Analysis

  • max time kernel
    292s
  • max time network
    296s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250207-it
  • resource tags

    arch:x64arch:x86image:win11-20250207-itlocale:it-itos:windows11-21h2-x64systemwindows
  • submitted
    08/02/2025, 15:31

General

  • Target

    random.exe

  • Size

    1.8MB

  • MD5

    5b7618b4200c4288b830a4c0bbe23348

  • SHA1

    5676c7ed0d9203a7ffe9197bae7da5f85c56106b

  • SHA256

    9f7d849e26b45382639da7c45256fbe0963ce63554bb9c8b20dfa9216c9947bd

  • SHA512

    a914c364f053aafb85d4fdaefa9d046a498713d4bf78bf4d0bdb286cc921f6d5160d5a1a7a4f101b46aac4e67e295e7a1a954e9573d95457df7b37a4ab21fd78

  • SSDEEP

    49152:8/08HRt4iYyXvvCLN8ZnysbKFHiY8VnVfut:8/0C+9yyN8EfFCZVc

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 17 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 30 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 59 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3720
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Users\Admin\AppData\Local\Temp\1001527001\alex12312312321.exe
        "C:\Users\Admin\AppData\Local\Temp\1001527001\alex12312312321.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1916
        • C:\Users\Admin\AppData\Local\Temp\1001527001\alex12312312321.exe
          "C:\Users\Admin\AppData\Local\Temp\1001527001\alex12312312321.exe"
          4⤵
          • Executes dropped EXE
          PID:4396
        • C:\Users\Admin\AppData\Local\Temp\1001527001\alex12312312321.exe
          "C:\Users\Admin\AppData\Local\Temp\1001527001\alex12312312321.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2504
        • C:\Users\Admin\AppData\Local\Temp\1001527001\alex12312312321.exe
          "C:\Users\Admin\AppData\Local\Temp\1001527001\alex12312312321.exe"
          4⤵
          • Executes dropped EXE
          PID:1872
        • C:\Users\Admin\AppData\Local\Temp\1001527001\alex12312312321.exe
          "C:\Users\Admin\AppData\Local\Temp\1001527001\alex12312312321.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1888
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 852
          4⤵
          • Program crash
          PID:4404
      • C:\Users\Admin\AppData\Local\Temp\1015307001\goldik12321.exe
        "C:\Users\Admin\AppData\Local\Temp\1015307001\goldik12321.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4740
        • C:\Users\Admin\AppData\Local\Temp\1015307001\goldik12321.exe
          "C:\Users\Admin\AppData\Local\Temp\1015307001\goldik12321.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4932
        • C:\Users\Admin\AppData\Local\Temp\1015307001\goldik12321.exe
          "C:\Users\Admin\AppData\Local\Temp\1015307001\goldik12321.exe"
          4⤵
          • Executes dropped EXE
          PID:2476
        • C:\Users\Admin\AppData\Local\Temp\1015307001\goldik12321.exe
          "C:\Users\Admin\AppData\Local\Temp\1015307001\goldik12321.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2952
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 840
          4⤵
          • Program crash
          PID:4500
      • C:\Users\Admin\AppData\Local\Temp\1016645001\trano.exe
        "C:\Users\Admin\AppData\Local\Temp\1016645001\trano.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1580
        • C:\Users\Admin\AppData\Local\Temp\1016645001\trano.exe
          "C:\Users\Admin\AppData\Local\Temp\1016645001\trano.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2708
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=it --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=4880,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=4364 /prefetch:14
    1⤵
      PID:3484
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjAiIGluc3RhbGxkYXRldGltZT0iMTczODk1NjY0MSIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNDI5MjY4NjIxMDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUxNTIzMjUyNTciLz48L2FwcD48L3JlcXVlc3Q-
      1⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:1292
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1916 -ip 1916
      1⤵
        PID:1376
      • C:\Windows\SysWOW64\wermgr.exe
        "C:\Windows\system32\wermgr.exe" "-outproc" "0" "1464" "1260" "1156" "1264" "0" "0" "0" "0" "0" "0" "0" "0"
        1⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:2652
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjYzMTFCQkYtNjRCQy00QkY0LUJEREEtOUEyRDY3MzM0RTA2fSIgdXNlcmlkPSJ7Q0E5MDlDN0EtRDIxQS00NDQ2LThDM0EtRTBEMDkyRUQ4M0VGfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntFNzJENjgxQS0xN0M5LTQ2NjAtOUI2Ni1BRkJCRjIwRjZEMER9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9Ins1NkVCMThGOC1CMDA4LTRDQkQtQjZEMi04Qzk3RkU3RTkwNjJ9IiB2ZXJzaW9uPSIxMzIuMC4yOTU3LjE0MCIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjAiIGluc3RhbGxkYXRldGltZT0iMTczODk1NjE2MiI-PGV2ZW50IGV2ZW50dHlwZT0iMzIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjQiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUxODAxMzc5MjAiLz48L2FwcD48L3JlcXVlc3Q-
        1⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:3496
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjYzMTFCQkYtNjRCQy00QkY0LUJEREEtOUEyRDY3MzM0RTA2fSIgdXNlcmlkPSJ7Q0E5MDlDN0EtRDIxQS00NDQ2LThDM0EtRTBEMDkyRUQ4M0VGfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9InsxQTg4N0YxRC1CNjYwLTQ1QjYtOTdDRS1FRUQyMUZDMTRDRjd9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTk1LjQzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMCIgY29ob3J0PSJycmZAMC4wOCI-PHVwZGF0ZWNoZWNrLz48cGluZyByPSIxIiByZD0iNjYxMiIgcGluZ19mcmVzaG5lc3M9Ins2RkJBQTk1RC1FM0UzLTQwRkEtQUVCNS0wRUIwMjZENjY4QTB9Ii8-PC9hcHA-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-PHBpbmcgcj0iMSIgcmQ9IjY2MTIiIHBpbmdfZnJlc2huZXNzPSJ7MkIyOUY3QkItN0QwRS00MzVDLUEyQjAtQTU2NzNEQkQwRjhFfSIvPjwvYXBwPjwvcmVxdWVzdD4
        1⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:2440
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4740 -ip 4740
        1⤵
          PID:772
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:4580
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=it --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=5116,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=1040 /prefetch:14
          1⤵
            PID:4760
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=it --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=4396,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=3900 /prefetch:14
            1⤵
              PID:2604
            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
              C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
              1⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:672
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=it --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=760,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=3896 /prefetch:14
              1⤵
                PID:4952
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=it --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=3924,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=3860 /prefetch:14
                1⤵
                  PID:3472
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=it --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=4420,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=4032 /prefetch:14
                  1⤵
                    PID:2148
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=it --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=4400,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=4616 /prefetch:14
                    1⤵
                      PID:4936
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=it --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=4688,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=5580 /prefetch:14
                      1⤵
                        PID:1196
                      • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                        C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2568
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=it --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=5176,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=5080 /prefetch:14
                        1⤵
                          PID:4696
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=it --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=5012,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=5068 /prefetch:14
                          1⤵
                            PID:3660
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=it --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=5068,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=4344 /prefetch:14
                            1⤵
                              PID:580
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=it --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=5164,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=4664 /prefetch:14
                              1⤵
                                PID:3048
                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4960
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=it --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=4628,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=4784 /prefetch:14
                                1⤵
                                  PID:560
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=it --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=4248,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=764 /prefetch:14
                                  1⤵
                                    PID:4844
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=it --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=4128,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=4496 /prefetch:14
                                    1⤵
                                      PID:4516
                                    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                      C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                      1⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2768
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=it --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=5080,i,15733038736122739203,9036323209240097550,262144 --variations-seed-version --mojo-platform-channel-handle=4144 /prefetch:14
                                      1⤵
                                        PID:3160

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                        Filesize

                                        346KB

                                        MD5

                                        521eea3c66e22c0290f372f82891e07e

                                        SHA1

                                        f806cb7e30c5645a976601da86e349e6316db768

                                        SHA256

                                        dcf6cbedceeeebe32212399d804524208e5a9a70e4c3e54dc1ce4f2d0eee679f

                                        SHA512

                                        28444686189e076c1d7c57b6451e6a4bc807bc0d30a7e59bbb8a5a29ff459e4fc62187a1b8eccc317511032ecc0b49da45f16d0f8d52b2cc45198b4bf152c6ff

                                      • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                        Filesize

                                        371KB

                                        MD5

                                        8c1ba146c84a368219e16132a5e98d6a

                                        SHA1

                                        fbe7e2d9ee73147bcd6b43e73bdb0ebf6aa7a26a

                                        SHA256

                                        19c5a51a2270b8c7ca7100bdec043626013884f2335f7171b342674b1079eba1

                                        SHA512

                                        a675d96300a0484d591ed13665e5e5e3a07018f14798cbb8d5841de9063add5d90ab68ade2b7fbbee15b3993373b1e6615d7dfc3ac5871939790cac146614ec1

                                      • C:\Users\Admin\AppData\Local\Temp\1001527001\alex12312312321.exe

                                        Filesize

                                        563KB

                                        MD5

                                        4aa99fad3331371b00eaca12eb716d40

                                        SHA1

                                        dc0dcf92fb24643c925d94c84f665fae02dab9b9

                                        SHA256

                                        6438ceb9af6892efa6ca2f1fa3057d98cb5fcdc029f249194a058b1b5af36e5b

                                        SHA512

                                        2bf15f12c1cd278e2fe35667eb5c2203a32806daca018a04aaddd45019196df44beb3394f55f20e789fcc6ed2de010f731a4776f65e1070e3f578ef830f4f7a0

                                      • C:\Users\Admin\AppData\Local\Temp\1015307001\goldik12321.exe

                                        Filesize

                                        501KB

                                        MD5

                                        c80b4443546055bfdc0f3edc5b88abe8

                                        SHA1

                                        4df4951f787aca9b1fbeafa4590614fa9db9db4a

                                        SHA256

                                        6d15b1a8ef83b775e3a71618c88a2e1b4dbffb8b81afe61552e8af2d77214d64

                                        SHA512

                                        1388114d4cf91a7ae5bc1c37a1caae5e3c17cfd02a2730fa3398582ad8896d8f7a94bf7f730d855cebe9dff1af31abafc3d82e831514a16d5f17333879d5c324

                                      • C:\Users\Admin\AppData\Local\Temp\1016645001\trano.exe

                                        Filesize

                                        19.4MB

                                        MD5

                                        f70d82388840543cad588967897e5802

                                        SHA1

                                        cd21b0b36071397032a181d770acd811fd593e6e

                                        SHA256

                                        1be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35

                                        SHA512

                                        3d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6

                                      • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                        Filesize

                                        1.8MB

                                        MD5

                                        5b7618b4200c4288b830a4c0bbe23348

                                        SHA1

                                        5676c7ed0d9203a7ffe9197bae7da5f85c56106b

                                        SHA256

                                        9f7d849e26b45382639da7c45256fbe0963ce63554bb9c8b20dfa9216c9947bd

                                        SHA512

                                        a914c364f053aafb85d4fdaefa9d046a498713d4bf78bf4d0bdb286cc921f6d5160d5a1a7a4f101b46aac4e67e295e7a1a954e9573d95457df7b37a4ab21fd78

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\VCRUNTIME140.dll

                                        Filesize

                                        106KB

                                        MD5

                                        49c96cecda5c6c660a107d378fdfc3d4

                                        SHA1

                                        00149b7a66723e3f0310f139489fe172f818ca8e

                                        SHA256

                                        69320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc

                                        SHA512

                                        e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\_ctypes.pyd

                                        Filesize

                                        58KB

                                        MD5

                                        6c4d3cdb221c23c4db584b693f26c2b2

                                        SHA1

                                        7dab06d992efa2e8ca9376d6144ef5ee2bbd6514

                                        SHA256

                                        47c6c4b2d283aec460b25ec54786793051e515a0cbc37c5b66d1a19c3c4fb4ac

                                        SHA512

                                        5bdb1c70af495d7dc2f770f3d9ceecaa2f1e588338ebd80a5256075a7b6383e227f8c6b7208066764925fb0d56fa60391cef168569273642398da419247fbe76

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-console-l1-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        07ebe4d5cef3301ccf07430f4c3e32d8

                                        SHA1

                                        3b878b2b2720915773f16dba6d493dab0680ac5f

                                        SHA256

                                        8f8b79150e850acc92fd6aab614f6e3759bea875134a62087d5dd65581e3001f

                                        SHA512

                                        6c7e4df62ebae9934b698f231cf51f54743cf3303cd758573d00f872b8ecc2af1f556b094503aae91100189c0d0a93eaf1b7cafec677f384a1d7b4fda2eee598

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-datetime-l1-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        557405c47613de66b111d0e2b01f2fdb

                                        SHA1

                                        de116ed5de1ffaa900732709e5e4eef921ead63c

                                        SHA256

                                        913eaaa7997a6aee53574cffb83f9c9c1700b1d8b46744a5e12d76a1e53376fd

                                        SHA512

                                        c2b326f555b2b7acb7849402ac85922880105857c616ef98f7fb4bbbdc2cd7f2af010f4a747875646fcc272ab8aa4ce290b6e09a9896ce1587e638502bd4befb

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-debug-l1-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        624401f31a706b1ae2245eb19264dc7f

                                        SHA1

                                        8d9def3750c18ddfc044d5568e3406d5d0fb9285

                                        SHA256

                                        58a8d69df60ecbee776cd9a74b2a32b14bf2b0bd92d527ec5f19502a0d3eb8e9

                                        SHA512

                                        3353734b556d6eebc57734827450ce3b34d010e0c033e95a6e60800c0fda79a1958ebf9053f12054026525d95d24eec541633186f00f162475cec19f07a0d817

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-errorhandling-l1-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        2db5666d3600a4abce86be0099c6b881

                                        SHA1

                                        63d5dda4cec0076884bc678c691bdd2a4fa1d906

                                        SHA256

                                        46079c0a1b660fc187aafd760707f369d0b60d424d878c57685545a3fce95819

                                        SHA512

                                        7c6e1e022db4217a85a4012c8e4daee0a0f987e4fba8a4c952424ef28e250bac38b088c242d72b4641157b7cc882161aefa177765a2e23afcdc627188a084345

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-file-l1-1-0.dll

                                        Filesize

                                        14KB

                                        MD5

                                        0f7d418c05128246afa335a1fb400cb9

                                        SHA1

                                        f6313e371ed5a1dffe35815cc5d25981184d0368

                                        SHA256

                                        5c9bc70586ad538b0df1fcf5d6f1f3527450ae16935aa34bd7eb494b4f1b2db9

                                        SHA512

                                        7555d9d3311c8622df6782748c2186a3738c4807fc58df2f75e539729fc4069db23739f391950303f12e0d25df9f065b4c52e13b2ebb6d417ca4c12cfdeca631

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-file-l1-2-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        5a72a803df2b425d5aaff21f0f064011

                                        SHA1

                                        4b31963d981c07a7ab2a0d1a706067c539c55ec5

                                        SHA256

                                        629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086

                                        SHA512

                                        bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-file-l2-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        721b60b85094851c06d572f0bd5d88cd

                                        SHA1

                                        4d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7

                                        SHA256

                                        dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf

                                        SHA512

                                        430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-handle-l1-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        d1df480505f2d23c0b5c53df2e0e2a1a

                                        SHA1

                                        207db9568afd273e864b05c87282987e7e81d0ba

                                        SHA256

                                        0b3dfb8554ead94d5da7859a12db353942406f9d1dfe3fac3d48663c233ea99d

                                        SHA512

                                        f14239420f5dd84a15ff5fca2fad81d0aa9280c566fa581122a018e10ebdf308ac0bf1d3fcfc08634c1058c395c767130c5abca55540295c68df24ffd931ca0a

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-heap-l1-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        73433ebfc9a47ed16ea544ddd308eaf8

                                        SHA1

                                        ac1da1378dd79762c6619c9a63fd1ebe4d360c6f

                                        SHA256

                                        c43075b1d2386a8a262de628c93a65350e52eae82582b27f879708364b978e29

                                        SHA512

                                        1c28cc0d3d02d4c308a86e9d0bc2da88333dfa8c92305ec706f3e389f7bb6d15053040afd1c4f0aa3383f3549495343a537d09fe882db6ed12b7507115e5a263

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-interlocked-l1-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        7c7b61ffa29209b13d2506418746780b

                                        SHA1

                                        08f3a819b5229734d98d58291be4bfa0bec8f761

                                        SHA256

                                        c23fe8d5c3ca89189d11ec8df983cc144d168cb54d9eab5d9532767bcb2f1fa3

                                        SHA512

                                        6e5e3485d980e7e2824665cbfe4f1619b3e61ce3bcbf103979532e2b1c3d22c89f65bcfbddbb5fe88cddd096f8fd72d498e8ee35c3c2307bacecc6debbc1c97f

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-libraryloader-l1-1-0.dll

                                        Filesize

                                        12KB

                                        MD5

                                        6d0550d3a64bd3fd1d1b739133efb133

                                        SHA1

                                        c7596fde7ea1c676f0cc679ced8ba810d15a4afe

                                        SHA256

                                        f320f9c0463de641b396ce7561af995de32211e144407828b117088cf289df91

                                        SHA512

                                        5da9d490ef54a1129c94ce51349399b9012fc0d4b575ae6c9f1bafcfcf7f65266f797c539489f882d4ad924c94428b72f5137009a851ecb541fe7fb9de12feb2

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-localization-l1-2-0.dll

                                        Filesize

                                        14KB

                                        MD5

                                        1ed0b196ab58edb58fcf84e1739c63ce

                                        SHA1

                                        ac7d6c77629bdee1df7e380cc9559e09d51d75b7

                                        SHA256

                                        8664222823e122fca724620fd8b72187fc5336c737d891d3cef85f4f533b8de2

                                        SHA512

                                        e1fa7f14f39c97aaa3104f3e13098626b5f7cfd665ba52dcb2312a329639aaf5083a9177e4686d11c4213e28acc40e2c027988074b6cc13c5016d5c5e9ef897b

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-memory-l1-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        721baea26a27134792c5ccc613f212b2

                                        SHA1

                                        2a27dcd2436df656a8264a949d9ce00eab4e35e8

                                        SHA256

                                        5d9767d8cca0fbfd5801bff2e0c2adddd1baaaa8175543625609abce1a9257bd

                                        SHA512

                                        9fd6058407aa95058ed2fda9d391b7a35fa99395ec719b83c5116e91c9b448a6d853ecc731d0bdf448d1436382eecc1fa9101f73fa242d826cc13c4fd881d9bd

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-namedpipe-l1-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        b3f887142f40cb176b59e58458f8c46d

                                        SHA1

                                        a05948aba6f58eb99bbac54fa3ed0338d40cbfad

                                        SHA256

                                        8e015cdf2561450ed9a0773be1159463163c19eab2b6976155117d16c36519da

                                        SHA512

                                        7b762319ec58e3fcb84b215ae142699b766fa9d5a26e1a727572ee6ed4f5d19c859efb568c0268846b4aa5506422d6dd9b4854da2c9b419bfec754f547203f7e

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-processenvironment-l1-1-0.dll

                                        Filesize

                                        12KB

                                        MD5

                                        89f35cb1212a1fd8fbe960795c92d6e8

                                        SHA1

                                        061ae273a75324885dd098ee1ff4246a97e1e60c

                                        SHA256

                                        058eb7ce88c22d2ff7d3e61e6593ca4e3d6df449f984bf251d9432665e1517d1

                                        SHA512

                                        f9e81f1feab1535128b16e9ff389bd3daaab8d1dabf64270f9e563be9d370c023de5d5306dd0de6d27a5a099e7c073d17499442f058ec1d20b9d37f56bcfe6d2

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-processthreads-l1-1-0.dll

                                        Filesize

                                        13KB

                                        MD5

                                        0c933a4b3c2fcf1f805edd849428c732

                                        SHA1

                                        b8b19318dbb1d2b7d262527abd1468d099de3fb6

                                        SHA256

                                        a5b733e3dce21ab62bd4010f151b3578c6f1246da4a96d51ac60817865648dd3

                                        SHA512

                                        b25ed54345a5b14e06aa9dadd07b465c14c23225023d7225e04fbd8a439e184a7d43ab40df80e3f8a3c0f2d5c7a79b402ddc6b9093d0d798e612f4406284e39d

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-processthreads-l1-1-1.dll

                                        Filesize

                                        11KB

                                        MD5

                                        7e8b61d27a9d04e28d4dae0bfa0902ed

                                        SHA1

                                        861a7b31022915f26fb49c79ac357c65782c9f4b

                                        SHA256

                                        1ef06c600c451e66e744b2ca356b7f4b7b88ba2f52ec7795858d21525848ac8c

                                        SHA512

                                        1c5b35026937b45beb76cb8d79334a306342c57a8e36cc15d633458582fc8f7d9ab70ace7a92144288c6c017f33ecfc20477a04432619b40a21c9cda8d249f6d

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-profile-l1-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        8d12ffd920314b71f2c32614cc124fec

                                        SHA1

                                        251a98f2c75c2e25ffd0580f90657a3ea7895f30

                                        SHA256

                                        e63550608dd58040304ea85367e9e0722038ba8e7dc7bf9d91c4d84f0ec65887

                                        SHA512

                                        5084c739d7de465a9a78bcdbb8a3bd063b84a68dcfd3c9ef1bfa224c1cc06580e2a2523fd4696cfc48e9fd068a2c44dbc794dd9bdb43dc74b4e854c82ecd3ea5

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-rtlsupport-l1-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        9fa3fc24186d912b0694a572847d6d74

                                        SHA1

                                        93184e00cbddacab7f2ad78447d0eac1b764114d

                                        SHA256

                                        91508ab353b90b30ff2551020e9755d7ab0e860308f16c2f6417dfb2e9a75014

                                        SHA512

                                        95ad31c9082f57ea57f5b4c605331fcad62735a1862afb01ef8a67fea4e450154c1ae0c411cf3ac5b9cd35741f8100409cc1910f69c1b2d807d252389812f594

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-string-l1-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        c9cbad5632d4d42a1bc25ccfa8833601

                                        SHA1

                                        09f37353a89f1bfe49f7508559da2922b8efeb05

                                        SHA256

                                        f3a7a9c98ebe915b1b57c16e27fffd4ddf31a82f0f21c06fe292878e48f5883e

                                        SHA512

                                        2412e0affdc6db069de7bd9666b7baa1cd76aa8d976c9649a4c2f1ffce27f8269c9b02da5fd486ec86b54231b1a5ebf6a1c72790815b7c253fee1f211086892f

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-synch-l1-1-0.dll

                                        Filesize

                                        13KB

                                        MD5

                                        4ccde2d1681217e282996e27f3d9ed2e

                                        SHA1

                                        8eda134b0294ed35e4bbac4911da620301a3f34d

                                        SHA256

                                        d6708d1254ed88a948871771d6d1296945e1aa3aeb7e33e16cc378f396c61045

                                        SHA512

                                        93fe6ae9a947ac88cc5ed78996e555700340e110d12b2651f11956db7cee66322c269717d31fccb31744f4c572a455b156b368f08b70eda9effec6de01dbab23

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-synch-l1-2-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        e86cfc5e1147c25972a5eefed7be989f

                                        SHA1

                                        0075091c0b1f2809393c5b8b5921586bdd389b29

                                        SHA256

                                        72c639d1afda32a65143bcbe016fe5d8b46d17924f5f5190eb04efe954c1199a

                                        SHA512

                                        ea58a8d5aa587b7f5bde74b4d394921902412617100ed161a7e0bef6b3c91c5dae657065ea7805a152dd76992997017e070f5415ef120812b0d61a401aa8c110

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-sysinfo-l1-1-0.dll

                                        Filesize

                                        12KB

                                        MD5

                                        206adcb409a1c9a026f7afdfc2933202

                                        SHA1

                                        bb67e1232a536a4d1ae63370bd1a9b5431335e77

                                        SHA256

                                        76d8e4ed946deefeefa0d0012c276f0b61f3d1c84af00533f4931546cbb2f99e

                                        SHA512

                                        727aa0c4cd1a0b7e2affdced5da3a0e898e9bae3c731ff804406ad13864cee2b27e5baac653bab9a0d2d961489915d4fcad18557d4383ecb0a066902276955a7

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-timezone-l1-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        91a2ae3c4eb79cf748e15a58108409ad

                                        SHA1

                                        d402b9df99723ea26a141bfc640d78eaf0b0111b

                                        SHA256

                                        b0eda99eabd32fefecc478fd9fe7439a3f646a864fdab4ec3c1f18574b5f8b34

                                        SHA512

                                        8527af610c1e2101b6f336a142b1a85ac9c19bb3af4ad4a245cfb6fd602dc185da0f7803358067099475102f3a8f10a834dc75b56d3e6ded2ed833c00ad217ed

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-core-util-l1-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        1e4c4c8e643de249401e954488744997

                                        SHA1

                                        db1c4c0fc907100f204b21474e8cd2db0135bc61

                                        SHA256

                                        f28a8fe2cd7e8e00b6d2ec273c16db6e6eea9b6b16f7f69887154b6228af981e

                                        SHA512

                                        ef8411fd321c0e363c2e5742312cc566e616d4b0a65eff4fb6f1b22fdbea3410e1d75b99e889939ff70ad4629c84cedc88f6794896428c5f0355143443fdc3a3

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-crt-conio-l1-1-0.dll

                                        Filesize

                                        12KB

                                        MD5

                                        fa770bcd70208a479bde8086d02c22da

                                        SHA1

                                        28ee5f3ce3732a55ca60aee781212f117c6f3b26

                                        SHA256

                                        e677497c1baefffb33a17d22a99b76b7fa7ae7a0c84e12fda27d9be5c3d104cf

                                        SHA512

                                        f8d81e350cebdba5afb579a072bad7986691e9f3d4c9febca8756b807301782ee6eb5ba16b045cfa29b6e4f4696e0554c718d36d4e64431f46d1e4b1f42dc2b8

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-crt-convert-l1-1-0.dll

                                        Filesize

                                        15KB

                                        MD5

                                        4ec4790281017e616af632da1dc624e1

                                        SHA1

                                        342b15c5d3e34ab4ac0b9904b95d0d5b074447b7

                                        SHA256

                                        5cf5bbb861608131b5f560cbf34a3292c80886b7c75357acc779e0bf98e16639

                                        SHA512

                                        80c4e20d37eff29c7577b2d0ed67539a9c2c228edb48ab05d72648a6ed38f5ff537715c130342beb0e3ef16eb11179b9b484303354a026bda3a86d5414d24e69

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-crt-environment-l1-1-0.dll

                                        Filesize

                                        11KB

                                        MD5

                                        7a859e91fdcf78a584ac93aa85371bc9

                                        SHA1

                                        1fa9d9cad7cc26808e697373c1f5f32aaf59d6b7

                                        SHA256

                                        b7ee468f5b6c650dada7db3ad9e115a0e97135b3df095c3220dfd22ba277b607

                                        SHA512

                                        a368f21eca765afca86e03d59cf953500770f4a5bff8b86b2ac53f1b5174c627e061ce9a1f781dc56506774e0d0b09725e9698d4dc2d3a59e93da7ef3d900887

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-crt-filesystem-l1-1-0.dll

                                        Filesize

                                        13KB

                                        MD5

                                        972544ade7e32bfdeb28b39bc734cdee

                                        SHA1

                                        87816f4afabbdec0ec2cfeb417748398505c5aa9

                                        SHA256

                                        7102f8d9d0f3f689129d7fe071b234077fba4dd3687071d1e2aeaa137b123f86

                                        SHA512

                                        5e1131b405e0c7a255b1c51073aff99e2d5c0d28fd3e55cabc04d463758a575a954008ea1ba5b4e2b345b49af448b93ad21dfc4a01573b3cb6e7256d9ecceef1

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\api-ms-win-crt-heap-l1-1-0.dll

                                        Filesize

                                        12KB

                                        MD5

                                        8906279245f7385b189a6b0b67df2d7c

                                        SHA1

                                        fcf03d9043a2daafe8e28dee0b130513677227e4

                                        SHA256

                                        f5183b8d7462c01031992267fe85680ab9c5b279bedc0b25ab219f7c2184766f

                                        SHA512

                                        67cac89ae58cc715976107f3bdf279b1e78945afd07e6f657e076d78e92ee1a98e3e7b8feae295af5ce35e00c804f3f53a890895badb1eed32377d85c21672b9

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\base_library.zip

                                        Filesize

                                        1.4MB

                                        MD5

                                        908a4b6a40668f3547a1cea532a0b22e

                                        SHA1

                                        2d24506f7d3a21ca5b335ae9edc7b9ba30fce250

                                        SHA256

                                        1c0e7388e7d42381fd40a97bd4dab823c3da4a3a534a2aa50e91665a57fb3566

                                        SHA512

                                        e03950b1939f8a7068d2955d5d646a49f2931d64f6816469ac95f425bfeeabff401bb7dd863ad005c4838b07e9b8095a81552ffb19dbef6eda662913f9358af6

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\libffi-8.dll

                                        Filesize

                                        29KB

                                        MD5

                                        be8ceb4f7cb0782322f0eb52bc217797

                                        SHA1

                                        280a7cc8d297697f7f818e4274a7edd3b53f1e4d

                                        SHA256

                                        7d08df2c496c32281bf9a010b62e8898b9743db8b95a7ebee12d746c2e95d676

                                        SHA512

                                        07318c71c3137114e0cfec7d8b4815fd6efa51ce70b377121f26dc469cefe041d5098e1c92af8ed0c53b21e9c845fddee4d6646d5bd8395a3f1370ba56a59571

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\python3.dll

                                        Filesize

                                        65KB

                                        MD5

                                        0e105f62fdd1ff4157560fe38512220b

                                        SHA1

                                        99bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c

                                        SHA256

                                        803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423

                                        SHA512

                                        59c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\python311.dll

                                        Filesize

                                        1.6MB

                                        MD5

                                        1dee750e8554c5aa19370e8401ff91f9

                                        SHA1

                                        2fb01488122a1454aa3972914913e84243757900

                                        SHA256

                                        fd69ba232ba3b03e8f5faea843919a02d76555900a66a1e290e47bc8c0e78bfa

                                        SHA512

                                        9047a24a6621a284d822b7d68477c01c26dc42eccc4ccc4144bfd5d92e89ea0c854dc48685268f1ae3ca196fd45644a038a2c86d4c1cc0dbf21ca492aece0c9e

                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15802\ucrtbase.dll

                                        Filesize

                                        1011KB

                                        MD5

                                        849959a003fa63c5a42ae87929fcd18b

                                        SHA1

                                        d1b80b3265e31a2b5d8d7da6183146bbd5fb791b

                                        SHA256

                                        6238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232

                                        SHA512

                                        64958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09

                                      • memory/672-400-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/672-399-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/1916-56-0x0000000000500000-0x0000000000590000-memory.dmp

                                        Filesize

                                        576KB

                                      • memory/1916-57-0x00000000058E0000-0x0000000005E86000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/2504-63-0x0000000000400000-0x000000000045C000-memory.dmp

                                        Filesize

                                        368KB

                                      • memory/2504-61-0x0000000000400000-0x000000000045C000-memory.dmp

                                        Filesize

                                        368KB

                                      • memory/2556-77-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-417-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-398-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-401-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-402-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-403-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-404-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-405-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-406-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-394-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-395-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-409-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-410-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-411-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-107-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-106-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-105-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-104-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-102-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-412-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-413-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-414-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-393-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-40-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-22-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-21-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-20-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-19-0x0000000000151000-0x000000000017F000-memory.dmp

                                        Filesize

                                        184KB

                                      • memory/2556-397-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-16-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-418-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-419-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-420-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-421-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2556-396-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2568-408-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2568-407-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2708-279-0x00007FFA4B250000-0x00007FFA4B269000-memory.dmp

                                        Filesize

                                        100KB

                                      • memory/2708-346-0x00007FFA4AFE0000-0x00007FFA4B006000-memory.dmp

                                        Filesize

                                        152KB

                                      • memory/2708-295-0x00007FFA4B1E0000-0x00007FFA4B1F4000-memory.dmp

                                        Filesize

                                        80KB

                                      • memory/2708-297-0x00007FFA4AFE0000-0x00007FFA4B006000-memory.dmp

                                        Filesize

                                        152KB

                                      • memory/2708-298-0x00007FFA38AC0000-0x00007FFA38BDC000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2708-300-0x00007FFA4B0A0000-0x00007FFA4B0B2000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/2708-299-0x00007FFA47500000-0x00007FFA47543000-memory.dmp

                                        Filesize

                                        268KB

                                      • memory/2708-302-0x00007FFA38D40000-0x00007FFA38E0D000-memory.dmp

                                        Filesize

                                        820KB

                                      • memory/2708-301-0x00007FFA4B010000-0x00007FFA4B043000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2708-305-0x00007FFA38870000-0x00007FFA38AB9000-memory.dmp

                                        Filesize

                                        2.3MB

                                      • memory/2708-304-0x00007FFA4AED0000-0x00007FFA4AEF4000-memory.dmp

                                        Filesize

                                        144KB

                                      • memory/2708-303-0x00007FFA38E10000-0x00007FFA39330000-memory.dmp

                                        Filesize

                                        5.1MB

                                      • memory/2708-306-0x00007FFA4AD60000-0x00007FFA4AD8E000-memory.dmp

                                        Filesize

                                        184KB

                                      • memory/2708-307-0x00007FFA38BE0000-0x00007FFA38C67000-memory.dmp

                                        Filesize

                                        540KB

                                      • memory/2708-308-0x00007FFA387B0000-0x00007FFA3886C000-memory.dmp

                                        Filesize

                                        752KB

                                      • memory/2708-320-0x00007FFA48D20000-0x00007FFA48D4B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/2708-365-0x00007FFA4B010000-0x00007FFA4B043000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2708-367-0x00007FFA38870000-0x00007FFA38AB9000-memory.dmp

                                        Filesize

                                        2.3MB

                                      • memory/2708-366-0x00007FFA38D40000-0x00007FFA38E0D000-memory.dmp

                                        Filesize

                                        820KB

                                      • memory/2708-364-0x00007FFA4BEF0000-0x00007FFA4BEFD000-memory.dmp

                                        Filesize

                                        52KB

                                      • memory/2708-363-0x00007FFA4B0A0000-0x00007FFA4B0B2000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/2708-362-0x00007FFA4B0C0000-0x00007FFA4B0ED000-memory.dmp

                                        Filesize

                                        180KB

                                      • memory/2708-361-0x00007FFA4B230000-0x00007FFA4B249000-memory.dmp

                                        Filesize

                                        100KB

                                      • memory/2708-360-0x00007FFA50E90000-0x00007FFA50E9D000-memory.dmp

                                        Filesize

                                        52KB

                                      • memory/2708-359-0x00007FFA4B250000-0x00007FFA4B269000-memory.dmp

                                        Filesize

                                        100KB

                                      • memory/2708-358-0x00007FFA51930000-0x00007FFA5193F000-memory.dmp

                                        Filesize

                                        60KB

                                      • memory/2708-357-0x00007FFA4B420000-0x00007FFA4B443000-memory.dmp

                                        Filesize

                                        140KB

                                      • memory/2708-356-0x00007FFA38C70000-0x00007FFA38D3F000-memory.dmp

                                        Filesize

                                        828KB

                                      • memory/2708-355-0x00007FFA38BE0000-0x00007FFA38C67000-memory.dmp

                                        Filesize

                                        540KB

                                      • memory/2708-354-0x00007FFA48D20000-0x00007FFA48D4B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/2708-353-0x00007FFA387B0000-0x00007FFA3886C000-memory.dmp

                                        Filesize

                                        752KB

                                      • memory/2708-352-0x00007FFA4AD60000-0x00007FFA4AD8E000-memory.dmp

                                        Filesize

                                        184KB

                                      • memory/2708-350-0x00007FFA4AED0000-0x00007FFA4AEF4000-memory.dmp

                                        Filesize

                                        144KB

                                      • memory/2708-348-0x00007FFA47500000-0x00007FFA47543000-memory.dmp

                                        Filesize

                                        268KB

                                      • memory/2708-347-0x00007FFA38AC0000-0x00007FFA38BDC000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2708-296-0x00007FFA4BC00000-0x00007FFA4BC0B000-memory.dmp

                                        Filesize

                                        44KB

                                      • memory/2708-345-0x00007FFA4BC00000-0x00007FFA4BC0B000-memory.dmp

                                        Filesize

                                        44KB

                                      • memory/2708-344-0x00007FFA4B1E0000-0x00007FFA4B1F4000-memory.dmp

                                        Filesize

                                        80KB

                                      • memory/2708-340-0x00007FFA38E10000-0x00007FFA39330000-memory.dmp

                                        Filesize

                                        5.1MB

                                      • memory/2708-337-0x00007FFA4B050000-0x00007FFA4B086000-memory.dmp

                                        Filesize

                                        216KB

                                      • memory/2708-330-0x00007FFA39330000-0x00007FFA39919000-memory.dmp

                                        Filesize

                                        5.9MB

                                      • memory/2708-294-0x00007FFA4B250000-0x00007FFA4B269000-memory.dmp

                                        Filesize

                                        100KB

                                      • memory/2708-292-0x00007FFA38C70000-0x00007FFA38D3F000-memory.dmp

                                        Filesize

                                        828KB

                                      • memory/2708-293-0x00007FFA38BE0000-0x00007FFA38C67000-memory.dmp

                                        Filesize

                                        540KB

                                      • memory/2708-277-0x00007FFA4B420000-0x00007FFA4B443000-memory.dmp

                                        Filesize

                                        140KB

                                      • memory/2708-280-0x00007FFA50E90000-0x00007FFA50E9D000-memory.dmp

                                        Filesize

                                        52KB

                                      • memory/2708-286-0x00007FFA4B010000-0x00007FFA4B043000-memory.dmp

                                        Filesize

                                        204KB

                                      • memory/2708-288-0x00007FFA38E10000-0x00007FFA39330000-memory.dmp

                                        Filesize

                                        5.1MB

                                      • memory/2708-287-0x00007FFA38D40000-0x00007FFA38E0D000-memory.dmp

                                        Filesize

                                        820KB

                                      • memory/2708-285-0x00007FFA39330000-0x00007FFA39919000-memory.dmp

                                        Filesize

                                        5.9MB

                                      • memory/2708-281-0x00007FFA4B230000-0x00007FFA4B249000-memory.dmp

                                        Filesize

                                        100KB

                                      • memory/2708-284-0x00007FFA4BEF0000-0x00007FFA4BEFD000-memory.dmp

                                        Filesize

                                        52KB

                                      • memory/2708-283-0x00007FFA4B050000-0x00007FFA4B086000-memory.dmp

                                        Filesize

                                        216KB

                                      • memory/2708-282-0x00007FFA4B0C0000-0x00007FFA4B0ED000-memory.dmp

                                        Filesize

                                        180KB

                                      • memory/2708-278-0x00007FFA51930000-0x00007FFA5193F000-memory.dmp

                                        Filesize

                                        60KB

                                      • memory/2708-236-0x00007FFA39330000-0x00007FFA39919000-memory.dmp

                                        Filesize

                                        5.9MB

                                      • memory/2768-424-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3720-18-0x0000000000D20000-0x00000000011DF000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3720-1-0x0000000077866000-0x0000000077868000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3720-0-0x0000000000D20000-0x00000000011DF000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3720-2-0x0000000000D21000-0x0000000000D4F000-memory.dmp

                                        Filesize

                                        184KB

                                      • memory/3720-3-0x0000000000D20000-0x00000000011DF000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3720-4-0x0000000000D20000-0x00000000011DF000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4580-238-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4580-289-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4580-291-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4740-93-0x0000000000E20000-0x0000000000EA0000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/4932-100-0x0000000000400000-0x000000000045B000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/4932-95-0x0000000000400000-0x000000000045B000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/4960-416-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4960-415-0x0000000000150000-0x000000000060F000-memory.dmp

                                        Filesize

                                        4.7MB