef81effefd1249ab4d75a698fa4ae16bf4b148f87d6c27e9c

                                                                                                                                  SHA512

                                                                                                                                  14e369da936d049b3f2c1cd4249508061024bdba2c0c7c840e12a6edf4f5d58d8d510a401240b24ccddce5baab74903c8cc2ff71841c7d716b821a8d30c0e442

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\TempAppFiles\fv.exe

                                                                                                                                  Filesize

                                                                                                                                  704KB

                                                                                                                                  MD5

                                                                                                                                  be322cb110da6187bfa1aa2857f08015

                                                                                                                                  SHA1

                                                                                                                                  c852390a85444e7dd1ea95bd3b57d6f78104d917

                                                                                                                                  SHA256

                                                                                                                                  27adbb6b07726ceef6ee93b1f74fb89c4ecafdf479af4f99c7d1c7a94af03d62

                                                                                                                                  SHA512

                                                                                                                                  7007b420ade524f7fe4ac2009d12582c14d8c144a9ace4c761504ca5a12290c8199ecd40fc0e1d74e7576d6e9440066f8f6c77faf93e3185c3541c51b1fab637

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\TempAppFiles\mac.exe

                                                                                                                                  Filesize

                                                                                                                                  11.6MB

                                                                                                                                  MD5

                                                                                                                                  d1291397afba61f29aa4edf736846e0a

                                                                                                                                  SHA1

                                                                                                                                  7689fa6f0981abf689cf530db90b5362290f3417

                                                                                                                                  SHA256

                                                                                                                                  26f760c4a2ed24f038075e77622205d8052316eed2bdf5ec9176f7656d6549b0

                                                                                                                                  SHA512

                                                                                                                                  9d8f4d07e84f462c3e696dbdfd00170e0dc114101da76476af40c8a65bd80060aa031dd001ab0cdb8908ae24287034a3b970696c46ee519aeac8a22044a5a12a

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\VCRUNTIME140.dll

                                                                                                                                  Filesize

                                                                                                                                  96KB

                                                                                                                                  MD5

                                                                                                                                  f12681a472b9dd04a812e16096514974

                                                                                                                                  SHA1

                                                                                                                                  6fd102eb3e0b0e6eef08118d71f28702d1a9067c

                                                                                                                                  SHA256

                                                                                                                                  d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

                                                                                                                                  SHA512

                                                                                                                                  7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\_ctypes.pyd

                                                                                                                                  Filesize

                                                                                                                                  57KB

                                                                                                                                  MD5

                                                                                                                                  b4c41a4a46e1d08206c109ce547480c7

                                                                                                                                  SHA1

                                                                                                                                  9588387007a49ec2304160f27376aedca5bc854d

                                                                                                                                  SHA256

                                                                                                                                  9925ab71a4d74ce0ccc036034d422782395dd496472bd2d7b6d617f4d6ddc1f9

                                                                                                                                  SHA512

                                                                                                                                  30debb8e766b430a57f3f6649eeb04eb0aad75ab50423252585db7e28a974d629eb81844a05f5cb94c1702308d3feda7a7a99cb37458e2acb8e87efc486a1d33

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-console-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  9313c86e7bae859f0174a1c8b6aba58b

                                                                                                                                  SHA1

                                                                                                                                  dce67fd1da5da8dc4ba406c544e55a83d6536cc9

                                                                                                                                  SHA256

                                                                                                                                  af9675ac90bae8a0d8623f6fdaff9d39e1b8810e8e46a5b044baaa3396e745b3

                                                                                                                                  SHA512

                                                                                                                                  2ec64fce4a86bc52dc6c485fd94d203020617df92698ca91ae25c4901984899e21c7dd92881ec52d6850edfa547701aab9b0cd1b8d076e6779b1a13324cdd3a4

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-datetime-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  854458ad55c39a9dfd1e350a51be02b8

                                                                                                                                  SHA1

                                                                                                                                  5013cf58de5a0b55e026ace967e9842b3b131c2a

                                                                                                                                  SHA256

                                                                                                                                  f918b0c45f59b2cb29f1eb3653d2f2679095e85e082a1198c933a76edf1f33ef

                                                                                                                                  SHA512

                                                                                                                                  faa41a5031033f7e86efebc47777f915e95617f4b05d93833066c206d9c092855d8072c7bd142898f5a2bd1f94b646d98933302ddeb5a9ca0d5930c7b2241b98

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-debug-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  7ad2034acd0f296fe9eed320e5ad7591

                                                                                                                                  SHA1

                                                                                                                                  fe1b217e3f4567905968f7a3d48a7611e3cf3f7b

                                                                                                                                  SHA256

                                                                                                                                  0d859a866d1bcefe1a1bc5adb88dcf2765567ecc31dfb4e472b512d033d88bb4

                                                                                                                                  SHA512

                                                                                                                                  06d017b0ef9d081bc627f7f33d51ef2fe64e2cc5023204771032c4ed7bf26c0c6106b69d78f7bdd880fa59e8e4048b2da8848784bc92d7780155df140c952420

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-errorhandling-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  12ea48ce605ebb204a21ae7d86db3417

                                                                                                                                  SHA1

                                                                                                                                  5fb0ff9ba4105cd76ee4470ae4cad0a39ae68c66

                                                                                                                                  SHA256

                                                                                                                                  189bbbd739526a986e53518865e741cde8c5967aacd5ed687408cec3d8781f1c

                                                                                                                                  SHA512

                                                                                                                                  39b486fb72c9dff4e391673a872e957dbf0545d4d26914d0b0a475624e40b4feec3a9a17549e87ba806b1a90bf6f7784a187c506daa1db5201561cef90ff6e81

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-fibers-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  201ff3cd2ffe7d222f46574d4ac40a70

                                                                                                                                  SHA1

                                                                                                                                  b43f19bbb8fd1c8aa05ba67dea38a7785dbe57b6

                                                                                                                                  SHA256

                                                                                                                                  b83a71978215fdba477c4ea61340168947a1021324d118e6b7159054985f2d1a

                                                                                                                                  SHA512

                                                                                                                                  3f99d7b501c1db470a6d91af856ebbede05522acb5763d928f4fb28c74db2339b46df108745ed8ebd8c6c1298d9495358c245d188f055638b0d6dd568fa596d2

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-file-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  25KB

                                                                                                                                  MD5

                                                                                                                                  4b328f140a3ae7fedb21ca50cc23d938

                                                                                                                                  SHA1

                                                                                                                                  9e71b4c2cf030a644d2050188c4b77e638c0ee14

                                                                                                                                  SHA256

                                                                                                                                  e55b200643e8b078e7f5eb0c97de44fead21b11d06590ebedbcb84214d063345

                                                                                                                                  SHA512

                                                                                                                                  4c349f45ca4db4f1247aa405e5627f22b7ccfe66234d8d970475e71471ebb251f7a0f781a33d0e4ec893f86653b0a1c8508adf576e923d0ce86b43f552204614

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-file-l1-2-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  4a060eec454c222a5381cd359dc00b81

                                                                                                                                  SHA1

                                                                                                                                  21e1bc115d04a74779e955ea16a16bd71454d9bb

                                                                                                                                  SHA256

                                                                                                                                  e6b2b05e14a6c6f5381e8f4c7f4fd28a499246fb4c8eafe1f08014b9273d70df

                                                                                                                                  SHA512

                                                                                                                                  16fb1f4ccdad05d07feb62e0cd078401f4023f9fab0fb15e52b927ca413e65eb32c2932ba59dbfa7f7ee0e8a8053748e27f2757e82e600db812271aa44a9433c

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-file-l2-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  20KB

                                                                                                                                  MD5

                                                                                                                                  50abf0a7ee67f00f247bada185a7661c

                                                                                                                                  SHA1

                                                                                                                                  0cddac9ac4db3bf10a11d4b79085ef9cb3fb84a1

                                                                                                                                  SHA256

                                                                                                                                  f957a4c261506484b53534a9be8931c02ec1a349b3f431a858f8215cecfec3f7

                                                                                                                                  SHA512

                                                                                                                                  c2694bb5d103baff1264926a04d2f0fe156b8815a23c3748412a81cc307b71a9236a0e974b5549321014065e393d10228a0f0004df9ba677f03b5d244a64b528

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-handle-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  4166d703abc9c6de65d5b269d3a5425e

                                                                                                                                  SHA1

                                                                                                                                  16bcd7191312b94bdf38368d188e5a5cc479a36c

                                                                                                                                  SHA256

                                                                                                                                  0a351c2a2889a42886017e7dbcf75f45e3cb24d2f55e72205624272487e4a056

                                                                                                                                  SHA512

                                                                                                                                  f722dba410cab727c753e9cce0bc47663e22f45828f5df0bac5bd6331497a2f15f6d9330b5203d3ff735f1ce6397e63c1b21d3ea6c5ceab817b5f83ec296882b

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-heap-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  993b5bc35dac959bed58b77fe42ac77a

                                                                                                                                  SHA1

                                                                                                                                  2abad159cbab86ff423d6446143427daab751366

                                                                                                                                  SHA256

                                                                                                                                  b998ff8d173c34505e1d5984134282866de910b09919cf9a322fce760b75c80b

                                                                                                                                  SHA512

                                                                                                                                  ca19e949dcc8460af53c9dad17995a0cbffd971bb731b7fcb53bb9384d227357926231c9fadfaa5aef09055bebae9d5c23ee73eb6eca04d6a52a3df0847e10ab

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-interlocked-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  0b65672b91c6a12d769dd777f810b149

                                                                                                                                  SHA1

                                                                                                                                  2d527b45dcbe653a91e10365891c7e589f5e51e0

                                                                                                                                  SHA256

                                                                                                                                  c09eb307b2eb747b73c516267a99a23bb73204452326d41bdeb6f43598f6d62e

                                                                                                                                  SHA512

                                                                                                                                  f090bb0b8f3616cf2d77ff25523bc823918e1452f626a1298c95003def1867c785566a4e85ccd7f5a20f14631caec5dd392777db2d00368c3fdf3597e0f51788

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-libraryloader-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  259b4186004bb41e706dd781e29f5c5b

                                                                                                                                  SHA1

                                                                                                                                  85751d31fe233ed51c46466f214f497d01be8d87

                                                                                                                                  SHA256

                                                                                                                                  b3ba83880986f2522d05a88c52fe69eda9c9fadbc5192a063e36bba777cc877f

                                                                                                                                  SHA512

                                                                                                                                  f8a06252e96f40965668c978c4808305d424de698f47f420643d713751926636f2049dd34c8156ba5bbbf5a5b2f4d5c19a978cf27d3aaebd728d7a3de8f0afa2

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-localization-l1-2-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  4c26932f8f1f490017add31f5ec0a533

                                                                                                                                  SHA1

                                                                                                                                  0da01a7c89b506fe3fd939344bb51b976efb3207

                                                                                                                                  SHA256

                                                                                                                                  dd3843c2e46b4e926c36150d614efe02ca0ebc1f767f64f471568adc35c2ef23

                                                                                                                                  SHA512

                                                                                                                                  eb2b87d187991fdc8e3a6577f20622d2d4a2a994dd375d8c27e1434ce786596533eacfbde8714db9959d88d6bcb91fdc8079c60c23f0eb920ba45c546a44e523

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-memory-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  41e0b7cb0eecba317cf321b1ada084d7

                                                                                                                                  SHA1

                                                                                                                                  4ce1f13188fc00eb29c726717eae489c524c1c8a

                                                                                                                                  SHA256

                                                                                                                                  db978830b1fbcc0521582a6a79864b0fd83179248fa374926c8097bc02cd6383

                                                                                                                                  SHA512

                                                                                                                                  f0961cde8dc83b845b2b91e42436ed8b42d2fb19caaabf49b300fa9cbbae9fab84009b4714c3899ab4a703315a135a61e508db29239d823a1cc11462ce6ffab7

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-namedpipe-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  7e751952f122f4e8be1317087dc9dc71

                                                                                                                                  SHA1

                                                                                                                                  f65884c8cfbb8ad565b3df3a51af11b1617c7092

                                                                                                                                  SHA256

                                                                                                                                  d078a9a9958a7c816dea989bef24f32befc6651aea5e07f97a7b5d50df73f799

                                                                                                                                  SHA512

                                                                                                                                  960922ac1309bdcf42d6900a0bea30d4096d1411ec6a97f328520d4a59f71fc04e6f4a7b8d2b346012530329f76897607369c8e1ed1fe9c589d7f7682987c043

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-processenvironment-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  6d0762a2ba4263d0901ca7aaa0725c0c

                                                                                                                                  SHA1

                                                                                                                                  e36d2d049116bd2d84121cdfa179098ac03650b4

                                                                                                                                  SHA256

                                                                                                                                  2ee9434cc5f40f4514c7284e14b90db5c7a33000afda834d7c1dc063baa3d805

                                                                                                                                  SHA512

                                                                                                                                  94616b2bfc0497ca2dbbc23c1aa4ecb04113a53d75fa570f6bb5e2561e5cdb940792e2cb290562133d226400c78d91377fdd312ba2858679084c66ff1ae9031d

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-processthreads-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  abaabc1df36c7a0674f20fb83247fd71

                                                                                                                                  SHA1

                                                                                                                                  345db0ffea0cb2531b79d464ad69347ac71ee2b9

                                                                                                                                  SHA256

                                                                                                                                  ba55f8481d8a9d225b8c430eb010f675250c5afa64d9eeb15ff31dc159a19f5a

                                                                                                                                  SHA512

                                                                                                                                  7c01b8f46e9fbe08784066a9df03723b3485fa714f22f4ab7e1cbe719b0a91ab1a5d597ef9d567836375de929ea9397ce0685f00b908f3d0aa4d0288eb59f7ba

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-processthreads-l1-1-1.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  a6776c201baae1dd6f88048d7747d14c

                                                                                                                                  SHA1

                                                                                                                                  646119d2e440e6dad0ffb0fe449ab4fc27f09fbe

                                                                                                                                  SHA256

                                                                                                                                  ee99af71c347ff53c4e15109cb597759e657a3e859d9530680eeea8bb0540112

                                                                                                                                  SHA512

                                                                                                                                  a9137af8529fd96dbba22c5179a16d112ec0bfab9792babe0a9f1cca27408eff73ba89f498cb5f941a5aa44555529ee10484e6ca4a3fbf1627523acfde622b45

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-profile-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  fb731a1f96c9e34347cba5bb18e54581

                                                                                                                                  SHA1

                                                                                                                                  88a62edfbbd806b1043b4a1266c4708e1d47be1d

                                                                                                                                  SHA256

                                                                                                                                  c4c1d381f419731c848e4a20aef02a4436758935c9a274896228b9451956cc8e

                                                                                                                                  SHA512

                                                                                                                                  be6c94d6015edae41fa0d6464c7dc5976adbc3617e02b293b9a39e645ec173071f1f282959ddf264a133ce3b3bb9c434eb2e65fc607136f11d8eb07538168ffc

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-rtlsupport-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  8aad6a3a2fe9052ef218d5c8ce1995e1

                                                                                                                                  SHA1

                                                                                                                                  33748750e57cdc165fcdd186ae53003649607221

                                                                                                                                  SHA256

                                                                                                                                  e44d56d10ee14d4c4767a25839c2ef6826adbea3e15c2705b1d79676a63905b4

                                                                                                                                  SHA512

                                                                                                                                  841c70c63b243dea68c2ac9cd886731b6171dcf76a60932191fb29402585d6bbfcc98d11868fc6032f08c29d8e0040a2b896c32c2fb4697bd54dea2a52589ae6

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-string-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  2ebacbbda70b888b1bcc5e816d14f3a2

                                                                                                                                  SHA1

                                                                                                                                  ebf1763b0cee267040312deccb3dad61af1b9cf4

                                                                                                                                  SHA256

                                                                                                                                  96b11fa8aca734f4b1ddee377c84427d384f8e06affd99c63128797289fc9304

                                                                                                                                  SHA512

                                                                                                                                  af15fc2b1ff31a3550ae4e9ae45f7bbe728d839b288d6dc5f04859e27463ed946d5b2619736223ae401cee504e683b9fe9dffb65754280644dda91527eb46c5e

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-synch-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  87c57eddf837c1e7aaaddb451d3d981e

                                                                                                                                  SHA1

                                                                                                                                  5287af84ca9cdfa928355c3c899a43051169a2fd

                                                                                                                                  SHA256

                                                                                                                                  e65305c73e3540491a0c62103764d50d827a13d749f76cb2af593a800c93cf44

                                                                                                                                  SHA512

                                                                                                                                  0900608072d807082087275bd71061f7118534ea20d4cbd9b0e8190f500cd57feabe0bf7f9fac6438a7c4655ac405dd4ec17fd5f1a48b4f5dc70eb25e6f0e8ae

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-synch-l1-2-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  2914ea20c9b8d79b1e98ea6b6dd85450

                                                                                                                                  SHA1

                                                                                                                                  2e25617bb4f3f6391658b5778f5248d9e6762c6b

                                                                                                                                  SHA256

                                                                                                                                  047d09b49dae9a101eb55277aa37c31390ea6c7187379b448122d77bd77bf005

                                                                                                                                  SHA512

                                                                                                                                  c0731aaecbca9b70151e7630e0dbc7d744d534effe56ad703df881f09c7820cb143873dbf95d57357d51be44d53a3b9862d0c6483ca6c70aad01a3f11350abc9

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-sysinfo-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  e496d42d228b5e90c7b96350dbb1159c

                                                                                                                                  SHA1

                                                                                                                                  746ba35a931e05aebda957608a6e28c1699237aa

                                                                                                                                  SHA256

                                                                                                                                  1ff617fb9d681551fb456aabaae078c0ac7f96580ac1144ea441826a6d98caef

                                                                                                                                  SHA512

                                                                                                                                  ce555cb7fc0625d7568b002306e203e013f03127aad7383ce26774cb1f1fa820f5fa6145dc9f5930b4d0791631bdbce2ee2e4ee3efa7720b1b2c413ff782e197

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-timezone-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  10d466341e7ece8cf75b5d026105741b

                                                                                                                                  SHA1

                                                                                                                                  31d1e9b9a4511156695b5aa33d65b6a36f8139c2

                                                                                                                                  SHA256

                                                                                                                                  5ce391edb33c7055e724a4c3cecc64d16ba2aa4724cb99cd5aed00b0cecfbc82

                                                                                                                                  SHA512

                                                                                                                                  8778fd10c7360bd87db048a2b2ca6603455fd8cb4d0e18709f106b55db7cc92e7d6dc45385ff9def445b368376462e7d253442728d5e759faa97299b67a59e21

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\api-ms-win-core-util-l1-1-0.dll

                                                                                                                                  Filesize

                                                                                                                                  21KB

                                                                                                                                  MD5

                                                                                                                                  8222b0f8bcf884433a55996253963a96

                                                                                                                                  SHA1

                                                                                                                                  35914b003bbe6527e2479d7f897024915821500f

                                                                                                                                  SHA256

                                                                                                                                  7f18dc2971d15434bfe03c4842dced10b466e849d782a1c8e398d96c2e2b12e2

                                                                                                                                  SHA512

                                                                                                                                  5e67b25af8a1f23450cf8807135fea1ec39dfe8ff7cd3858e492ae9e016a23967ed6009da8868cd9dc87d583c3b7e6fb66d00bd48a7bba6b0eea638716514cc6

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\base_library.zip

                                                                                                                                  Filesize

                                                                                                                                  1.4MB

                                                                                                                                  MD5

                                                                                                                                  3b3654276bbb89fcba4df6a0a0fad8d6

                                                                                                                                  SHA1

                                                                                                                                  668cd7e62cb6449e820ce1c24484e7ab9c4ca9a4

                                                                                                                                  SHA256

                                                                                                                                  de67ef0597974ce98ac33c99d230f370284031ef62249d55c5d6210066874938

                                                                                                                                  SHA512

                                                                                                                                  ecade71b589213ba9bcf8f997e4ab1d1c7c2c78fb88d5f2d562f376986c005e9b98ffdbbd0988f6b5f50adff4cc46be1c076b377a6e6152014d5552effec4973

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\libffi-8.dll

                                                                                                                                  Filesize

                                                                                                                                  24KB

                                                                                                                                  MD5

                                                                                                                                  decbba3add4c2246928ab385fb16a21e

                                                                                                                                  SHA1

                                                                                                                                  5f019eff11de3122ffa67a06d52d446a3448b75e

                                                                                                                                  SHA256

                                                                                                                                  4b43c1e42f6050ddb8e184c8ec4fb1de4a6001e068ece8e6ad47de0cc9fd4a2d

                                                                                                                                  SHA512

                                                                                                                                  760a42a3eb3ca13fa7b95d3bd0f411c270594ae3cf1d3cda349fa4f8b06ebe548b60cd438d68e2da37de0bc6f1c711823f5e917da02ed7047a45779ee08d7012

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\python3.dll

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                  MD5

                                                                                                                                  34e49bb1dfddf6037f0001d9aefe7d61

                                                                                                                                  SHA1

                                                                                                                                  a25a39dca11cdc195c9ecd49e95657a3e4fe3215

                                                                                                                                  SHA256

                                                                                                                                  4055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281

                                                                                                                                  SHA512

                                                                                                                                  edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\python311.dll

                                                                                                                                  Filesize

                                                                                                                                  1.6MB

                                                                                                                                  MD5

                                                                                                                                  db09c9bbec6134db1766d369c339a0a1

                                                                                                                                  SHA1

                                                                                                                                  c156d9f2d0e80b4cf41794cd9b8b1e8a352e0a0b

                                                                                                                                  SHA256

                                                                                                                                  b1aac1e461174bbae952434e4dac092590d72b9832a04457c94bd9bb7ee8ad79

                                                                                                                                  SHA512

                                                                                                                                  653a7fff6a2b6bffb9ea2c0b72ddb83c9c53d555e798eea47101b0d932358180a01af2b9dab9c27723057439c1eaffb8d84b9b41f6f9cd1c3c934f1794104d45

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI8722\ucrtbase.dll

                                                                                                                                  Filesize

                                                                                                                                  1.1MB

                                                                                                                                  MD5

                                                                                                                                  3b337c2d41069b0a1e43e30f891c3813

                                                                                                                                  SHA1

                                                                                                                                  ebee2827b5cb153cbbb51c9718da1549fa80fc5c

                                                                                                                                  SHA256

                                                                                                                                  c04daeba7e7c4b711d33993ab4c51a2e087f98f4211aea0dcb3a216656ba0ab7

                                                                                                                                  SHA512

                                                                                                                                  fdb3012a71221447b35757ed2bdca6ed1f8833b2f81d03aabebd2cd7780a33a9c3d816535d03c5c3edd5aaf11d91156842b380e2a63135e3c7f87193ad211499

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_l3wabxcp.i30.ps1

                                                                                                                                  Filesize

                                                                                                                                  60B

                                                                                                                                  MD5

                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                  SHA1

                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                  SHA256

                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                  SHA512

                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                • C:\Users\Admin\Downloads\Unconfirmed 925924.crdownload

                                                                                                                                  Filesize

                                                                                                                                  15.6MB

                                                                                                                                  MD5

                                                                                                                                  76ed914a265f60ff93751afe02cf35a4

                                                                                                                                  SHA1

                                                                                                                                  4f8ea583e5999faaec38be4c66ff4849fcf715c6

                                                                                                                                  SHA256

                                                                                                                                  51bd245f8cb24c624674cd2bebcad4152d83273dab4d1ee7d982e74a0548890b

                                                                                                                                  SHA512

                                                                                                                                  83135f8b040b68cafb896c4624bd66be1ae98857907b9817701d46952d4be9aaf7ad1ab3754995363bb5192fa2c669c26f526cafc6c487b061c2edcceebde6ac

                                                                                                                                • memory/1976-87-0x0000000000FD0000-0x0000000002C50000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  28.5MB

                                                                                                                                • memory/1976-101-0x0000020FEFEA0000-0x0000020FEFEC2000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  136KB

                                                                                                                                • memory/1976-117-0x0000020FEDED0000-0x0000020FEDEE4000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  80KB

                                                                                                                                • memory/1976-85-0x0000000000FD0000-0x0000000002C50000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  28.5MB

                                                                                                                                • memory/1976-90-0x0000020FD4460000-0x0000020FD4461000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/1976-119-0x0000020FF08A0000-0x0000020FF08D2000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  200KB

                                                                                                                                • memory/1976-100-0x0000020FEFC30000-0x0000020FEFCE2000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  712KB

                                                                                                                                • memory/1976-88-0x0000000000FD0000-0x0000000002C50000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  28.5MB

                                                                                                                                • memory/1976-102-0x0000020FEDBD0000-0x0000020FEDDE4000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  2.1MB

                                                                                                                                • memory/1976-114-0x0000020FEFE70000-0x0000020FEFEA4000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  208KB

                                                                                                                                • memory/1976-115-0x0000020FF0880000-0x0000020FF089A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  104KB

                                                                                                                                • memory/1976-122-0x0000000000FD0000-0x0000000002C50000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  28.5MB

                                                                                                                                • memory/1976-116-0x0000020FEDBC0000-0x0000020FEDBC8000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  32KB

                                                                                                                                • memory/3604-454-0x0000021B36E80000-0x0000021B36FCE000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  1.3MB

                                                                                                                                • memory/5736-363-0x00007FFEDB0D0000-0x00007FFEDB0E4000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  80KB

                                                                                                                                • memory/5736-355-0x00007FFECB950000-0x00007FFECBCC5000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  3.5MB

                                                                                                                                • memory/5736-359-0x00007FFEDF1E0000-0x00007FFEDF204000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  144KB

                                                                                                                                • memory/5736-358-0x00007FFEDB0F0000-0x00007FFEDB102000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  72KB

                                                                                                                                • memory/5736-357-0x00007FFEDB110000-0x00007FFEDB125000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  84KB

                                                                                                                                • memory/5736-347-0x00007FFEDF1C0000-0x00007FFEDF1CD000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  52KB

                                                                                                                                • memory/5736-346-0x00007FFEDE710000-0x00007FFEDE729000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  100KB

                                                                                                                                • memory/5736-361-0x00007FFED9880000-0x00007FFED98A2000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  136KB

                                                                                                                                • memory/5736-362-0x00007FFED9760000-0x00007FFED987C000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  1.1MB

                                                                                                                                • memory/5736-396-0x00007FFEDB110000-0x00007FFEDB125000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  84KB

                                                                                                                                • memory/5736-364-0x00007FFEDE710000-0x00007FFEDE729000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  100KB

                                                                                                                                • memory/5736-375-0x00007FFED6CD0000-0x00007FFED6CE9000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  100KB

                                                                                                                                • memory/5736-376-0x00007FFED6C80000-0x00007FFED6CCD000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  308KB

                                                                                                                                • memory/5736-378-0x000001E782EF0000-0x000001E783265000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  3.5MB

                                                                                                                                • memory/5736-379-0x00007FFED6C60000-0x00007FFED6C71000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  68KB

                                                                                                                                • memory/5736-380-0x00007FFED6750000-0x00007FFED6782000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  200KB

                                                                                                                                • memory/5736-387-0x00007FFED98E0000-0x00007FFED9998000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  736KB

                                                                                                                                • memory/5736-388-0x00007FFED66A0000-0x00007FFED66D7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  220KB

                                                                                                                                • memory/5736-381-0x00007FFEDE700000-0x00007FFEDE70A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  40KB

                                                                                                                                • memory/5736-382-0x00007FFECC990000-0x00007FFECCB03000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  1.4MB

                                                                                                                                • memory/5736-383-0x00007FFED6730000-0x00007FFED674E000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  120KB

                                                                                                                                • memory/5736-386-0x00007FFEB8D20000-0x00007FFEB951B000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  8.0MB

                                                                                                                                • memory/5736-384-0x00007FFEDB130000-0x00007FFEDB15E000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  184KB

                                                                                                                                • memory/5736-385-0x00007FFECB950000-0x00007FFECBCC5000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  3.5MB

                                                                                                                                • memory/5736-377-0x00007FFEDB160000-0x00007FFEDB183000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  140KB

                                                                                                                                • memory/5736-365-0x00007FFED9A00000-0x00007FFED9A1B000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  108KB

                                                                                                                                • memory/5736-352-0x00007FFECD620000-0x00007FFECDC08000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  5.9MB

                                                                                                                                • memory/5736-353-0x00007FFEDB130000-0x00007FFEDB15E000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  184KB

                                                                                                                                • memory/5736-354-0x000001E782EF0000-0x000001E783265000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  3.5MB

                                                                                                                                • memory/5736-360-0x00007FFED9A20000-0x00007FFED9A34000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  80KB

                                                                                                                                • memory/5736-356-0x00007FFED98E0000-0x00007FFED9998000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  736KB

                                                                                                                                • memory/5736-318-0x00007FFEDF1D0000-0x00007FFEDF1DF000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  60KB

                                                                                                                                • memory/5736-349-0x00007FFEDBC10000-0x00007FFEDBC3D000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  180KB

                                                                                                                                • memory/5736-315-0x00007FFEDF1E0000-0x00007FFEDF204000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  144KB

                                                                                                                                • memory/5736-350-0x00007FFEDB160000-0x00007FFEDB183000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  140KB

                                                                                                                                • memory/5736-351-0x00007FFECC990000-0x00007FFECCB03000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  1.4MB

                                                                                                                                • memory/5736-404-0x00007FFED9760000-0x00007FFED987C000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  1.1MB

                                                                                                                                • memory/5736-403-0x00007FFED9880000-0x00007FFED98A2000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  136KB

                                                                                                                                • memory/5736-440-0x00007FFEDD420000-0x00007FFEDD42D000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  52KB

                                                                                                                                • memory/5736-348-0x00007FFEDD430000-0x00007FFEDD449000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  100KB

                                                                                                                                • memory/5736-308-0x00007FFECD620000-0x00007FFECDC08000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  5.9MB

                                                                                                                                • memory/5736-457-0x00007FFED9A00000-0x00007FFED9A1B000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  108KB

                                                                                                                                • memory/5736-458-0x00007FFED6CD0000-0x00007FFED6CE9000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  100KB

                                                                                                                                • memory/5736-459-0x00007FFED6C80000-0x00007FFED6CCD000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  308KB

                                                                                                                                • memory/5736-468-0x00007FFEB8D20000-0x00007FFEB951B000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  8.0MB

                                                                                                                                • memory/5736-490-0x00007FFED6CD0000-0x00007FFED6CE9000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  100KB

                                                                                                                                • memory/5736-499-0x00007FFED66A0000-0x00007FFED66D7000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  220KB

                                                                                                                                • memory/5736-498-0x00007FFEDD420000-0x00007FFEDD42D000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  52KB

                                                                                                                                • memory/5736-484-0x00007FFEDB0F0000-0x00007FFEDB102000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  72KB

                                                                                                                                • memory/5736-483-0x00007FFEDB110000-0x00007FFEDB125000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  84KB

                                                                                                                                • memory/5736-479-0x00007FFECC990000-0x00007FFECCB03000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  1.4MB

                                                                                                                                • memory/5736-480-0x00007FFEDB130000-0x00007FFEDB15E000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  184KB

                                                                                                                                • memory/5736-471-0x00007FFECD620000-0x00007FFECDC08000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  5.9MB

                                                                                                                                • memory/5736-472-0x00007FFEDF1E0000-0x00007FFEDF204000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  144KB

                                                                                                                                • memory/5736-521-0x00007FFED6CD0000-0x00007FFED6CE9000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  100KB

                                                                                                                                • memory/5736-514-0x00007FFEDB110000-0x00007FFEDB125000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  84KB

                                                                                                                                • memory/5736-502-0x00007FFECD620000-0x00007FFECDC08000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  5.9MB