Analysis

  • max time kernel
    237s
  • max time network
    242s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26/01/2025, 14:53

General

  • Target

    lossless scaling.zip

  • Size

    16.6MB

  • MD5

    df2b1bbb948f2109070d0769b6438969

  • SHA1

    a70dc3fa42aa39ef57772b4d32ecec9fda6deb00

  • SHA256

    ecdafe824395e7c486a3b6f649f214ce225dcc4d0c9a0335abbe657418e029a8

  • SHA512

    dba7bda84503c1763960c338b75860187e0d00ba91af359cad9b352408ffe4754ff3674ace6786e5d000074a54398a2f0bcfd346b96c371d556e28d36f13a088

  • SSDEEP

    393216:41v8g2pRrG577KcrcT4Yhy8JK4sFX237hWS7GJTe:4yg0RrGZKcAHy8JK4syWSiJi

Malware Config

Extracted

Family

asyncrat

Version

A 14

Botnet

Default

C2

3x3.casacam.net:303

Mutex

MaterxMutex_Egypt2

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • UAC bypass 3 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Start PowerShell.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\lossless scaling.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:572
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1464
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\lossless scaling\Crack.bat" "
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4888
      • C:\Windows\system32\net.exe
        net session
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 session
          3⤵
            PID:3316
        • C:\Windows\system32\xcopy.exe
          xcopy "C:\Users\Admin\Desktop\lossless scaling\\language\en-US" "C:\Users\Public\IObitUnlocker" /E /H /C /I
          2⤵
            PID:2852
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "& {Get-Content 'C:\Users\Public\IObitUnlocker\UK.dll' | Out-String | Invoke-Expression}"
            2⤵
            • UAC bypass
            • Command and Scripting Interpreter: PowerShell
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4944
            • C:\Windows\system32\schtasks.exe
              "C:\Windows\system32\schtasks.exe" /query /tn administrator
              3⤵
                PID:3312
              • C:\Users\Public\IObitUnlocker\RAR.exe
                "C:\Users\Public\IObitUnlocker\RAR.exe" x -pahmad..123 -o+ C:\Users\Public\IObitUnlocker\EN.dll C:\Users\Public\IObitUnlocker\
                3⤵
                • Executes dropped EXE
                PID:3916
              • C:\Users\Public\IObitUnlocker\BR\Font.exe
                "C:\Users\Public\IObitUnlocker\BR\Font.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3388
                • C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe
                  "C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3020
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Public\IObitUnlocker\Loader.vbs"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4956
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass iex([IO.File]::ReadAllText('C:\Users\Public\IObitUnlocker\Report.ps1'))
                  4⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:244
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:4784
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ppnzwg.exe"' & exit
                      6⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:3044
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ppnzwg.exe"'
                        7⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4680
                        • C:\Users\Admin\AppData\Local\Temp\ppnzwg.exe
                          "C:\Users\Admin\AppData\Local\Temp\ppnzwg.exe"
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3520
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                      6⤵
                        PID:480
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                        6⤵
                          PID:3108
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                          6⤵
                            PID:5056
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                            6⤵
                              PID:552
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
                              6⤵
                                PID:2384
                        • C:\Windows\system32\schtasks.exe
                          "C:\Windows\system32\schtasks.exe" /query /tn administrator
                          3⤵
                            PID:4404
                        • C:\Windows\system32\mode.com
                          mode con: cols=80 lines=10
                          2⤵
                            PID:2988
                        • C:\Users\Admin\Desktop\lossless scaling\lossless scaling.exe
                          "C:\Users\Admin\Desktop\lossless scaling\lossless scaling.exe"
                          1⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:3848
                          • C:\Windows\SysWOW64\wscript.exe
                            "C:\Windows\System32\wscript.exe" C:\Users\Public\IObitUnlocker\Lan.vbs
                            2⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:3420
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoLogo -ExecutionPolicy Bypass -Command "Invoke-Expression (Get-Content 'C:\Users\Public\IObitUnlocker\RU.dll' -Raw)"
                              3⤵
                              • UAC bypass
                              • Command and Scripting Interpreter: PowerShell
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:4500
                              • C:\Windows\SysWOW64\schtasks.exe
                                "C:\Windows\system32\schtasks.exe" /query /tn administrator
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:4128
                              • C:\Users\Public\IObitUnlocker\RAR.exe
                                "C:\Users\Public\IObitUnlocker\RAR.exe" x -pahmad..123 -o+ C:\Users\Public\IObitUnlocker\EN.dll C:\Users\Public\IObitUnlocker\
                                4⤵
                                • Executes dropped EXE
                                PID:4452
                              • C:\Users\Public\IObitUnlocker\BR\Font.exe
                                "C:\Users\Public\IObitUnlocker\BR\Font.exe"
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:3120
                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe
                                  "C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3788
                              • C:\Windows\SysWOW64\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Public\IObitUnlocker\Loader.vbs"
                                4⤵
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of WriteProcessMemory
                                PID:5056
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass iex([IO.File]::ReadAllText('C:\Users\Public\IObitUnlocker\Report.ps1'))
                                  5⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4880
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3456
                              • C:\Windows\SysWOW64\schtasks.exe
                                "C:\Windows\system32\schtasks.exe" /query /tn administrator
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:2900
                          • C:\Users\Admin\Desktop\lossless scaling\language\uk-UA\LosslessScaling.exe
                            "C:\Users\Admin\Desktop\lossless scaling\language\uk-UA\LosslessScaling.exe"
                            2⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Modifies Control Panel
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of SetWindowsHookEx
                            PID:3044
                        • C:\Windows\system32\NOTEPAD.EXE
                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\lossless scaling\__HOW TO CRACK.txt
                          1⤵
                            PID:4680
                          • C:\Windows\System32\NOTEPAD.EXE
                            "C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\lossless scaling\Crack.bat
                            1⤵
                              PID:2068
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
                              1⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4024
                            • C:\Users\Admin\AppData\Roaming\HelpLink\Certificate.exe
                              C:\Users\Admin\AppData\Roaming\HelpLink\Certificate.exe
                              1⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5036
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                                2⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2116
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe"
                              1⤵
                              • Drops file in Windows directory
                              • Enumerates system info in registry
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:4116
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa699cc40,0x7ffaa699cc4c,0x7ffaa699cc58
                                2⤵
                                  PID:1880
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1796,i,2362911114064777391,3927570859755656529,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1792 /prefetch:2
                                  2⤵
                                    PID:4084
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2056,i,2362911114064777391,3927570859755656529,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2124 /prefetch:3
                                    2⤵
                                      PID:3752
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,2362911114064777391,3927570859755656529,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2380 /prefetch:8
                                      2⤵
                                        PID:2244
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,2362911114064777391,3927570859755656529,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:1
                                        2⤵
                                          PID:4628
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,2362911114064777391,3927570859755656529,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:1
                                          2⤵
                                            PID:844
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4380,i,2362911114064777391,3927570859755656529,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3536 /prefetch:1
                                            2⤵
                                              PID:4788
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4560,i,2362911114064777391,3927570859755656529,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4220 /prefetch:1
                                              2⤵
                                                PID:2560
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4860,i,2362911114064777391,3927570859755656529,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4724 /prefetch:8
                                                2⤵
                                                  PID:2524
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3428,i,2362911114064777391,3927570859755656529,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3416 /prefetch:8
                                                  2⤵
                                                    PID:740
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3512,i,2362911114064777391,3927570859755656529,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:8
                                                    2⤵
                                                      PID:1744
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3256,i,2362911114064777391,3927570859755656529,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4876 /prefetch:8
                                                      2⤵
                                                        PID:1172
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4952,i,2362911114064777391,3927570859755656529,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4344 /prefetch:8
                                                        2⤵
                                                          PID:3920
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3380,i,2362911114064777391,3927570859755656529,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4872 /prefetch:8
                                                          2⤵
                                                            PID:4620
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5084,i,2362911114064777391,3927570859755656529,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5020 /prefetch:2
                                                            2⤵
                                                              PID:2396
                                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                            1⤵
                                                              PID:5040
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                              1⤵
                                                                PID:4768

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                Filesize

                                                                649B

                                                                MD5

                                                                9701cc95423504720028b611d00a8d48

                                                                SHA1

                                                                7bb3b6193c65f855d430d35db6f5a301f5435212

                                                                SHA256

                                                                1a7d7eadf769080173ee4351568e2bf6e887dfc8246b35d11f88cbc41589451a

                                                                SHA512

                                                                1d450c0f30850d1910f65469bc1fabc646520cb6a43ded6651b675cecbb21b2c728aafb063df0a9acc60bc0467580b40ecc1bdfce0f0c0d0e56c02425159fa1e

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000005

                                                                Filesize

                                                                215KB

                                                                MD5

                                                                7b49e7ed72d5c3ab75ea4aa12182314a

                                                                SHA1

                                                                1338fc8f099438e5465615ace45c245450f98c84

                                                                SHA256

                                                                747c584047f6a46912d5c5354b6186e04ea24cf61246a89c57077faf96679db6

                                                                SHA512

                                                                6edf4594e2b850f3ede5a68738e6482dd6e9a5312bffa61b053312aa383df787641f6747ac91fa71bb80c51ed52a0c23cc911f063cd6e322d9a1210aea64e985

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                Filesize

                                                                504B

                                                                MD5

                                                                cab9b8991880f772d9dc910e990bfda7

                                                                SHA1

                                                                33371b3bcb13b23af55321ee23a2d61280e97cc7

                                                                SHA256

                                                                110500659a8b09203c54b2411ac3b3813e583666818c94a821a130d59cf97e10

                                                                SHA512

                                                                ca35fed6d4bae4b4402997b1d837f5eb1e2e758ff626220496535a2699c4e537e8eb694a6cb92565ffc62241c8c8e182c7cbad3e0e6914531c12bc18d42cdd19

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                Filesize

                                                                168B

                                                                MD5

                                                                f2f75f382fd337a7bcb2606889cd2ad2

                                                                SHA1

                                                                7ef8e09500e42e132aaae51cda18f12827a34b98

                                                                SHA256

                                                                5616b5639111f05b84fa520da8137ac7948cf25920054fe74fe89f312f4e52b7

                                                                SHA512

                                                                8ac023f4363327911bc21128edf836c96d396ee06603be48c54750a019b4f6ef03c30ab929d9d9e2e52becef71677c36292d4f343cb9c10d2fc8cc805ff46f96

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                                                Filesize

                                                                264KB

                                                                MD5

                                                                fbfd9284824bf327496fbc15c093b355

                                                                SHA1

                                                                1ba81538f5a9095ab0a42a8d0ce6a0ff4eef7c68

                                                                SHA256

                                                                e92d6336527e79e25400f1fd9460b6a1aeb6be38cdd3f4831ac14d0135311cb0

                                                                SHA512

                                                                aef31d7280aeaefb2eb549ef2e25f6d1d83158a61f554df0028a5c21c03b2cf7567340007d1f2e8e30abcd5d37cc5c902473a30205eafb15fc75585cb954754b

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json

                                                                Filesize

                                                                851B

                                                                MD5

                                                                07ffbe5f24ca348723ff8c6c488abfb8

                                                                SHA1

                                                                6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                SHA256

                                                                6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                SHA512

                                                                7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json

                                                                Filesize

                                                                854B

                                                                MD5

                                                                4ec1df2da46182103d2ffc3b92d20ca5

                                                                SHA1

                                                                fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                SHA256

                                                                6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                SHA512

                                                                939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                Filesize

                                                                4KB

                                                                MD5

                                                                efc3991d535335cd4dce61876fccc999

                                                                SHA1

                                                                bef5beab0f065238dcaa71d90f99260164a526b4

                                                                SHA256

                                                                1a4490851bb3b944ca1d3af348c3583de587654ac50372f8e92d37b155f39e7a

                                                                SHA512

                                                                ed2bd33535e9b6edc89d55c22c8066946b071bf0e93e61672eb76b17ff8500c6b1bcdf224f07afbe7c890b5105d4b2bb32e5bc19311108aa9ade79c89b5e738e

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                Filesize

                                                                3KB

                                                                MD5

                                                                5fc1e01697dfcef8a84355b8b41f8512

                                                                SHA1

                                                                f9d1b517a67284767aa237871e0c5021638de4f9

                                                                SHA256

                                                                5d60f2d712f12dcedcd340f78f9d9830f31f095bb65654780a33ad875c592828

                                                                SHA512

                                                                2a74e1fa8e23bcba7da0968b76a923911bed5372addce861aa3f0718e4fe8749822ef2706b1f44b0f4cb788033ec810ddebc32cfc7f01e2cf7a036617c43bd59

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                Filesize

                                                                2B

                                                                MD5

                                                                d751713988987e9331980363e24189ce

                                                                SHA1

                                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                                SHA256

                                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                SHA512

                                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                Filesize

                                                                356B

                                                                MD5

                                                                f17070fbfe7a81a1bae63f48b0569d48

                                                                SHA1

                                                                9bdc2f4bf2eb6bfa9992d204a7299631c8ee9a43

                                                                SHA256

                                                                dfed548d9bfd3dade84df359ed9b145ad1b6523b838076cedd00b51da13288b0

                                                                SHA512

                                                                e36a0a0025b14f9dc5e3b285588fbf1ec056274db6a8abb1933d918ea27a384f1196fdccf0c3395a1c8f5978c97b5ae1b7c0b1d2f0d4e203128e9e908fb07084

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                Filesize

                                                                356B

                                                                MD5

                                                                838d82ac534cd3b5e1e4032528e9d11b

                                                                SHA1

                                                                a93d72a2e89fa35722f9b446211ee52d36574ce1

                                                                SHA256

                                                                af86f93c9eac2bbdf324668700ce1529d6f388f2c09edfb20b5bc00930e6b278

                                                                SHA512

                                                                976692feee73cc91fa3c09894c4fbb029c06f2df19ed155ce956e93311fb23fe95e57a708c8c483b883bddb194ff1881e4249c9a2682edfc81f3bd245d33f2df

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                7967f30e8c1bf9bc5b9d4b41fa66504f

                                                                SHA1

                                                                0ba1c6c03c1a3a0f878c305a71c2a4b218253a3c

                                                                SHA256

                                                                a9031667910fb03d8181704e8e762d6a30d803d05f106c0d4c990c1cb7e09b71

                                                                SHA512

                                                                55f5818303f7dde4ae4c6145bbbfa8133c7b4385fe0134c396f5670a120fa032b68af2a1ef8032269e0ee83d2b0c979b8aae4c6e79b38d6e5902c5fa4d753e21

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                145a8929871901566c50cdee1aa6085b

                                                                SHA1

                                                                30a8aadca5e61b0b5b425a31755970fd3189d813

                                                                SHA256

                                                                6acded2cca318dc81bf17c3672a77359b72f6d9e4f07eed24fd5b6a6eb051875

                                                                SHA512

                                                                0d72e2ed80514bf685549fe8d24a9d7a07c01ef74a85d03860432fb4e4437a67719f774de36b7e2aa2dac06d2ab3de972538f4d33082d1cc372d791a03b4f8e4

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                40f528c75aeeb2af3e7fe8587871ba8e

                                                                SHA1

                                                                19fed147ec0f1dfb6952f24b4aa15378e95b88c9

                                                                SHA256

                                                                ded5fec9a3c66c62cbffcdd404fe4e85a74888203d904697143c685c58815059

                                                                SHA512

                                                                cb089cd20e915e1bb6bf1c82630d2edf2549ef0cce609e3d53e5744b68dcac6b044f9ec09e9c8b6a03bc967a2670ec8b0b4bf61ef5cb5aba933a1b66966ee136

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                56ac7278938e51f5be664ffc9200afad

                                                                SHA1

                                                                d5c6c7fe781147c3ffcdc8d378064b697c8321d9

                                                                SHA256

                                                                6e0af49619a7ef17d80018f0b14a120eec3c4d8493eb2faf1134d66668bd4a6f

                                                                SHA512

                                                                3a86db3a3cfef9872f90c15d1871668402072746543138d80aa179e2589dd562b3f78726ea145cb4bec4579eda35145eea50d7bebf7815d57043a4219e270d14

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                63adea803fa3377dd8dce76cc1817265

                                                                SHA1

                                                                f3594f75f2117fd683b18ade6f466def0685da89

                                                                SHA256

                                                                4ea05ce5d7f5f356a346d2c4132fabc47a66ad5525193ea18cc00bf7c6284521

                                                                SHA512

                                                                066b1533d814d4ea256ac10996d279ab830ad39d6e43dcaa072a8d8655be05a013d43890b551af42539c63117a0dc0ebdfb278abc2266086bd92f2c17936b165

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                b17cb5846ce9ac32082ff7c9a573ff09

                                                                SHA1

                                                                855012415f253f8d6b10911a1568873515a2b7a8

                                                                SHA256

                                                                545de9e10948f79c31217d6aec70c1186604daad5ed9ed2d76e53876492344be

                                                                SHA512

                                                                e6ad7a37432d05ddbd5e9c774e9b8bc73b7e98a88c68dc99ae7abf76116acbdaa9bf85df1176024174ffd5655f550e21946b6cfae40b28e6053b08f38759304a

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                9dc6b75ac9e220553f57b046236e17b3

                                                                SHA1

                                                                216a89ed30fbfb875c3cf99aabf31e626d4a25cc

                                                                SHA256

                                                                59406fbfd3adb358a7bb4ba4d48ae8d2f3ef5e9c01d8c4638cd8a5f7540b3201

                                                                SHA512

                                                                1528d96fa88fe6f795bd85215d2ee188bed7ae9949bbd2de7d1e5faf1665b4d08ea281834a05a6cfdb31ec839857cc0c5795185c132098f3528c179cc4cc5e47

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                fa7b9e8ada657289af2fbfe9cd1d5403

                                                                SHA1

                                                                b4b788c889baf438aa35a6ed0b961082cd5fa84c

                                                                SHA256

                                                                34fe1d1cb2e36b0f7d8225ad01d83c91f2953a3a02b57c732e2e1c6cf4fedb3f

                                                                SHA512

                                                                0d66027ead68ac5376a4ed012cf78102979dceeec99df40c4719298bd159130da2e795702bcdb637a5ffc1b41f41bd484a7c0cd6559726daeffe2b0c48fd46f1

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                Filesize

                                                                15KB

                                                                MD5

                                                                df48926b06e87f53c4265ccb2ea15d9d

                                                                SHA1

                                                                9f5087f7deacfb5018bf718d26dc91a3466db0cc

                                                                SHA256

                                                                5b5b624530f975fa77cfc46503a7c142e5ea11e74e7cd71dca339624a434e64d

                                                                SHA512

                                                                2197e7dfa641cba1881fa12d849112ccc45562377566e3f6063569faa94b708d1c64973b3ed087df35527e663d14cbe31eb6a2178605db25ec9d07cc55024478

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                Filesize

                                                                72B

                                                                MD5

                                                                a852af9b2bb0da98d5fb7dc9a5bb341a

                                                                SHA1

                                                                f4f7f7aa808df568866312d01154b182493baa61

                                                                SHA256

                                                                5311f310a21e94c565c94d409fe692826485ea68dcb26c1aa3c6bfac78756dd9

                                                                SHA512

                                                                eea49500b769db6900f6a1fe04dc11de24eb835c44aeb183011990e36a26e23ef8e9a50df1a8319cf4d87989f1fe16f67b8df0579e3462252abd05b8183f6ba1

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                Filesize

                                                                233KB

                                                                MD5

                                                                1d11a86b4ee387361827c394ee0ef9df

                                                                SHA1

                                                                13b834a89f23478332f5e887e8a65979cf483f26

                                                                SHA256

                                                                229e139fe977f282fa1311866fcf65f523aefa92287fa302d24c3d4692bf262d

                                                                SHA512

                                                                3eacdcddf1f9f58d099eb4cc41f36a98f0df2564391d3c7e7e7610694f514c6640942f6864f7c98d0bb1f98f0a3c5bf3f818adc4499d856d7b3c0119f3377dd2

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                Filesize

                                                                233KB

                                                                MD5

                                                                d53331c914ba1b1a04cf6b9a8b82f69c

                                                                SHA1

                                                                a284f4f1024a575f7d6e50a33b60e5004147bbf3

                                                                SHA256

                                                                6da5c54aa7c4a92b8ec5e257587681667839466b48917d076e947d6c70219586

                                                                SHA512

                                                                3503fe819fe1d57ec6376e284e74bb91626dd5a58a58c56e051f99db3d43e67e2371184b1075aabb4487a1aec39179379857470f4416d488d85cd074a802835f

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                Filesize

                                                                233KB

                                                                MD5

                                                                dfb35bec1d4791f5de4b642b84835b2e

                                                                SHA1

                                                                8fc2bdba5bec30905df5369e8cc4efbc8271d41c

                                                                SHA256

                                                                e176c4d0f79db069846685f7446be73c0efd839db056da6daa1a9157df6a3578

                                                                SHA512

                                                                185542085763cd9a1e952615ca1499b5b665fac7b157e65a01f66068ce5fc8c4d12564b55243425d579a651803a33280873d771dd0c974cf05459ac27db3aa4b

                                                              • C:\Users\Admin\AppData\Local\Lossless Scaling\Settings.xml

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                45fed0a3bcbc889ca99d0c5943210e7e

                                                                SHA1

                                                                602584366a413cb9ae459b6c3231190cd787241e

                                                                SHA256

                                                                9812fe8104a86e693d6baa02a4cdb56ea9a4aedb500b050346eb5ec6bda8dd09

                                                                SHA512

                                                                d0728fcce9484daedb2c9552ee2a818f7cccbeb1e9bca24a1c4fc1ca6e8c181c46cdc89670bfee3d6ad219ea6f69750bd03f776af4f9e4667872c66c11dbd255

                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                Filesize

                                                                3KB

                                                                MD5

                                                                22e796539d05c5390c21787da1fb4c2b

                                                                SHA1

                                                                55320ebdedd3069b2aaf1a258462600d9ef53a58

                                                                SHA256

                                                                7c6c09f48f03421430d707d27632810414e5e2bf2eecd5eb675fecf8b45a9a92

                                                                SHA512

                                                                d9cc0cb22df56db72a71504bb3ebc36697e0a7a1d2869e0e0ab61349bda603298fe6c667737b79bf2235314fb49b883ba4c5f137d002e273e79391038ecf9c09

                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Font.exe.log

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                28df963c88836df10a200a7f3ddcdaf2

                                                                SHA1

                                                                12c9058ad17a0a186021a145aad09fd32bb8fa2c

                                                                SHA256

                                                                d61f44cb34af871284be7ca4dec205a1bf8ca747b2efbdb84a14e7df0ae3e85f

                                                                SHA512

                                                                6c55ee17008aad1bec0abfd8ad48d5d86b3d371b62eed0418a1351ac1c747a1226fdb3edb46480d6da4bab9c7dab3a05bc8958cc7e83cfe00419afb7531cefff

                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                d510101d762853a1c033e19eb253f870

                                                                SHA1

                                                                bde1903603cff38036b19ebf191c28fd3d132ba3

                                                                SHA256

                                                                29849c3b829d5b4d6f075e16ba2668660c85310283764d492f39299d01beaa45

                                                                SHA512

                                                                b06e45d8a9e56b1f1de90d9f16160f57b43b8d57ea5fe3df716af9f6c93c73a17ca2932d38b4ce9909d36c22165842c6c3b039b8f02e39d10714a4a34c05ebce

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                Filesize

                                                                60KB

                                                                MD5

                                                                535b473ec3e9c0fd5aad89062d7f20e8

                                                                SHA1

                                                                c900f90b3003452b975185c27bfb44c8f0b552c4

                                                                SHA256

                                                                f6bb190101537e41901392fb690045c5bf1cddaa954630e57c5d0b3410b2d6b0

                                                                SHA512

                                                                33f286b06e9198ca8ae5225c7796f0f176282e2386fa93a2450e1a65cdb235932ef8a0a778f6b16945f1496a5e12e3ba6e3905f02a47a9cbb92e14448f463c86

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                Filesize

                                                                17KB

                                                                MD5

                                                                fe3af48bbe4012ad58189dc7b0d6a23f

                                                                SHA1

                                                                7be4fb1bd368d0bc7304a99859c681acadcd40b2

                                                                SHA256

                                                                da6d20b17234fbf8b307f71d68320c9c6a4217de2858ecced896f7061fe6b04b

                                                                SHA512

                                                                603921ae68a9024728900370c4fab38e419ffdb42c0930d96535e4f96c3d5cc2cbc89aa08d23d987e4b75ddcd5730be93cdc28d8bb494a7ef5f41a630deaa4fb

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                9a1972cedc8581e6862f0b66c44fa78c

                                                                SHA1

                                                                a315e497c5f19c395a540fed5c6329ddeb155d83

                                                                SHA256

                                                                0aae05d217365a553a07ef85ad12f62897fdf65ac03e9e2c9fdfa6cca1f62b7b

                                                                SHA512

                                                                886df7ef6f4a8ed6f5ca26bd6e10f9049e46aeec979c0fbd86e4aad7d62bddcdc7f87f641504e2857083a419f0279330dcb1ab992620d9232e69a19232de7a7a

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                Filesize

                                                                20KB

                                                                MD5

                                                                08f71178869ee5a814a0b781948809b9

                                                                SHA1

                                                                22fed7d8479eec92a7187f986583f1ffad9da472

                                                                SHA256

                                                                591696e89738af5d54d5f17c7e7ca44255609d16897e51871b80506940ce54b0

                                                                SHA512

                                                                1149894fba930f849e6c98a7f3e7116c5f2e407273f19a2385651c35ed795f1ed1276055454e85b2d300f712f2c686f5f1c8bfd5f362421cc5d9d08300e26b9d

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\esentutl.exe

                                                                Filesize

                                                                156KB

                                                                MD5

                                                                6981d94fbcc31ca50551300f5b4a96a3

                                                                SHA1

                                                                e38b3a74f2951f5480fb67acc75d41f3e2b4f70e

                                                                SHA256

                                                                8c19a90379611efc39c3e96529de2e82a99e3e049d36ef6563ec975836e47811

                                                                SHA512

                                                                b94e87c641009ab8206c91ede3e35ab3b65a94fa3be5f4ce7c8a2b17af018f03801086c850427f4d51f4867a3d0a85aaf58ece9fd7f6a36f68df29da430c8d5d

                                                              • C:\Users\Admin\AppData\Local\Temp\7zEC322F2A7\lossless scaling\Registration ('Crack')\Data\en-US\Lan.vbs

                                                                Filesize

                                                                432B

                                                                MD5

                                                                49af07d132592c9a62eaaef421e3e589

                                                                SHA1

                                                                cb7cc0a4a492dba5773506e816467975cabdc227

                                                                SHA256

                                                                487985d63734cd4828eaf03284e0d1d2fa684afc2d46da489c99d498f31a83ab

                                                                SHA512

                                                                7525522f2b648aaf94e52fd1c1787931c11ca03e656ccbcca5879d6132d383aa40228256cbf93d0e7741f0003de6fe94ca537151a2162d33c077943b90fe5908

                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_poi1u1gq.xli.ps1

                                                                Filesize

                                                                60B

                                                                MD5

                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                SHA1

                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                SHA256

                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                SHA512

                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                              • C:\Users\Admin\AppData\Local\Temp\ppnzwg.exe

                                                                Filesize

                                                                628KB

                                                                MD5

                                                                1d53f5a867dd69486834f81a7a490a2d

                                                                SHA1

                                                                4154fe5c8e4b1a6141c8ea21b9f1a13ed7a4d91c

                                                                SHA256

                                                                f804e0bf63f75b3a11c182054a8f02d4f9d2fb182c3a49b105dece388d8d06a1

                                                                SHA512

                                                                769c1e9d9ab34bbd6ff3a0ee06d8e21a64e47861712bf92644a7f9f8d1b035dcf148a6d5d92da16ed82c720b0366e26fb93a0fef91e12a70c1790514bf2fe5c1

                                                              • C:\Users\Admin\AppData\Local\Temp\scoped_dir4116_1964030473\CRX_INSTALL\_locales\en\messages.json

                                                                Filesize

                                                                711B

                                                                MD5

                                                                558659936250e03cc14b60ebf648aa09

                                                                SHA1

                                                                32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                SHA256

                                                                2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                SHA512

                                                                1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                              • C:\Users\Admin\AppData\Local\Temp\scoped_dir4116_1964030473\dbdc59fe-d8ae-4180-a60e-5ad113c63072.tmp

                                                                Filesize

                                                                150KB

                                                                MD5

                                                                14937b985303ecce4196154a24fc369a

                                                                SHA1

                                                                ecfe89e11a8d08ce0c8745ff5735d5edad683730

                                                                SHA256

                                                                71006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff

                                                                SHA512

                                                                1d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c

                                                              • C:\Users\Admin\Desktop\lossless scaling\Crack.bat

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                1f5ea98d27f9d4dfe7da57a12ab5cfb7

                                                                SHA1

                                                                2565fb81fe31c17562106ab046f9d8a8f1d0b3c5

                                                                SHA256

                                                                9dba4747cdba2b31fbbcd2c30ef3c71d2e63ae01a8cd1765d385d065bafa21e5

                                                                SHA512

                                                                3e35d5d4d2212376eeed7be09aaeb6ed200d644ef50122f586a51f130d027f3e54f7af9bd14ba184a0ffe4a13f4cb4dff9e5da776df24f7b710f665aece3dfe4

                                                              • C:\Users\Admin\Desktop\lossless scaling\__HOW TO CRACK.txt

                                                                Filesize

                                                                98B

                                                                MD5

                                                                9c4ab595a2ecb89dbc666edd4f8565ac

                                                                SHA1

                                                                7e28dcef344d9635ddc5f06e2fb4b2c0660d9f84

                                                                SHA256

                                                                23f61c16e154600af239fd1a37522d10d09e1119a59aabf5ddd838aae3d4e781

                                                                SHA512

                                                                a1cdc5ccf499ccd813a6cbbaae3b00fb41b0c3e6c72af1c36d9181bb26feaf994d345d4add6fcc2135723058393018f759e76ea0cd97ce6099d68e7a3ab2925b

                                                              • C:\Users\Admin\Desktop\lossless scaling\language\en-US\EN.dll

                                                                Filesize

                                                                181KB

                                                                MD5

                                                                a435e2fb659a3596b017f556b53fa09d

                                                                SHA1

                                                                c9ab6229bf239edac73593e0ffb53c1d9bb21686

                                                                SHA256

                                                                e7f03b61cff5526877ea3f26f613caf5dbdf9006d49b98c906de3051067d7512

                                                                SHA512

                                                                aa3fa16420e66bcdff349ba66791d7849a67d2ae720fdca4b3674ce2a8bffd7a1caae1a306c6533446950b0f8798d6cf7e37ec78ea199252028870fbc742f495

                                                              • C:\Users\Admin\Desktop\lossless scaling\language\en-US\RAR.exe

                                                                Filesize

                                                                629KB

                                                                MD5

                                                                d3e9f98155c0faab869ccc74fb5e8a1e

                                                                SHA1

                                                                8e4feaad1d43306fdd8aa66efa443bca7afde710

                                                                SHA256

                                                                3e0fdb5c40336482dacef3496116053d7772a51720900141b3c6f35c6e9b351b

                                                                SHA512

                                                                2760c139ef276f406770675d89fb667f3369a9e1943a6eff2c18f391114018ad6fdce9daf0b499b18081ef22243ef04d74ff21cbd346eb31a1ddbcb79756697d

                                                              • C:\Users\Admin\Desktop\lossless scaling\language\en-US\UK.dll

                                                                Filesize

                                                                5KB

                                                                MD5

                                                                3fffc04611766c3d49b9f0b74752a2b5

                                                                SHA1

                                                                c70e6e3b2cd315e900f6dfdd5828cbf75b903fe5

                                                                SHA256

                                                                7537dd03a875384bc79a7a21811e06ca97de3571631fc20b4b86b26baaafad9d

                                                                SHA512

                                                                3ded3c5712f93eaa75fc9fe9469a02ece5996b6574d63b7b3a5db86db74762631e35aacae519ea3d23862bdaffab5e786696eeb812b0d1ce7f14b78f4539b4d8

                                                              • C:\Users\Admin\Desktop\lossless scaling\language\en-US\diagerr.xml

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                745601838cf36959979026b989301020

                                                                SHA1

                                                                05dc016fe37f9b6c3a509cbed5dcb4d6c9f2874a

                                                                SHA256

                                                                06ba94ccfaeb67ce5dee06fc00ce3f1242649ee666c1097952b437052d0fd906

                                                                SHA512

                                                                1d0479604e2296361b29857155ab1d1bc4e9e3aa289891ae6148602b1d0f27f72ace6ef1d7c96f7e851a4d9122132f14406fa29a08823d61781a970e566eff58

                                                              • C:\Users\Admin\Desktop\lossless scaling\language\uk-UA\Lossless.dll

                                                                Filesize

                                                                4.3MB

                                                                MD5

                                                                7969a2cbc4c31ccfb1ab8213f19501b9

                                                                SHA1

                                                                06a24af6e922ba2cd7fccb76ce2f43271a9af8b6

                                                                SHA256

                                                                486a48562504a274e984599a5931de200ea73bf6bc4c83bf6ca8daa651e80a68

                                                                SHA512

                                                                935988a39c1af479e971850f6758ee94098b35f173da609206312deeabeb3bc9466f93d1dad4e6d7938235f65fc52fdbd56058d46c1ba775d31718358eb6d8fa

                                                              • C:\Users\Admin\Desktop\lossless scaling\language\uk-UA\LosslessScaling.exe

                                                                Filesize

                                                                953KB

                                                                MD5

                                                                2c98d33096e97094cbbbd19f27f40883

                                                                SHA1

                                                                7e28af9d119d2658f962e3b28140c6081be1612b

                                                                SHA256

                                                                010ac1120a88a772e87d9e9018aa5db034a9bac9399803d4a7c4db3c47a71df6

                                                                SHA512

                                                                f9070ad6b2e3295fdde13aa8d7486147a7f9a675a924ad3bf117479baf5b573cf92650199e58378dd8345a28ab890bbd5021d374030c24836bfa65bb037dddc7

                                                              • C:\Users\Admin\Desktop\lossless scaling\language\uk-UA\LosslessScaling.exe.config

                                                                Filesize

                                                                174B

                                                                MD5

                                                                2a2df45a07478a1c77d5834c21f3d7fd

                                                                SHA1

                                                                f949e331f0d75ba38d33a072f74e2327c870d916

                                                                SHA256

                                                                051099983b896673909e01a1f631b6652abb88da95c9f06f3efef4be033091fa

                                                                SHA512

                                                                1a6dd48f92ea6b68ee23b86ba297cd1559f795946ecda17ade68aea3dda188869bba380e3ea3472e08993f4ae574c528b34c3e25503ee6119fd4f998835e09d7

                                                              • C:\Users\Admin\Desktop\lossless scaling\lossless scaling.exe

                                                                Filesize

                                                                11.8MB

                                                                MD5

                                                                092460c7467a00ac569818847caaac73

                                                                SHA1

                                                                bc27c4d36007ea4a7e7f588e426277f600087d93

                                                                SHA256

                                                                9cf085b74639d2940656062cb3ed55ec769a4c2683bf69ac5cf8274912b17b47

                                                                SHA512

                                                                6ccc937e2473788511e9884387aa734bd41b1492a4db894682e85cf055abd120c728e414373838829ea627f2e435d7ac7f2b2eb69ec46b468cb99e8cc46b1821

                                                              • C:\Users\Public\IObitUnlocker\BR\Font.exe

                                                                Filesize

                                                                434KB

                                                                MD5

                                                                68c9ee084cc409309b116ec6aea890a8

                                                                SHA1

                                                                efd6aab18a08a63b146ad587d1fa08e0bb19bebc

                                                                SHA256

                                                                ef2cbfdfdd874c6c3ea11223b369fbd5f155d20c680ae1e59ac74e6f1bb74a9d

                                                                SHA512

                                                                9809477d42df7bbbaea04da5eda4a4f2ae3114b33541a4efd7003bab339d1c6ddf2f9a61b2ba781c0f5de82b030859c8ac76cbe697b296046227c1dc6b547a25

                                                              • C:\Users\Public\IObitUnlocker\Loader.vbs

                                                                Filesize

                                                                308B

                                                                MD5

                                                                2993b76e0b0ba015caf654881638a0c0

                                                                SHA1

                                                                7fbd5f28fb2f6f948cbeb3c4dd5b0672bdfe4bcd

                                                                SHA256

                                                                0e131f595ef67c160de9727d9a92a84b50393e66dd242f330736b916e1bf20a3

                                                                SHA512

                                                                a61e0e7f92f0d78c27939ba21bdda6ff97503adc44e42a4b7eab3c4c1bea8acad4517b90db3430cabc237c2db01e60ab3a2a78e237ae01a896bd09aabba067cb

                                                              • C:\Users\Public\IObitUnlocker\RAR.exe

                                                                Filesize

                                                                629KB

                                                                MD5

                                                                b1365a4dbc2f877d4421391e166e2e0b

                                                                SHA1

                                                                35cd2cee7f4fd1f4715863e065c26fa9c4f6ddb4

                                                                SHA256

                                                                51a7a70cddd535b1436d5cd9d5f50aaca0be0f657924cfdd522d6bbf24c7778d

                                                                SHA512

                                                                a13ee2d121710e248166421ffbd16fb1ef00aff8c57066932094ee8b6d547b1fd28e806715659cf0bceddea23efb465e967a3e35f1e9c3a878ad608b3b45bab7

                                                              • C:\Users\Public\IObitUnlocker\RU.dll

                                                                Filesize

                                                                327B

                                                                MD5

                                                                83bf9ba8becac139cb05c1ab68468e62

                                                                SHA1

                                                                8fab7c51fb2a340af6ed6cd03e1c546479e14239

                                                                SHA256

                                                                7bfd69bdd83904d39a4e09c55fe6e380f027a2f13593c167acf92160bb9cf125

                                                                SHA512

                                                                b3f19d613db7067cfc87c6c7e341f189c99fe1849ee67f18b4b63d65b6299612cd1c935fb713f274dfaf837b5dee17bde20f04e8682f85d75f42b1838ee04f04

                                                              • C:\Users\Public\IObitUnlocker\Report.ps1

                                                                Filesize

                                                                457KB

                                                                MD5

                                                                dd3f962ccc2f5b5f34700307e35138f8

                                                                SHA1

                                                                90d80df0ef716260a7d4ed466cf40caf966f0969

                                                                SHA256

                                                                e273b5a8cf3d3d37ff676251aa4f41e3726b45b3280f8bf84bf618ca05cca9bb

                                                                SHA512

                                                                619fba6cd9b8aae26db23f9cbd6db4870f969abd198d3fe8551703a1e2c46a9d1fd861f7b9462d82581b322209795c1e00762ebe31e0a1383c8a10df8e4a9eae

                                                              • memory/244-340-0x00000256F4DD0000-0x00000256F4E83000-memory.dmp

                                                                Filesize

                                                                716KB

                                                              • memory/244-352-0x00000256F4B70000-0x00000256F4B7A000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/244-353-0x00000256F4AE0000-0x00000256F4AEA000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/244-351-0x00000256F4B60000-0x00000256F4B66000-memory.dmp

                                                                Filesize

                                                                24KB

                                                              • memory/244-350-0x00000256F4B30000-0x00000256F4B38000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/244-349-0x00000256F4B80000-0x00000256F4B9A000-memory.dmp

                                                                Filesize

                                                                104KB

                                                              • memory/244-348-0x00000256F4B20000-0x00000256F4B2A000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/244-344-0x00000256F4B40000-0x00000256F4B5C000-memory.dmp

                                                                Filesize

                                                                112KB

                                                              • memory/244-342-0x00000256F4B10000-0x00000256F4B1A000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/244-339-0x00000256F4AF0000-0x00000256F4B0C000-memory.dmp

                                                                Filesize

                                                                112KB

                                                              • memory/3020-347-0x0000000001DF0000-0x0000000001DF6000-memory.dmp

                                                                Filesize

                                                                24KB

                                                              • memory/3020-341-0x000000001D2D0000-0x000000001D79E000-memory.dmp

                                                                Filesize

                                                                4.8MB

                                                              • memory/3020-330-0x000000001CD50000-0x000000001CDF6000-memory.dmp

                                                                Filesize

                                                                664KB

                                                              • memory/3020-343-0x000000001D840000-0x000000001D8DC000-memory.dmp

                                                                Filesize

                                                                624KB

                                                              • memory/3020-345-0x0000000001C80000-0x0000000001C88000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/3020-8725-0x0000000001E60000-0x0000000001E6C000-memory.dmp

                                                                Filesize

                                                                48KB

                                                              • memory/3020-346-0x000000001DA30000-0x000000001DA7C000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/3044-241-0x000001CBF4000000-0x000001CBF4038000-memory.dmp

                                                                Filesize

                                                                224KB

                                                              • memory/3044-242-0x000001CBF4830000-0x000001CBF4838000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/3044-244-0x000001CBF4750000-0x000001CBF475E000-memory.dmp

                                                                Filesize

                                                                56KB

                                                              • memory/3044-215-0x000001CBEF0E0000-0x000001CBEF1D4000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3044-239-0x000001CBF4080000-0x000001CBF413A000-memory.dmp

                                                                Filesize

                                                                744KB

                                                              • memory/3044-237-0x000001CBF3F10000-0x000001CBF3FC2000-memory.dmp

                                                                Filesize

                                                                712KB

                                                              • memory/3044-218-0x000001CBF1910000-0x000001CBF1936000-memory.dmp

                                                                Filesize

                                                                152KB

                                                              • memory/3044-219-0x000001CBF1710000-0x000001CBF1718000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/3044-220-0x000001CBF1720000-0x000001CBF172A000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/3044-217-0x000001CBF1830000-0x000001CBF1916000-memory.dmp

                                                                Filesize

                                                                920KB

                                                              • memory/3388-301-0x0000000005090000-0x000000000512C000-memory.dmp

                                                                Filesize

                                                                624KB

                                                              • memory/3388-300-0x00000000006D0000-0x0000000000742000-memory.dmp

                                                                Filesize

                                                                456KB

                                                              • memory/3388-303-0x0000000005360000-0x00000000053B6000-memory.dmp

                                                                Filesize

                                                                344KB

                                                              • memory/3520-436-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-467-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-3010-0x0000028FD3B30000-0x0000028FD3B84000-memory.dmp

                                                                Filesize

                                                                336KB

                                                              • memory/3520-3009-0x0000028FBB1D0000-0x0000028FBB21C000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/3520-400-0x0000028FB9470000-0x0000028FB9512000-memory.dmp

                                                                Filesize

                                                                648KB

                                                              • memory/3520-402-0x0000028FD3A30000-0x0000028FD3B28000-memory.dmp

                                                                Filesize

                                                                992KB

                                                              • memory/3520-452-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-3008-0x0000028FBB170000-0x0000028FBB1C6000-memory.dmp

                                                                Filesize

                                                                344KB

                                                              • memory/3520-459-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-414-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-468-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-464-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-445-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-460-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-456-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-450-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-446-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-448-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-425-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-462-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-418-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-455-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-409-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-443-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-426-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-470-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-420-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-440-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-439-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-432-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-473-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-407-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-417-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-403-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-411-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-430-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-429-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-405-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-434-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-422-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3520-412-0x0000028FD3A30000-0x0000028FD3B24000-memory.dmp

                                                                Filesize

                                                                976KB

                                                              • memory/3848-198-0x0000000005C10000-0x0000000005C1A000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/3848-196-0x0000000006200000-0x00000000067A6000-memory.dmp

                                                                Filesize

                                                                5.6MB

                                                              • memory/3848-197-0x0000000005B50000-0x0000000005BE2000-memory.dmp

                                                                Filesize

                                                                584KB

                                                              • memory/3848-195-0x00000000004E0000-0x00000000010BC000-memory.dmp

                                                                Filesize

                                                                11.9MB

                                                              • memory/4024-3033-0x000001D97CC10000-0x000001D97CCC3000-memory.dmp

                                                                Filesize

                                                                716KB

                                                              • memory/4500-262-0x0000000006E20000-0x0000000006E42000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/4500-280-0x0000000007B30000-0x0000000007B4E000-memory.dmp

                                                                Filesize

                                                                120KB

                                                              • memory/4500-216-0x0000000003400000-0x0000000003436000-memory.dmp

                                                                Filesize

                                                                216KB

                                                              • memory/4500-221-0x0000000005B80000-0x00000000061AA000-memory.dmp

                                                                Filesize

                                                                6.2MB

                                                              • memory/4500-222-0x0000000005B10000-0x0000000005B32000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/4500-224-0x0000000006390000-0x00000000063F6000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/4500-223-0x0000000006320000-0x0000000006386000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/4500-235-0x0000000006440000-0x0000000006797000-memory.dmp

                                                                Filesize

                                                                3.3MB

                                                              • memory/4500-287-0x0000000008610000-0x0000000008618000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/4500-286-0x0000000008620000-0x000000000863A000-memory.dmp

                                                                Filesize

                                                                104KB

                                                              • memory/4500-285-0x00000000085E0000-0x00000000085F5000-memory.dmp

                                                                Filesize

                                                                84KB

                                                              • memory/4500-284-0x00000000085B0000-0x00000000085BE000-memory.dmp

                                                                Filesize

                                                                56KB

                                                              • memory/4500-283-0x0000000008590000-0x00000000085A1000-memory.dmp

                                                                Filesize

                                                                68KB

                                                              • memory/4500-282-0x0000000007E60000-0x0000000007E6A000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/4500-281-0x0000000007B60000-0x0000000007C04000-memory.dmp

                                                                Filesize

                                                                656KB

                                                              • memory/4500-238-0x00000000068D0000-0x00000000068EE000-memory.dmp

                                                                Filesize

                                                                120KB

                                                              • memory/4500-271-0x0000000070680000-0x00000000706CC000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/4500-270-0x0000000007AF0000-0x0000000007B24000-memory.dmp

                                                                Filesize

                                                                208KB

                                                              • memory/4500-264-0x0000000008AC0000-0x000000000913A000-memory.dmp

                                                                Filesize

                                                                6.5MB

                                                              • memory/4500-261-0x0000000006DD0000-0x0000000006DEA000-memory.dmp

                                                                Filesize

                                                                104KB

                                                              • memory/4500-260-0x0000000007840000-0x00000000078D6000-memory.dmp

                                                                Filesize

                                                                600KB

                                                              • memory/4500-240-0x0000000006980000-0x00000000069CC000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/4680-385-0x0000000005780000-0x0000000005AD7000-memory.dmp

                                                                Filesize

                                                                3.3MB

                                                              • memory/4784-3015-0x0000000007030000-0x000000000703E000-memory.dmp

                                                                Filesize

                                                                56KB

                                                              • memory/4784-354-0x0000000000400000-0x0000000000416000-memory.dmp

                                                                Filesize

                                                                88KB

                                                              • memory/4784-365-0x0000000006F30000-0x0000000006FA6000-memory.dmp

                                                                Filesize

                                                                472KB

                                                              • memory/4784-366-0x0000000006EC0000-0x0000000006ECC000-memory.dmp

                                                                Filesize

                                                                48KB

                                                              • memory/4784-367-0x0000000006FB0000-0x0000000006FCE000-memory.dmp

                                                                Filesize

                                                                120KB

                                                              • memory/4880-395-0x0000000005EE0000-0x0000000005F2C000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/4944-191-0x000002D573F40000-0x000002D573F62000-memory.dmp

                                                                Filesize

                                                                136KB